Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Requested Documentation.exe

Overview

General Information

Sample name:Requested Documentation.exe
Analysis ID:1578740
MD5:dc6558b7b16a9d2db51d2f6b16396321
SHA1:0dc5d607e934b68d8cf54e60e9baa942e289cf47
SHA256:06cfeb5b6cee2d5348824125c7fd33dd0e1a9f08561115bdd8c9e260bdd37e93
Tags:exeuser-TeamDreier
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
One or more processes crash
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Requested Documentation.exe (PID: 2164 cmdline: "C:\Users\user\Desktop\Requested Documentation.exe" MD5: DC6558B7B16A9D2DB51D2F6B16396321)
    • RegSvcs.exe (PID: 5480 cmdline: "C:\Users\user\Desktop\Requested Documentation.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • WerFault.exe (PID: 1488 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5480 -s 1476 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg", "Telegram Chatid": "5839829477"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xef73:$a1: get_encryptedPassword
        • 0xf29b:$a2: get_encryptedUsername
        • 0xed0e:$a3: get_timePasswordChanged
        • 0xee2f:$a4: get_passwordField
        • 0xef89:$a5: set_encryptedPassword
        • 0x108e5:$a7: get_logins
        • 0x10596:$a8: GetOutlookPasswords
        • 0x10388:$a9: StartKeylogger
        • 0x10835:$a10: KeyLoggerEventArgs
        • 0x103e5:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                2.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xf173:$a1: get_encryptedPassword
                • 0xf49b:$a2: get_encryptedUsername
                • 0xef0e:$a3: get_timePasswordChanged
                • 0xf02f:$a4: get_passwordField
                • 0xf189:$a5: set_encryptedPassword
                • 0x10ae5:$a7: get_logins
                • 0x10796:$a8: GetOutlookPasswords
                • 0x10588:$a9: StartKeylogger
                • 0x10a35:$a10: KeyLoggerEventArgs
                • 0x105e5:$a11: KeyLoggerEventArgsEventHandler
                2.2.RegSvcs.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x14125:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x13623:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x13931:$a4: \Orbitum\User Data\Default\Login Data
                • 0x14729:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 10 entries
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000002.00000002.2468843008.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7708662779:AAH6Et2SseJQ86UUKPaQRakBrlKtq8QtlJg", "Telegram Chatid": "5839829477"}
                Source: Requested Documentation.exeReversingLabs: Detection: 52%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: Requested Documentation.exeJoe Sandbox ML: detected
                Source: Requested Documentation.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: $$.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: RegSvcs.pdbr source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.PDBpi source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: @o.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: n0C:\Windows\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdbRSDS source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.PDB source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 00000002.00000002.2469372592.0000000005E14000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: Requested Documentation.exe, 00000000.00000003.2111779940.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, Requested Documentation.exe, 00000000.00000003.2114278605.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Requested Documentation.exe, 00000000.00000003.2111779940.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, Requested Documentation.exe, 00000000.00000003.2114278605.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb_l source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: ?oC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdbtP source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2468250989.0000000000CEC000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2469372592.0000000005E14000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdbd source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.Configuration.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: RegSvcs.pdbegSvcs.pdbpdbvcs.pdbv4.0.30319\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.Core.ni.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.Windows.Forms.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\mscorlib.pdbCp source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: RegSvcs.exe, 00000002.00000002.2469372592.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, WER3A1.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb*V source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: Microsoft.VisualBasic.pdbTz source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: mscorlib.ni.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\exe\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbW source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\RegSvcs.pdbpdbvcs.pdb+ source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.ni.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WER3A1.tmp.dmp.5.dr
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046445A
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046C6D1 FindFirstFileW,FindClose,0_2_0046C6D1
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0046C75C
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046EF95
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046F0F2
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046F3F3
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004637EF
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00463B12
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046BCBC
                Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004722EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_004722EE
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: RegSvcs.exe, 00000002.00000002.2468843008.0000000002B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegSvcs.exe, 00000002.00000002.2468843008.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2468843008.0000000002B14000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegSvcs.exe, 00000002.00000002.2468843008.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: Requested Documentation.exe, 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegSvcs.exe, 00000002.00000002.2468843008.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
                Source: Requested Documentation.exe, 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: Requested Documentation.exe, 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00474164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00474164
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00474164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00474164
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00473F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00473F66
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0046001C
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0048CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0048CABC

                System Summary

                barindex
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Requested Documentation.exe.38a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Requested Documentation.exe.38a0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: Process Memory Space: Requested Documentation.exe PID: 2164, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 5480, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: This is a third-party compiled AutoIt script.0_2_00403B3A
                Source: Requested Documentation.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: Requested Documentation.exe, 00000000.00000000.2103303547.00000000004B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8e120652-f
                Source: Requested Documentation.exe, 00000000.00000000.2103303547.00000000004B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_e289904b-4
                Source: Requested Documentation.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_cf7fef00-8
                Source: Requested Documentation.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_3f17595d-0
                Source: initial sampleStatic PE information: Filename: Requested Documentation.exe
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0046A1EF
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00458310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00458310
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_004651BD
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0040E6A00_2_0040E6A0
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0042D9750_2_0042D975
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004221C50_2_004221C5
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004362D20_2_004362D2
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004803DA0_2_004803DA
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0043242E0_2_0043242E
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004225FA0_2_004225FA
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0045E6160_2_0045E616
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004166E10_2_004166E1
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0043878F0_2_0043878F
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004368440_2_00436844
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004808570_2_00480857
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004188080_2_00418808
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004688890_2_00468889
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0042CB210_2_0042CB21
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00436DB60_2_00436DB6
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00416F9E0_2_00416F9E
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004130300_2_00413030
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0042F1D90_2_0042F1D9
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004231870_2_00423187
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004012870_2_00401287
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004214840_2_00421484
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004155200_2_00415520
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004276960_2_00427696
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004157600_2_00415760
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004219780_2_00421978
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00439AB50_2_00439AB5
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0040FCE00_2_0040FCE0
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00487DDB0_2_00487DDB
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00421D900_2_00421D90
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0042BDA60_2_0042BDA6
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0040DF000_2_0040DF00
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00413FE00_2_00413FE0
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_038935E00_2_038935E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010C27B92_2_010C27B9
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: String function: 00420AE3 appears 70 times
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: String function: 00407DE1 appears 35 times
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: String function: 00428900 appears 42 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5480 -s 1476
                Source: Requested Documentation.exe, 00000000.00000003.2114547498.0000000003A03000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Requested Documentation.exe
                Source: Requested Documentation.exe, 00000000.00000003.2114941957.0000000003BAD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Requested Documentation.exe
                Source: Requested Documentation.exe, 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Requested Documentation.exe
                Source: Requested Documentation.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Requested Documentation.exe.38a0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Requested Documentation.exe.38a0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: Process Memory Space: Requested Documentation.exe PID: 2164, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegSvcs.exe PID: 5480, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/9@1/1
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046A06A GetLastError,FormatMessageW,0_2_0046A06A
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004581CB AdjustTokenPrivileges,CloseHandle,0_2_004581CB
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_004587E1
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0046B333
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0047EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0047EE0D
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0046C397
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00404E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00404E89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5480
                Source: C:\Users\user\Desktop\Requested Documentation.exeFile created: C:\Users\user\AppData\Local\Temp\autEEFF.tmpJump to behavior
                Source: Requested Documentation.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Requested Documentation.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Requested Documentation.exeReversingLabs: Detection: 52%
                Source: unknownProcess created: C:\Users\user\Desktop\Requested Documentation.exe "C:\Users\user\Desktop\Requested Documentation.exe"
                Source: C:\Users\user\Desktop\Requested Documentation.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Requested Documentation.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5480 -s 1476
                Source: C:\Users\user\Desktop\Requested Documentation.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Requested Documentation.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: Requested Documentation.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: Requested Documentation.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: Requested Documentation.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: Requested Documentation.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Requested Documentation.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: Requested Documentation.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: Requested Documentation.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: $$.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: RegSvcs.pdbr source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.PDBpi source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: @o.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: n0C:\Windows\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.ni.pdbRSDS source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.PDB source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 00000002.00000002.2469372592.0000000005E14000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: Requested Documentation.exe, 00000000.00000003.2111779940.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, Requested Documentation.exe, 00000000.00000003.2114278605.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: Requested Documentation.exe, 00000000.00000003.2111779940.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, Requested Documentation.exe, 00000000.00000003.2114278605.0000000003A80000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb_l source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: ?oC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.pdbtP source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2468250989.0000000000CEC000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2469372592.0000000005E14000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdbd source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.Configuration.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: RegSvcs.pdbegSvcs.pdbpdbvcs.pdbv4.0.30319\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2467983330.0000000000B37000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.Core.ni.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.Windows.Forms.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\mscorlib.pdbCp source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\exe\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: RegSvcs.exe, 00000002.00000002.2469372592.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, WER3A1.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb*V source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: Microsoft.VisualBasic.pdbTz source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: mscorlib.ni.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: \??\C:\Windows\exe\RegSvcs.pdb source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbW source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\RegSvcs.pdbpdbvcs.pdb+ source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.ni.pdb source: WER3A1.tmp.dmp.5.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WER3A1.tmp.dmp.5.dr
                Source: Requested Documentation.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Requested Documentation.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Requested Documentation.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Requested Documentation.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Requested Documentation.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00404B37 LoadLibraryA,GetProcAddress,0_2_00404B37
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00428945 push ecx; ret 0_2_00428958
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010C0838 push ebp; retf 0000h2_2_010C0832
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_010C07E5 push ebp; retf 0000h2_2_010C0832
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004048D7
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00485376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00485376
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00423187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00423187
                Source: C:\Users\user\Desktop\Requested Documentation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\Requested Documentation.exeAPI/Special instruction interceptor: Address: 3893204
                Source: Requested Documentation.exe, 00000000.00000002.2116295585.0000000000E98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEITOR
                Source: C:\Users\user\Desktop\Requested Documentation.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102178
                Source: C:\Users\user\Desktop\Requested Documentation.exeAPI coverage: 4.7 %
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046445A
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046C6D1 FindFirstFileW,FindClose,0_2_0046C6D1
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0046C75C
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046EF95
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046F0F2
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046F3F3
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004637EF
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00463B12
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046BCBC
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004049A0
                Source: Amcache.hve.5.drBinary or memory string: VMware
                Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: RegSvcs.exe, 00000002.00000002.2468250989.0000000000CEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Users\user\Desktop\Requested Documentation.exeAPI call chain: ExitProcess graph end nodegraph_0-100975
                Source: C:\Users\user\Desktop\Requested Documentation.exeAPI call chain: ExitProcess graph end nodegraph_0-101194
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00473F09 BlockInput,0_2_00473F09
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00403B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00403B3A
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00435A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00435A7C
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00404B37 LoadLibraryA,GetProcAddress,0_2_00404B37
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_038934D0 mov eax, dword ptr fs:[00000030h]0_2_038934D0
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_03893470 mov eax, dword ptr fs:[00000030h]0_2_03893470
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_03891E70 mov eax, dword ptr fs:[00000030h]0_2_03891E70
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004580A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_004580A9
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0042A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A155
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0042A124 SetUnhandledExceptionFilter,0_2_0042A124
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                Source: C:\Users\user\Desktop\Requested Documentation.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 89B008Jump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004587B1 LogonUserW,0_2_004587B1
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00403B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00403B3A
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004048D7
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00464C53 mouse_event,0_2_00464C53
                Source: C:\Users\user\Desktop\Requested Documentation.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Requested Documentation.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00457CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00457CAF
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0045874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0045874B
                Source: Requested Documentation.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: Requested Documentation.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_0042862B cpuid 0_2_0042862B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00434E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00434E87
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00441E06 GetUserNameW,0_2_00441E06
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00433F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00433F3A
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_004049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004049A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Requested Documentation.exe.38a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Requested Documentation.exe PID: 2164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5480, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Requested Documentation.exe.38a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Requested Documentation.exe PID: 2164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5480, type: MEMORYSTR
                Source: Requested Documentation.exeBinary or memory string: WIN_81
                Source: Requested Documentation.exeBinary or memory string: WIN_XP
                Source: Requested Documentation.exeBinary or memory string: WIN_XPe
                Source: Requested Documentation.exeBinary or memory string: WIN_VISTA
                Source: Requested Documentation.exeBinary or memory string: WIN_7
                Source: Requested Documentation.exeBinary or memory string: WIN_8
                Source: Requested Documentation.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Requested Documentation.exe.38a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Requested Documentation.exe PID: 2164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5480, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Requested Documentation.exe.38a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Requested Documentation.exe PID: 2164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5480, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Requested Documentation.exe.38a0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Requested Documentation.exe.38a0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Requested Documentation.exe PID: 2164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5480, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00476283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00476283
                Source: C:\Users\user\Desktop\Requested Documentation.exeCode function: 0_2_00476747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                12
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                121
                Input Capture
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                LSASS Memory1
                Account Discovery
                Remote Desktop Protocol121
                Input Capture
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                Security Account Manager1
                File and Directory Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS126
                System Information Discovery
                Distributed Component Object ModelInput Capture12
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                2
                Valid Accounts
                LSA Secrets251
                Security Software Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Virtualization/Sandbox Evasion
                Cached Domain Credentials1
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                Access Token Manipulation
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                Process Injection
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Requested Documentation.exe53%ReversingLabsWin32.Trojan.Nymeria
                Requested Documentation.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                checkip.dyndns.com
                158.101.44.242
                truefalse
                  high
                  checkip.dyndns.org
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.5.drfalse
                        high
                        http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.2468843008.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2468843008.0000000002B14000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.2468843008.0000000002B21000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2468843008.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://api.telegram.org/bot-/sendDocument?chat_id=Requested Documentation.exe, 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.org/qRequested Documentation.exe, 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/Requested Documentation.exe, 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    158.101.44.242
                                    checkip.dyndns.comUnited States
                                    31898ORACLE-BMC-31898USfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1578740
                                    Start date and time:2024-12-20 10:05:06 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 36s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:9
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:Requested Documentation.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@4/9@1/1
                                    EGA Information:
                                    • Successful, ratio: 50%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 57
                                    • Number of non-executed functions: 280
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 52.168.117.173, 40.126.53.11, 13.107.246.63, 172.202.163.200
                                    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target RegSvcs.exe, PID 5480 because it is empty
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                    TimeTypeDescription
                                    04:06:38API Interceptor1x Sleep call for process: WerFault.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    158.101.44.242Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    checkip.dyndns.comYU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                    • 193.122.6.168
                                    PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 132.226.247.73
                                    PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 193.122.6.168
                                    Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 158.101.44.242
                                    HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                    • 158.101.44.242
                                    66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.130.0
                                    _Company.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 158.101.44.242
                                    F.O Pump Istek,Docx.batGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                    • 132.226.8.169
                                    D.G Governor Istek,Docx.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                    • 132.226.247.73
                                    0001.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 132.226.8.169
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ORACLE-BMC-31898USYU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                    • 193.122.6.168
                                    la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                                    • 168.138.95.8
                                    PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • 193.122.6.168
                                    x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 144.25.16.134
                                    Overheaped237.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 158.101.44.242
                                    HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                    • 158.101.44.242
                                    x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 150.136.65.7
                                    sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 193.123.7.187
                                    66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 193.122.130.0
                                    la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 129.148.164.81
                                    No context
                                    No context
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):1.096305128944762
                                    Encrypted:false
                                    SSDEEP:192:aPUak8QkOT0BU/Sayce36izuiFUZ24IO8G:acgQkOABU/SaTVizuiFUY4IO8G
                                    MD5:90EEF917D510586C697C1DC2C7F4ABE6
                                    SHA1:A2516B10AFD50FB06B74F1FDF6A879AADA2C3563
                                    SHA-256:673D5FA1DA7C884032CF103CDE9A090E55F76E71D9AEF2A0A1C6811797BA3AF2
                                    SHA-512:0FC568727FEDC4CA1446E6F12B8AC4B53FD3CF45C083027FD14AEE7EB1CC679555C916F3D4B377AD978E58B0222B2619CD4EC2B841A0B843F23F721CFC656A5E
                                    Malicious:false
                                    Reputation:low
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.1.5.9.1.6.7.8.3.6.4.2.0.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.1.5.9.1.6.8.3.9.8.9.1.2.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.7.f.a.9.d.7.f.-.7.0.1.e.-.4.f.c.f.-.9.d.3.d.-.3.6.f.3.6.1.3.5.c.7.9.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.c.d.b.3.c.f.f.-.f.a.f.a.-.4.c.4.6.-.8.5.6.7.-.0.3.d.a.0.c.c.8.f.5.b.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.e.g.S.v.c.s...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.e.g.S.v.c.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.6.8.-.0.0.0.1.-.0.0.1.4.-.6.4.d.3.-.3.c.6.5.b.e.5.2.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.1.9.6.9.7.7.1.b.2.f.0.2.2.f.9.a.8.6.d.7.7.a.c.4.d.4.d.2.3.9.b.e.c.d.f.0.8.d.0.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 15 streams, Fri Dec 20 09:06:08 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):254294
                                    Entropy (8bit):3.7876492904431123
                                    Encrypted:false
                                    SSDEEP:1536:yb3HxbtjgErOjxeuBojRfapN4uE2aOHSVXcoqLTgOHUAbLAiYVhDCD3sNLtTUBuF:M3B7mxGfc4uEqHy6LTgOH9UjhS3szYB
                                    MD5:A17F4F08A50554A834E8B72AB27A96B3
                                    SHA1:F92E0F0657CB61EFFE39DB69E4DCF914E68B1EF2
                                    SHA-256:E65E002B78D47ABEC4C6F31989EF3912E02CAF0360A551FBA61D3DA91CB2E0E2
                                    SHA-512:7CF801708177AFEBDB5B38C3B4ABD150BC90DDA38797D26F87EC66C45891D63829D6875621EF17409A90D526DFD3FC5D894831C56E1D80FE85EED4EC4F8073E9
                                    Malicious:false
                                    Reputation:low
                                    Preview:MDMP..a..... ........3eg....................................<....#.......$.."M..........`.......8...........T............:..N............#...........%..............................................................................eJ......P&......GenuineIntel............T.......h...{3eg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8272
                                    Entropy (8bit):3.699331119885901
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJFS6A6YTM6F7gmfQ40Upr+89b4/sfmIm:R6lXJw6A6Y465gmfQ4024kfQ
                                    MD5:2EB206B7FB740CB41591C8EE78462F1F
                                    SHA1:E0E85988237D58E547518C768C5880105EC063B9
                                    SHA-256:1A27B62CFD1A76E9B93DEF54D0167524960964974C63C4DDD67892DE615254BB
                                    SHA-512:26EC6171D055C2D63B8BD9C21114AC431D54292F66E0EAEDB4451B9F388CA9DE50BA79521C41EE89746D4CC19FD9ABEE000E5873443BB531A6B4963E985BA994
                                    Malicious:false
                                    Reputation:low
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.4.8.0.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4651
                                    Entropy (8bit):4.482186018590731
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsDJg77aI9kfWpW8VY5Ym8M4JVjFUu+q8YrZmDI8d:uIjfdI7eO7VtJ9NZmDI8d
                                    MD5:092EC31F388D80204633F6496E3DA7C2
                                    SHA1:E9A77AAA6AAD2B18F41C016ECD28FE17A61E6B7F
                                    SHA-256:1A9BCA0A552B3A4029D949ADECFD7BA12EB01E3353D820EEC3A37EC9B36B4984
                                    SHA-512:6E9A3BB0AB73C7B7CD419870590ECAB90AE762DF295F79F0188136EE94617B1ECF78D4F3B5582AE4AA4815488648FB45AF9FA122D8B6756DDA508381B763AFB0
                                    Malicious:false
                                    Reputation:low
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="639368" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Users\user\Desktop\Requested Documentation.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):57156
                                    Entropy (8bit):7.81211737301038
                                    Encrypted:false
                                    SSDEEP:1536:S6iSJbMHHsqk4SB+6+NCvn3Zvyk/WecwzSY6z/Jbn2y8:XiaIHHQ4w3+mF9bNuY67JSl
                                    MD5:666517176B0250ED8328E2C43AA179EB
                                    SHA1:0E7226BA0AB66E7CE356E5C92706CDEA21DF0344
                                    SHA-256:A3399E71F2F9241C69EA3CC97449F5D224FE2B2C5CD5C32C472BA9DD498627A4
                                    SHA-512:B03563FA58D4116F0FD235B7C6CBE74605B53327652DDDD73A9ED812FC352D5CD0F5FD24F30366504A8DFCAF9BD4035A1D7CE7EE8972B087A3922180F0771884
                                    Malicious:false
                                    Reputation:low
                                    Preview:EA06..n....U:.V.Z.S.M..S.... ...I.T.......}\...J.U*_.......H..w<.Q'.il.s8.Nfr..n}i.M..y...&.E!.h..k:.O.*.......*.4.R)5?}.C..`..V..i.I.*[K..+....r.....a......Sj.Jp.Fj.....@. ..U.w.T.$.Y.$h...|.c.....:.Z.d.1...y.......!...g.o.M(@...ZiU8..'n....L..W.`....l......U.N...=.R...N@..<....@.>..>.t.N.....Z..Zf.W.0$uP...P..T|z.p.&.'..>.4.a.U?...Z.....M*.8.U+^.....(.U{...vs...b.V...*..&....x...K..a}..'.....&..%.....0....0.....M......h.{...O.G...E....T...=..J..*.@...4.P.U..V.)....U*.S.I......0.Ri........8.N...W*T.}n..xV*.}R.T..-.....T.V)..*...W..J...T.r......)...+...S.Hk.L.R|..^@$....h..ju....x........I(.....I.\d.0...T.$+.......b.X.........T/.J.J.T.\)3J...X..*.J...._c...r8..V/.p..<..@@.3b..*.*..=T.S)6..bWg.T.w.....h_.RK..!...u.....PDy@.....(U#..M...y@....x.2...Q......@@./...I.Ck.{.. .R)S{..CV._...m..X....*}B8.xUo.{.t...U......x...4.M3.i..+..Rm..V....f_...)t.tl.a..5...F......U.I....".7..6...B....iU+....._<.M....<).(l.H.........,9..b.....E.BK...,. .F....).i..,...
                                    Process:C:\Users\user\Desktop\Requested Documentation.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):9604
                                    Entropy (8bit):7.600476283523531
                                    Encrypted:false
                                    SSDEEP:192:c09SJLZ7jNO7shK8LoGrfkdt4+45oh85H/pbPtp7PRwd09diVWD8TYiyz2GtWcjO:X9SJtjDMGTYt4+PhitRPRwd0TIWDiyqp
                                    MD5:C4012587BDEB036DAD242A8916F7DFA6
                                    SHA1:97E80FBB70384EB47436CFC92D2848E29B43BA33
                                    SHA-256:6542BD9BDEFF51D39BC0486DB1E3BF23DD078F83F6F3FE49B9262B4FA0F8E2C9
                                    SHA-512:DB357421D931F9B5E36068BAD940BB517351F4037FF38FEFAFF0D62D296212550CF85020501F0470296F679C35EEEECC8E2F6D4356BC6EC6407D77CADBBE92EA
                                    Malicious:false
                                    Reputation:low
                                    Preview:EA06..p..L&.[...e....;..`....y...b.......s8..&...j.%.$.m8..Sp.N.g.....m.X@..K...c.$....lL.`..Ng6)...l.I...b....4..,S@..l.l.-z..f.6|v...Qc.0.......q4.Y..k..h......c ._..p.1....qa.H....9..$l.3..Y@.6...$.a5.H.f@.....|3....fs9..%d.M...5...&.@.@.K.I.....Y.x>9.....Y.j.;.......j.;-....Y@j.9.....K,..1...'.`....|.....,S`..N,`...H.......|....F. ,_...c3..........;..:&.>_L.n....f.G_T......|.).......&.....8...&V....ia...=.....Y......&..`.l..|.[.....Yl ....ab...,@....ib........h.._..@...3|.P.o.ac.....+.....N.i|sk....8..4|.0...c....7....k ..7.X..TD....M&`....g....,,`....>.Y...$.@&....L&.P.....32.|&.G%......h...,..33.%.....BS...Nf......f.4.L,.9."....Bvp.Y...ffS{$..d..,.@8@.......@.3d.L..k4.h..M.B:.Y...fg6.;.ab....98.L..:.....of.L.*..Fp........36.Y&.k,.b...' !...,t.33.4.c2.X.M....#......j.d...[..%3.....c....M'6...ic....!..,..3 k..p....@...L&..........., ....#......f.8.X..K..`....zn........0{.k7....!..,...S.%..9..J@^@.G'.......aa.M..)LM@B:.Y...ffS...r....@...N@.:.....n..Mf@....
                                    Process:C:\Users\user\Desktop\Requested Documentation.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):93696
                                    Entropy (8bit):6.725969860791525
                                    Encrypted:false
                                    SSDEEP:1536:TdmsgGLUm80cRBV0KseTeyA5PdB2wmSHBrBkGDM7q7ep2R0qhLI2jssJCSrLRjN:ZxgGLPaL0KseTer5PdB2eHZBkGDOX215
                                    MD5:2BC5C3CA319C5D0BDD91591419BC5ECF
                                    SHA1:9E6E8B94262114769D7B1D0DD403D5E837CF392F
                                    SHA-256:4FD26B8925ACA3BC742A2A20C47E0B0652F439F960CB7855B721720145A8A2C2
                                    SHA-512:22151A94B922E0B802B3E54596EC0312E47FC4DBE8A3425DB51F9AB133801DDC42320847C117456FA3B8E310F106B163B86A18852E9017888681CAF3D95D1503
                                    Malicious:false
                                    Reputation:low
                                    Preview:...S[UTZVOT4..JS.UTZROT4.IJSXUTZROT4JIJSXUTZROT4JIJSXUTZROT4.IJSVJ.TR.].k.K..t.2;<tD8&-!98t93!:[>i(6x'!4r&:....s5:0?|BY>nIJSXUTZ..T4.HIS.o!.ROT4JIJS.UV[YN.4J-KSX]TZROT4D.KSXuTZR.U4JI.SXuTZRMT4NIJSXUTZVOT4JIJSX.UZRMT4JIJSZU..ROD4JYJSXUDZR_T4JIJSHUTZROT4JIJS..UZ.OT4J.KS.PTZROT4JIJSXUTZROT4J.KSTUTZROT4JIJSXUTZROT4JIJSXUTZROT4JIJSXUTZROT4JIJSXUTZRoT4BIJSXUTZROT4BiJS.UTZROT4JIJSv!1"&OT4^+KSXuTZR+U4JKJSXUTZROT4JIJSxUT:|='F)IJS.PTZR.U4JOJSX3UZROT4JIJSXUTZ.OTtd;/?76TZ^OT4J.KSXWTZR#U4JIJSXUTZROT4.IJ.XUTZROT4JIJSXUTZ..U4JIJS.UTZPOQ4R.JS..TZQOT4.IJU8.TZ.OT4JIJSXUTZROT4JIJSXUTZROT4JIJSXUTZROT4JIJS.(.U...]9.SXUTZRNV7NOB[XUTZROT44IJS.UTZ.OT4}IJS}UTZ?OT4nIJS&UTZ,OT4.IJS*UTZ3OT4.IJS7UTZ<OT44IJSFW|ERO^.lIH{xUTPRe.GkIJY.TTZV<v4JC.QXUP)qOT>.JJS\&pZRE.0JIN }UTP.JT4Nc.S[.B\ROO[rIJYXV.OTOT/`oJQplTZXO~.JJ.F^UTAxmT6.@JS\..)OOT2b.JSR!]ZRM.>JINyFW|.RO^.h7YSXQ.Zxm* JINxX.v$GOT0aI`q&CTZVdT.h7]SXQ.ZxI~VJ;._X%W53OT2b.JSR}.ZRIT.pI4]XUPX=.T4@o`.X}.ZRIT..IJUX}.ZRIT..IJUX}.ZRIT.pIb.XURZz.T4LI`.X+gZRKx34zJS\~B$cOT0.O2S
                                    Process:C:\Users\user\Desktop\Requested Documentation.exe
                                    File Type:ASCII text, with very long lines (28674), with no line terminators
                                    Category:dropped
                                    Size (bytes):28674
                                    Entropy (8bit):3.5745206936074676
                                    Encrypted:false
                                    SSDEEP:768:G3i/YYPlYVLDumOlG8wp5Ju6AmLXFl10fnb1uLphM:UiAYPlgamOAYuLDM
                                    MD5:C6CB449B56572A5E8C469FD1A542559B
                                    SHA1:5CD95B2D02B4F2C25AEEF5787A82E27867FC415D
                                    SHA-256:C43A565DC565DC12C2AC301769551D50AB9C1C110CA3A1D81E7ABC8D470D20D7
                                    SHA-512:CF9E26EA10B53476C24F9566EBDCCD0A6AB44F7D9BAAEEC7C77837082607DA02F7F5F57B38C64F0E709EA0266580737B3578031A22806D8A3C1FC8FBD256E6DA
                                    Malicious:false
                                    Reputation:low
                                    Preview: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
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:MS Windows registry file, NT/2000 or above
                                    Category:dropped
                                    Size (bytes):1835008
                                    Entropy (8bit):4.422373724563603
                                    Encrypted:false
                                    SSDEEP:6144:hSvfpi6ceLP/9skLmb0OTlWSPHaJG8nAgeMZMMhA2fX4WABlEnNt0uhiTw:4vloTlW+EZMM6DFyv03w
                                    MD5:01F15D2D0B2F53E09E6F4B41EA7589EB
                                    SHA1:1E17A48A5807BDD1068D17C3F9A0F1B1E2BD4263
                                    SHA-256:081357F80D62AC3CE3B85C9964AAD4DAB1304C79BB61DF94935A6FE259C9F933
                                    SHA-512:D9AF8ADB295A80DC53165D934292F5FDF6913F59AF2F250F78FFFF92BF4AB2E50EBE51B7C8650CB54F873FA27ECDDDF4DCD2BA07C0DA11A347B39FE0ECD5FF9B
                                    Malicious:false
                                    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm>3.g.R..............................................................................................................................................................................................................................................................................................................................................&..S........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):6.8058752742780575
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:Requested Documentation.exe
                                    File size:944'640 bytes
                                    MD5:dc6558b7b16a9d2db51d2f6b16396321
                                    SHA1:0dc5d607e934b68d8cf54e60e9baa942e289cf47
                                    SHA256:06cfeb5b6cee2d5348824125c7fd33dd0e1a9f08561115bdd8c9e260bdd37e93
                                    SHA512:41226a3e4d7e014d3eae45454243ae625e8797537681ecc9bd180c045005591222994f28413d0b6ef6f79fc89e27148c80a44d8aef0e6fed32e251265d209610
                                    SSDEEP:24576:/u6J33O0c+JY5UZ+XC0kGso6FajpXhWY:Ju0c++OCvkGs9FajCY
                                    TLSH:2415AD2273DDC360CB669173BF69B7016EBF3C610630B95B2F980D7DA950162162DBA3
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                    Icon Hash:aaf3e3e3938382a0
                                    Entrypoint:0x427dcd
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x6764AC08 [Thu Dec 19 23:28:08 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:1
                                    File Version Major:5
                                    File Version Minor:1
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:1
                                    Import Hash:afcdf79be1557326c854b6e20cb900a7
                                    Instruction
                                    call 00007FB5C483B8DAh
                                    jmp 00007FB5C482E6A4h
                                    int3
                                    int3
                                    int3
                                    int3
                                    int3
                                    int3
                                    int3
                                    int3
                                    int3
                                    push edi
                                    push esi
                                    mov esi, dword ptr [esp+10h]
                                    mov ecx, dword ptr [esp+14h]
                                    mov edi, dword ptr [esp+0Ch]
                                    mov eax, ecx
                                    mov edx, ecx
                                    add eax, esi
                                    cmp edi, esi
                                    jbe 00007FB5C482E82Ah
                                    cmp edi, eax
                                    jc 00007FB5C482EB8Eh
                                    bt dword ptr [004C31FCh], 01h
                                    jnc 00007FB5C482E829h
                                    rep movsb
                                    jmp 00007FB5C482EB3Ch
                                    cmp ecx, 00000080h
                                    jc 00007FB5C482E9F4h
                                    mov eax, edi
                                    xor eax, esi
                                    test eax, 0000000Fh
                                    jne 00007FB5C482E830h
                                    bt dword ptr [004BE324h], 01h
                                    jc 00007FB5C482ED00h
                                    bt dword ptr [004C31FCh], 00000000h
                                    jnc 00007FB5C482E9CDh
                                    test edi, 00000003h
                                    jne 00007FB5C482E9DEh
                                    test esi, 00000003h
                                    jne 00007FB5C482E9BDh
                                    bt edi, 02h
                                    jnc 00007FB5C482E82Fh
                                    mov eax, dword ptr [esi]
                                    sub ecx, 04h
                                    lea esi, dword ptr [esi+04h]
                                    mov dword ptr [edi], eax
                                    lea edi, dword ptr [edi+04h]
                                    bt edi, 03h
                                    jnc 00007FB5C482E833h
                                    movq xmm1, qword ptr [esi]
                                    sub ecx, 08h
                                    lea esi, dword ptr [esi+08h]
                                    movq qword ptr [edi], xmm1
                                    lea edi, dword ptr [edi+08h]
                                    test esi, 00000007h
                                    je 00007FB5C482E885h
                                    bt esi, 03h
                                    jnc 00007FB5C482E8D8h
                                    Programming Language:
                                    • [ASM] VS2013 build 21005
                                    • [ C ] VS2013 build 21005
                                    • [C++] VS2013 build 21005
                                    • [ C ] VS2008 SP1 build 30729
                                    • [IMP] VS2008 SP1 build 30729
                                    • [ASM] VS2013 UPD4 build 31101
                                    • [RES] VS2013 build 21005
                                    • [LNK] VS2013 UPD4 build 31101
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x1e0e0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xe60000x711c.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0xc70000x1e0e00x1e20015abe259214a9de9e3f330590c1144ddFalse0.7808366830912863data7.468415839485749IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xe60000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                    RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                    RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                    RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                    RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                    RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                    RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                    RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                    RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                    RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                    RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                    RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                    RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                    RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                    RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                    RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                    RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                    RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                    RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                    RT_RCDATA0xcf7b80x153a6data1.0004140310523288
                                    RT_GROUP_ICON0xe4b600x76dataEnglishGreat Britain0.6610169491525424
                                    RT_GROUP_ICON0xe4bd80x14dataEnglishGreat Britain1.25
                                    RT_GROUP_ICON0xe4bec0x14dataEnglishGreat Britain1.15
                                    RT_GROUP_ICON0xe4c000x14dataEnglishGreat Britain1.25
                                    RT_VERSION0xe4c140xdcdataEnglishGreat Britain0.6181818181818182
                                    RT_MANIFEST0xe4cf00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                    DLLImport
                                    WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                    VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                    MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                    WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                    PSAPI.DLLGetProcessMemoryInfo
                                    IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                    USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                    UxTheme.dllIsThemeActive
                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                    USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                    GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                    COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                    SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                    OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishGreat Britain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 20, 2024 10:06:04.878142118 CET4970480192.168.2.5158.101.44.242
                                    Dec 20, 2024 10:06:04.997791052 CET8049704158.101.44.242192.168.2.5
                                    Dec 20, 2024 10:06:04.999218941 CET4970480192.168.2.5158.101.44.242
                                    Dec 20, 2024 10:06:05.014261961 CET4970480192.168.2.5158.101.44.242
                                    Dec 20, 2024 10:06:05.133984089 CET8049704158.101.44.242192.168.2.5
                                    Dec 20, 2024 10:06:08.205394030 CET8049704158.101.44.242192.168.2.5
                                    Dec 20, 2024 10:06:08.257108927 CET4970480192.168.2.5158.101.44.242
                                    Dec 20, 2024 10:06:40.046217918 CET4970480192.168.2.5158.101.44.242
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 20, 2024 10:06:04.733529091 CET5562653192.168.2.51.1.1.1
                                    Dec 20, 2024 10:06:04.872591019 CET53556261.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 20, 2024 10:06:04.733529091 CET192.168.2.51.1.1.10x600bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 20, 2024 10:06:04.872591019 CET1.1.1.1192.168.2.50x600bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                    Dec 20, 2024 10:06:04.872591019 CET1.1.1.1192.168.2.50x600bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                    Dec 20, 2024 10:06:04.872591019 CET1.1.1.1192.168.2.50x600bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                    Dec 20, 2024 10:06:04.872591019 CET1.1.1.1192.168.2.50x600bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                    Dec 20, 2024 10:06:04.872591019 CET1.1.1.1192.168.2.50x600bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                    Dec 20, 2024 10:06:04.872591019 CET1.1.1.1192.168.2.50x600bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                    • checkip.dyndns.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549704158.101.44.242805480C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    TimestampBytes transferredDirectionData
                                    Dec 20, 2024 10:06:05.014261961 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Dec 20, 2024 10:06:08.205394030 CET730INHTTP/1.1 502 Bad Gateway
                                    Date: Fri, 20 Dec 2024 09:06:08 GMT
                                    Content-Type: text/html
                                    Content-Length: 547
                                    Connection: keep-alive
                                    X-Request-ID: c3604755eeb4cda64ef79486ed594356
                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                    Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:04:06:02
                                    Start date:20/12/2024
                                    Path:C:\Users\user\Desktop\Requested Documentation.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\Requested Documentation.exe"
                                    Imagebase:0x400000
                                    File size:944'640 bytes
                                    MD5 hash:DC6558B7B16A9D2DB51D2F6B16396321
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                    • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.2116607587.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                    Reputation:low
                                    Has exited:true

                                    Target ID:2
                                    Start time:04:06:03
                                    Start date:20/12/2024
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\Requested Documentation.exe"
                                    Imagebase:0x790000
                                    File size:45'984 bytes
                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2467905726.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:04:06:07
                                    Start date:20/12/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5480 -s 1476
                                    Imagebase:0x410000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:3.9%
                                      Dynamic/Decrypted Code Coverage:0.4%
                                      Signature Coverage:6.1%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:174
                                      execution_graph 100813 403633 100814 40366a 100813->100814 100815 4036e5 100814->100815 100816 4036e7 100814->100816 100817 403688 100814->100817 100818 4036ca DefWindowProcW 100815->100818 100819 4036ed 100816->100819 100820 43d0cc 100816->100820 100821 403695 100817->100821 100822 40374b PostQuitMessage 100817->100822 100823 4036d8 100818->100823 100824 4036f2 100819->100824 100825 403715 SetTimer RegisterWindowMessageW 100819->100825 100862 411070 10 API calls Mailbox 100820->100862 100827 4036a0 100821->100827 100828 43d154 100821->100828 100822->100823 100829 4036f9 KillTimer 100824->100829 100830 43d06f 100824->100830 100825->100823 100832 40373e CreatePopupMenu 100825->100832 100833 403755 100827->100833 100834 4036a8 100827->100834 100878 462527 71 API calls _memset 100828->100878 100858 40443a Shell_NotifyIconW _memset 100829->100858 100838 43d074 100830->100838 100839 43d0a8 MoveWindow 100830->100839 100831 43d0f3 100863 411093 341 API calls Mailbox 100831->100863 100832->100823 100860 4044a0 64 API calls _memset 100833->100860 100842 4036b3 100834->100842 100843 43d139 100834->100843 100836 43d166 100836->100818 100836->100823 100847 43d097 SetFocus 100838->100847 100848 43d078 100838->100848 100839->100823 100844 43d124 100842->100844 100845 4036be 100842->100845 100843->100818 100877 457c36 59 API calls Mailbox 100843->100877 100876 462d36 81 API calls _memset 100844->100876 100845->100818 100864 40443a Shell_NotifyIconW _memset 100845->100864 100846 403764 100846->100823 100847->100823 100848->100845 100850 43d081 100848->100850 100849 40370c 100859 403114 DeleteObject DestroyWindow Mailbox 100849->100859 100861 411070 10 API calls Mailbox 100850->100861 100856 43d118 100865 40434a 100856->100865 100858->100849 100859->100823 100860->100846 100861->100823 100862->100831 100863->100845 100864->100856 100866 404375 _memset 100865->100866 100879 404182 100866->100879 100870 404430 Shell_NotifyIconW 100873 404422 100870->100873 100871 404414 Shell_NotifyIconW 100871->100873 100872 4043fa 100872->100870 100872->100871 100883 40407c 100873->100883 100875 404429 100875->100815 100876->100846 100877->100815 100878->100836 100880 43d423 100879->100880 100881 404196 100879->100881 100880->100881 100882 43d42c DestroyIcon 100880->100882 100881->100872 100905 462f94 62 API calls _W_store_winword 100881->100905 100882->100881 100884 404098 100883->100884 100885 40416f Mailbox 100883->100885 100906 407a16 100884->100906 100885->100875 100888 4040b3 100911 407bcc 100888->100911 100889 43d3c8 LoadStringW 100892 43d3e2 100889->100892 100891 4040c8 100891->100892 100893 4040d9 100891->100893 100894 407b2e 59 API calls 100892->100894 100895 4040e3 100893->100895 100896 404174 100893->100896 100899 43d3ec 100894->100899 100920 407b2e 100895->100920 100929 408047 100896->100929 100902 4040ed _memset _wcscpy 100899->100902 100933 407cab 100899->100933 100901 43d40e 100904 407cab 59 API calls 100901->100904 100903 404155 Shell_NotifyIconW 100902->100903 100903->100885 100904->100902 100905->100872 100940 420db6 100906->100940 100908 407a3b 100950 408029 100908->100950 100912 407c45 100911->100912 100913 407bd8 __wsetenvp 100911->100913 100982 407d2c 100912->100982 100916 407c13 100913->100916 100917 407bee 100913->100917 100915 407bf6 _memmove 100915->100891 100919 408029 59 API calls 100916->100919 100981 407f27 59 API calls Mailbox 100917->100981 100919->100915 100921 407b40 100920->100921 100922 43ec6b 100920->100922 100990 407a51 100921->100990 100996 457bdb 59 API calls _memmove 100922->100996 100925 407b4c 100925->100902 100926 43ec75 100927 408047 59 API calls 100926->100927 100928 43ec7d Mailbox 100927->100928 100930 408052 100929->100930 100931 40805a 100929->100931 100997 407f77 59 API calls 2 library calls 100930->100997 100931->100902 100934 43ed4a 100933->100934 100935 407cbf 100933->100935 100937 408029 59 API calls 100934->100937 100998 407c50 100935->100998 100939 43ed55 __wsetenvp _memmove 100937->100939 100938 407cca 100938->100901 100943 420dbe 100940->100943 100942 420dd8 100942->100908 100943->100942 100945 420ddc std::exception::exception 100943->100945 100953 42571c 100943->100953 100970 4233a1 DecodePointer 100943->100970 100971 42859b RaiseException 100945->100971 100947 420e06 100972 4284d1 58 API calls _free 100947->100972 100949 420e18 100949->100908 100951 420db6 Mailbox 59 API calls 100950->100951 100952 4040a6 100951->100952 100952->100888 100952->100889 100954 425797 100953->100954 100964 425728 100953->100964 100979 4233a1 DecodePointer 100954->100979 100956 42579d 100980 428b28 58 API calls __getptd_noexit 100956->100980 100959 42575b RtlAllocateHeap 100960 42578f 100959->100960 100959->100964 100960->100943 100962 425733 100962->100964 100973 42a16b 58 API calls 2 library calls 100962->100973 100974 42a1c8 58 API calls 8 library calls 100962->100974 100975 42309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100962->100975 100963 425783 100977 428b28 58 API calls __getptd_noexit 100963->100977 100964->100959 100964->100962 100964->100963 100968 425781 100964->100968 100976 4233a1 DecodePointer 100964->100976 100978 428b28 58 API calls __getptd_noexit 100968->100978 100970->100943 100971->100947 100972->100949 100973->100962 100974->100962 100976->100964 100977->100968 100978->100960 100979->100956 100980->100960 100981->100915 100983 407d43 _memmove 100982->100983 100984 407d3a 100982->100984 100983->100915 100984->100983 100986 407e4f 100984->100986 100987 407e62 100986->100987 100988 407e5f _memmove 100986->100988 100989 420db6 Mailbox 59 API calls 100987->100989 100988->100983 100989->100988 100991 407a85 _memmove 100990->100991 100992 407a5f 100990->100992 100991->100925 100991->100991 100992->100991 100993 420db6 Mailbox 59 API calls 100992->100993 100994 407ad4 100993->100994 100995 420db6 Mailbox 59 API calls 100994->100995 100995->100991 100996->100926 100997->100931 100999 407c5f __wsetenvp 100998->100999 101000 408029 59 API calls 100999->101000 101001 407c70 _memmove 100999->101001 101002 43ed07 _memmove 101000->101002 101001->100938 101003 427c56 101004 427c62 __lseeki64 101003->101004 101040 429e08 GetStartupInfoW 101004->101040 101006 427c67 101042 428b7c GetProcessHeap 101006->101042 101008 427cbf 101009 427cca 101008->101009 101125 427da6 58 API calls 3 library calls 101008->101125 101043 429ae6 101009->101043 101012 427cd0 101013 427cdb __RTC_Initialize 101012->101013 101126 427da6 58 API calls 3 library calls 101012->101126 101064 42d5d2 101013->101064 101016 427cea 101017 427cf6 GetCommandLineW 101016->101017 101127 427da6 58 API calls 3 library calls 101016->101127 101083 434f23 GetEnvironmentStringsW 101017->101083 101020 427cf5 101020->101017 101023 427d10 101024 427d1b 101023->101024 101128 4230b5 58 API calls 3 library calls 101023->101128 101093 434d58 101024->101093 101027 427d21 101028 427d2c 101027->101028 101129 4230b5 58 API calls 3 library calls 101027->101129 101107 4230ef 101028->101107 101031 427d34 101032 427d3f __wwincmdln 101031->101032 101130 4230b5 58 API calls 3 library calls 101031->101130 101113 4047d0 101032->101113 101035 427d53 101036 427d62 101035->101036 101131 423358 58 API calls _doexit 101035->101131 101132 4230e0 58 API calls _doexit 101036->101132 101039 427d67 __lseeki64 101041 429e1e 101040->101041 101041->101006 101042->101008 101133 423187 36 API calls 2 library calls 101043->101133 101045 429aeb 101134 429d3c InitializeCriticalSectionAndSpinCount __mtinitlocks 101045->101134 101047 429af0 101048 429af4 101047->101048 101136 429d8a TlsAlloc 101047->101136 101135 429b5c 61 API calls 2 library calls 101048->101135 101051 429af9 101051->101012 101052 429b06 101052->101048 101053 429b11 101052->101053 101137 4287d5 101053->101137 101056 429b53 101145 429b5c 61 API calls 2 library calls 101056->101145 101059 429b32 101059->101056 101061 429b38 101059->101061 101060 429b58 101060->101012 101144 429a33 58 API calls 4 library calls 101061->101144 101063 429b40 GetCurrentThreadId 101063->101012 101065 42d5de __lseeki64 101064->101065 101157 429c0b 101065->101157 101067 42d5e5 101068 4287d5 __calloc_crt 58 API calls 101067->101068 101069 42d5f6 101068->101069 101070 42d661 GetStartupInfoW 101069->101070 101072 42d601 __lseeki64 @_EH4_CallFilterFunc@8 101069->101072 101071 42d676 101070->101071 101080 42d7a5 101070->101080 101075 4287d5 __calloc_crt 58 API calls 101071->101075 101078 42d6c4 101071->101078 101071->101080 101072->101016 101073 42d86d 101166 42d87d LeaveCriticalSection _doexit 101073->101166 101075->101071 101076 42d7f2 GetStdHandle 101076->101080 101077 42d805 GetFileType 101077->101080 101079 42d6f8 GetFileType 101078->101079 101078->101080 101164 429e2b InitializeCriticalSectionAndSpinCount 101078->101164 101079->101078 101080->101073 101080->101076 101080->101077 101165 429e2b InitializeCriticalSectionAndSpinCount 101080->101165 101084 434f34 101083->101084 101085 427d06 101083->101085 101206 42881d 58 API calls 2 library calls 101084->101206 101089 434b1b GetModuleFileNameW 101085->101089 101087 434f5a _memmove 101088 434f70 FreeEnvironmentStringsW 101087->101088 101088->101085 101090 434b4f _wparse_cmdline 101089->101090 101092 434b8f _wparse_cmdline 101090->101092 101207 42881d 58 API calls 2 library calls 101090->101207 101092->101023 101094 434d71 __wsetenvp 101093->101094 101098 434d69 101093->101098 101095 4287d5 __calloc_crt 58 API calls 101094->101095 101103 434d9a __wsetenvp 101095->101103 101096 434df1 101097 422d55 _free 58 API calls 101096->101097 101097->101098 101098->101027 101099 4287d5 __calloc_crt 58 API calls 101099->101103 101100 434e16 101101 422d55 _free 58 API calls 101100->101101 101101->101098 101103->101096 101103->101098 101103->101099 101103->101100 101104 434e2d 101103->101104 101208 434607 58 API calls 2 library calls 101103->101208 101209 428dc6 IsProcessorFeaturePresent 101104->101209 101106 434e39 101106->101027 101108 4230fb __IsNonwritableInCurrentImage 101107->101108 101232 42a4d1 101108->101232 101110 423119 __initterm_e 101112 423138 __cinit __IsNonwritableInCurrentImage 101110->101112 101235 422d40 101110->101235 101112->101031 101114 4047ea 101113->101114 101115 404889 101113->101115 101116 404824 IsThemeActive 101114->101116 101115->101035 101270 42336c 101116->101270 101120 404850 101282 4048fd SystemParametersInfoW SystemParametersInfoW 101120->101282 101122 40485c 101283 403b3a 101122->101283 101124 404864 SystemParametersInfoW 101124->101115 101125->101009 101126->101013 101127->101020 101131->101036 101132->101039 101133->101045 101134->101047 101135->101051 101136->101052 101139 4287dc 101137->101139 101140 428817 101139->101140 101141 4287fa 101139->101141 101146 4351f6 101139->101146 101140->101056 101143 429de6 TlsSetValue 101140->101143 101141->101139 101141->101140 101154 42a132 Sleep 101141->101154 101143->101059 101144->101063 101145->101060 101147 435201 101146->101147 101153 43521c 101146->101153 101148 43520d 101147->101148 101147->101153 101155 428b28 58 API calls __getptd_noexit 101148->101155 101149 43522c HeapAlloc 101151 435212 101149->101151 101149->101153 101151->101139 101153->101149 101153->101151 101156 4233a1 DecodePointer 101153->101156 101154->101141 101155->101151 101156->101153 101158 429c2f EnterCriticalSection 101157->101158 101159 429c1c 101157->101159 101158->101067 101167 429c93 101159->101167 101161 429c22 101161->101158 101191 4230b5 58 API calls 3 library calls 101161->101191 101164->101078 101165->101080 101166->101072 101168 429c9f __lseeki64 101167->101168 101169 429cc0 101168->101169 101170 429ca8 101168->101170 101174 429ce1 __lseeki64 101169->101174 101195 42881d 58 API calls 2 library calls 101169->101195 101192 42a16b 58 API calls 2 library calls 101170->101192 101172 429cad 101193 42a1c8 58 API calls 8 library calls 101172->101193 101174->101161 101176 429cd5 101177 429ceb 101176->101177 101178 429cdc 101176->101178 101181 429c0b __lock 58 API calls 101177->101181 101196 428b28 58 API calls __getptd_noexit 101178->101196 101179 429cb4 101194 42309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101179->101194 101183 429cf2 101181->101183 101185 429d17 101183->101185 101186 429cff 101183->101186 101198 422d55 101185->101198 101197 429e2b InitializeCriticalSectionAndSpinCount 101186->101197 101189 429d0b 101204 429d33 LeaveCriticalSection _doexit 101189->101204 101192->101172 101193->101179 101195->101176 101196->101174 101197->101189 101199 422d87 _free 101198->101199 101200 422d5e RtlFreeHeap 101198->101200 101199->101189 101200->101199 101201 422d73 101200->101201 101205 428b28 58 API calls __getptd_noexit 101201->101205 101203 422d79 GetLastError 101203->101199 101204->101174 101205->101203 101206->101087 101207->101092 101208->101103 101210 428dd1 101209->101210 101215 428c59 101210->101215 101214 428dec 101214->101106 101216 428c73 _memset ___raise_securityfailure 101215->101216 101217 428c93 IsDebuggerPresent 101216->101217 101223 42a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 101217->101223 101220 428d57 ___raise_securityfailure 101224 42c5f6 101220->101224 101221 428d7a 101222 42a140 GetCurrentProcess TerminateProcess 101221->101222 101222->101214 101223->101220 101225 42c600 IsProcessorFeaturePresent 101224->101225 101226 42c5fe 101224->101226 101228 43590a 101225->101228 101226->101221 101231 4358b9 5 API calls ___raise_securityfailure 101228->101231 101230 4359ed 101230->101221 101231->101230 101233 42a4d4 EncodePointer 101232->101233 101233->101233 101234 42a4ee 101233->101234 101234->101110 101238 422c44 101235->101238 101237 422d4b 101237->101112 101239 422c50 __lseeki64 101238->101239 101246 423217 101239->101246 101245 422c77 __lseeki64 101245->101237 101247 429c0b __lock 58 API calls 101246->101247 101248 422c59 101247->101248 101249 422c88 DecodePointer DecodePointer 101248->101249 101250 422c65 101249->101250 101251 422cb5 101249->101251 101260 422c82 101250->101260 101251->101250 101263 4287a4 59 API calls 2 library calls 101251->101263 101253 422d18 EncodePointer EncodePointer 101253->101250 101254 422cec 101254->101250 101259 422d06 EncodePointer 101254->101259 101265 428864 61 API calls __realloc_crt 101254->101265 101255 422cc7 101255->101253 101255->101254 101264 428864 61 API calls __realloc_crt 101255->101264 101258 422d00 101258->101250 101258->101259 101259->101253 101266 423220 101260->101266 101263->101255 101264->101254 101265->101258 101269 429d75 LeaveCriticalSection 101266->101269 101268 422c87 101268->101245 101269->101268 101271 429c0b __lock 58 API calls 101270->101271 101272 423377 DecodePointer EncodePointer 101271->101272 101335 429d75 LeaveCriticalSection 101272->101335 101274 404849 101275 4233d4 101274->101275 101276 4233f8 101275->101276 101277 4233de 101275->101277 101276->101120 101277->101276 101336 428b28 58 API calls __getptd_noexit 101277->101336 101279 4233e8 101337 428db6 9 API calls __woutput_l 101279->101337 101281 4233f3 101281->101120 101282->101122 101284 403b47 __write_nolock 101283->101284 101338 407667 101284->101338 101288 403b7a IsDebuggerPresent 101289 43d272 MessageBoxA 101288->101289 101290 403b88 101288->101290 101293 43d28c 101289->101293 101291 403c61 101290->101291 101290->101293 101294 403ba5 101290->101294 101292 403c68 SetCurrentDirectoryW 101291->101292 101297 403c75 Mailbox 101292->101297 101542 407213 59 API calls Mailbox 101293->101542 101424 407285 101294->101424 101297->101124 101298 43d29c 101303 43d2b2 SetCurrentDirectoryW 101298->101303 101300 403bc3 GetFullPathNameW 101301 407bcc 59 API calls 101300->101301 101302 403bfe 101301->101302 101440 41092d 101302->101440 101303->101297 101306 403c1c 101307 403c26 101306->101307 101543 45874b AllocateAndInitializeSid CheckTokenMembership FreeSid 101306->101543 101456 403a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 101307->101456 101311 43d2cf 101311->101307 101313 43d2e0 101311->101313 101544 404706 101313->101544 101335->101274 101336->101279 101337->101281 101339 420db6 Mailbox 59 API calls 101338->101339 101340 407688 101339->101340 101341 420db6 Mailbox 59 API calls 101340->101341 101342 403b51 GetCurrentDirectoryW 101341->101342 101343 403766 101342->101343 101344 407667 59 API calls 101343->101344 101345 40377c 101344->101345 101555 403d31 101345->101555 101347 40379a 101348 404706 61 API calls 101347->101348 101349 4037ae 101348->101349 101350 407de1 59 API calls 101349->101350 101351 4037bb 101350->101351 101569 404ddd 101351->101569 101354 43d173 101636 46955b 101354->101636 101355 4037dc Mailbox 101359 408047 59 API calls 101355->101359 101358 43d192 101362 422d55 _free 58 API calls 101358->101362 101360 4037ef 101359->101360 101593 40928a 101360->101593 101363 43d19f 101362->101363 101365 404e4a 84 API calls 101363->101365 101367 43d1a8 101365->101367 101371 403ed0 59 API calls 101367->101371 101368 407de1 59 API calls 101369 403808 101368->101369 101596 4084c0 101369->101596 101373 43d1c3 101371->101373 101372 40381a Mailbox 101374 407de1 59 API calls 101372->101374 101375 403ed0 59 API calls 101373->101375 101376 403840 101374->101376 101377 43d1df 101375->101377 101378 4084c0 69 API calls 101376->101378 101379 404706 61 API calls 101377->101379 101381 40384f Mailbox 101378->101381 101380 43d204 101379->101380 101382 403ed0 59 API calls 101380->101382 101384 407667 59 API calls 101381->101384 101383 43d210 101382->101383 101385 408047 59 API calls 101383->101385 101386 40386d 101384->101386 101387 43d21e 101385->101387 101600 403ed0 101386->101600 101389 403ed0 59 API calls 101387->101389 101391 43d22d 101389->101391 101397 408047 59 API calls 101391->101397 101393 403887 101393->101367 101394 403891 101393->101394 101395 422efd _W_store_winword 60 API calls 101394->101395 101396 40389c 101395->101396 101396->101373 101398 4038a6 101396->101398 101399 43d24f 101397->101399 101400 422efd _W_store_winword 60 API calls 101398->101400 101401 403ed0 59 API calls 101399->101401 101402 4038b1 101400->101402 101403 43d25c 101401->101403 101402->101377 101404 4038bb 101402->101404 101403->101403 101405 422efd _W_store_winword 60 API calls 101404->101405 101406 4038c6 101405->101406 101406->101391 101407 403907 101406->101407 101409 403ed0 59 API calls 101406->101409 101407->101391 101408 403914 101407->101408 101616 4092ce 101408->101616 101410 4038ea 101409->101410 101412 408047 59 API calls 101410->101412 101414 4038f8 101412->101414 101416 403ed0 59 API calls 101414->101416 101416->101407 101419 40928a 59 API calls 101421 40394f 101419->101421 101420 408ee0 60 API calls 101420->101421 101421->101419 101421->101420 101422 403ed0 59 API calls 101421->101422 101423 403995 Mailbox 101421->101423 101422->101421 101423->101288 101425 407292 __write_nolock 101424->101425 101426 43ea22 _memset 101425->101426 101427 4072ab 101425->101427 101430 43ea3e GetOpenFileNameW 101426->101430 102501 404750 101427->102501 101431 43ea8d 101430->101431 101433 407bcc 59 API calls 101431->101433 101435 43eaa2 101433->101435 101435->101435 101437 4072c9 102529 40686a 101437->102529 101441 41093a __write_nolock 101440->101441 102850 406d80 101441->102850 101443 41093f 101444 403c14 101443->101444 102861 41119e 89 API calls 101443->102861 101444->101298 101444->101306 101446 41094c 101446->101444 102862 413ee7 91 API calls Mailbox 101446->102862 101448 410955 101448->101444 101449 410959 GetFullPathNameW 101448->101449 101450 407bcc 59 API calls 101449->101450 101451 410985 101450->101451 101457 403ab0 LoadImageW RegisterClassExW 101456->101457 101458 43d261 101456->101458 102895 403041 7 API calls 101457->102895 102896 4047a0 LoadImageW EnumResourceNamesW 101458->102896 101461 403b34 101462 43d26a 101542->101298 101543->101311 101545 431940 __write_nolock 101544->101545 101556 403d3e __write_nolock 101555->101556 101557 407bcc 59 API calls 101556->101557 101562 403ea4 Mailbox 101556->101562 101559 403d70 101557->101559 101568 403da6 Mailbox 101559->101568 101677 4079f2 101559->101677 101560 4079f2 59 API calls 101560->101568 101561 403e77 101561->101562 101563 407de1 59 API calls 101561->101563 101562->101347 101565 403e98 101563->101565 101564 407de1 59 API calls 101564->101568 101566 403f74 59 API calls 101565->101566 101566->101562 101568->101560 101568->101561 101568->101562 101568->101564 101680 403f74 101568->101680 101686 404bb5 101569->101686 101574 43d8e6 101577 404e4a 84 API calls 101574->101577 101575 404e08 LoadLibraryExW 101696 404b6a 101575->101696 101579 43d8ed 101577->101579 101581 404b6a 3 API calls 101579->101581 101583 43d8f5 101581->101583 101582 404e2f 101582->101583 101584 404e3b 101582->101584 101722 404f0b 101583->101722 101586 404e4a 84 API calls 101584->101586 101588 4037d4 101586->101588 101588->101354 101588->101355 101590 43d91c 101730 404ec7 101590->101730 101592 43d929 101594 420db6 Mailbox 59 API calls 101593->101594 101595 4037fb 101594->101595 101595->101368 101597 4084cb 101596->101597 101599 4084f2 101597->101599 102160 4089b3 69 API calls Mailbox 101597->102160 101599->101372 101601 403ef3 101600->101601 101602 403eda 101600->101602 101604 407bcc 59 API calls 101601->101604 101603 408047 59 API calls 101602->101603 101605 403879 101603->101605 101604->101605 101606 422efd 101605->101606 101607 422f09 101606->101607 101608 422f7e 101606->101608 101615 422f2e 101607->101615 102161 428b28 58 API calls __getptd_noexit 101607->102161 102163 422f90 60 API calls 4 library calls 101608->102163 101611 422f8b 101611->101393 101612 422f15 102162 428db6 9 API calls __woutput_l 101612->102162 101614 422f20 101614->101393 101615->101393 101617 4092d6 101616->101617 101618 420db6 Mailbox 59 API calls 101617->101618 101619 4092e4 101618->101619 101620 403924 101619->101620 102164 4091fc 59 API calls Mailbox 101619->102164 101622 409050 101620->101622 102165 409160 101622->102165 101624 40905f 101625 420db6 Mailbox 59 API calls 101624->101625 101626 403932 101624->101626 101625->101626 101627 408ee0 101626->101627 101628 43f17c 101627->101628 101632 408ef7 101627->101632 101628->101632 102175 408bdb 59 API calls Mailbox 101628->102175 101630 409040 102174 409d3c 60 API calls Mailbox 101630->102174 101631 408ff8 101633 420db6 Mailbox 59 API calls 101631->101633 101632->101630 101632->101631 101635 408fff 101632->101635 101633->101635 101635->101421 101637 404ee5 85 API calls 101636->101637 101638 4695ca 101637->101638 102176 469734 101638->102176 101641 404f0b 74 API calls 101642 4695f7 101641->101642 101643 404f0b 74 API calls 101642->101643 101644 469607 101643->101644 101645 404f0b 74 API calls 101644->101645 101646 469622 101645->101646 101647 404f0b 74 API calls 101646->101647 101648 46963d 101647->101648 101649 404ee5 85 API calls 101648->101649 101650 469654 101649->101650 101651 42571c _W_store_winword 58 API calls 101650->101651 101652 46965b 101651->101652 101653 42571c _W_store_winword 58 API calls 101652->101653 101654 469665 101653->101654 101655 404f0b 74 API calls 101654->101655 101656 469679 101655->101656 101657 469109 GetSystemTimeAsFileTime 101656->101657 101658 46968c 101657->101658 101659 4696b6 101658->101659 101660 4696a1 101658->101660 101662 4696bc 101659->101662 101663 46971b 101659->101663 101661 422d55 _free 58 API calls 101660->101661 101664 4696a7 101661->101664 102182 468b06 101662->102182 101666 422d55 _free 58 API calls 101663->101666 101667 422d55 _free 58 API calls 101664->101667 101669 43d186 101666->101669 101667->101669 101669->101358 101671 404e4a 101669->101671 101670 422d55 _free 58 API calls 101670->101669 101672 404e54 101671->101672 101673 404e5b 101671->101673 101674 4253a6 __fcloseall 83 API calls 101672->101674 101675 404e6a 101673->101675 101676 404e7b FreeLibrary 101673->101676 101674->101673 101675->101358 101676->101675 101678 407e4f 59 API calls 101677->101678 101679 4079fd 101678->101679 101679->101559 101681 403f82 101680->101681 101685 403fa4 _memmove 101680->101685 101683 420db6 Mailbox 59 API calls 101681->101683 101682 420db6 Mailbox 59 API calls 101684 403fb8 101682->101684 101683->101685 101684->101568 101685->101682 101735 404c03 101686->101735 101689 404bf5 101693 42525b 101689->101693 101690 404bec FreeLibrary 101690->101689 101691 404c03 2 API calls 101692 404bdc 101691->101692 101692->101689 101692->101690 101739 425270 101693->101739 101695 404dfc 101695->101574 101695->101575 101897 404c36 101696->101897 101699 404b8f 101701 404ba1 FreeLibrary 101699->101701 101702 404baa 101699->101702 101700 404c36 2 API calls 101700->101699 101701->101702 101703 404c70 101702->101703 101704 420db6 Mailbox 59 API calls 101703->101704 101705 404c85 101704->101705 101901 40522e 101705->101901 101707 404c91 _memmove 101708 404ccc 101707->101708 101709 404dc1 101707->101709 101710 404d89 101707->101710 101711 404ec7 69 API calls 101708->101711 101915 46991b 95 API calls 101709->101915 101904 404e89 CreateStreamOnHGlobal 101710->101904 101718 404cd5 101711->101718 101714 404f0b 74 API calls 101714->101718 101715 404d69 101715->101582 101717 43d8a7 101719 404ee5 85 API calls 101717->101719 101718->101714 101718->101715 101718->101717 101910 404ee5 101718->101910 101720 43d8bb 101719->101720 101721 404f0b 74 API calls 101720->101721 101721->101715 101723 404f1d 101722->101723 101724 43d9cd 101722->101724 101939 4255e2 101723->101939 101727 469109 102137 468f5f 101727->102137 101729 46911f 101729->101590 101731 43d990 101730->101731 101732 404ed6 101730->101732 102142 425c60 101732->102142 101734 404ede 101734->101592 101736 404bd0 101735->101736 101737 404c0c LoadLibraryA 101735->101737 101736->101691 101736->101692 101737->101736 101738 404c1d GetProcAddress 101737->101738 101738->101736 101742 42527c __lseeki64 101739->101742 101740 42528f 101788 428b28 58 API calls __getptd_noexit 101740->101788 101742->101740 101744 4252c0 101742->101744 101743 425294 101789 428db6 9 API calls __woutput_l 101743->101789 101758 4304e8 101744->101758 101747 4252c5 101748 4252db 101747->101748 101749 4252ce 101747->101749 101750 425305 101748->101750 101751 4252e5 101748->101751 101790 428b28 58 API calls __getptd_noexit 101749->101790 101773 430607 101750->101773 101791 428b28 58 API calls __getptd_noexit 101751->101791 101755 42529f __lseeki64 @_EH4_CallFilterFunc@8 101755->101695 101759 4304f4 __lseeki64 101758->101759 101760 429c0b __lock 58 API calls 101759->101760 101771 430502 101760->101771 101761 430576 101793 4305fe 101761->101793 101762 43057d 101798 42881d 58 API calls 2 library calls 101762->101798 101765 4305f3 __lseeki64 101765->101747 101766 430584 101766->101761 101799 429e2b InitializeCriticalSectionAndSpinCount 101766->101799 101768 429c93 __mtinitlocknum 58 API calls 101768->101771 101770 4305aa EnterCriticalSection 101770->101761 101771->101761 101771->101762 101771->101768 101796 426c50 59 API calls __lock 101771->101796 101797 426cba LeaveCriticalSection LeaveCriticalSection _doexit 101771->101797 101782 430627 __wopenfile 101773->101782 101774 430641 101804 428b28 58 API calls __getptd_noexit 101774->101804 101776 4307fc 101776->101774 101780 43085f 101776->101780 101777 430646 101805 428db6 9 API calls __woutput_l 101777->101805 101779 425310 101792 425332 LeaveCriticalSection LeaveCriticalSection __wfsopen 101779->101792 101801 4385a1 101780->101801 101782->101774 101782->101776 101806 4237cb 60 API calls 3 library calls 101782->101806 101784 4307f5 101784->101776 101807 4237cb 60 API calls 3 library calls 101784->101807 101786 430814 101786->101776 101808 4237cb 60 API calls 3 library calls 101786->101808 101788->101743 101789->101755 101790->101755 101791->101755 101792->101755 101800 429d75 LeaveCriticalSection 101793->101800 101795 430605 101795->101765 101796->101771 101797->101771 101798->101766 101799->101770 101800->101795 101809 437d85 101801->101809 101803 4385ba 101803->101779 101804->101777 101805->101779 101806->101784 101807->101786 101808->101776 101812 437d91 __lseeki64 101809->101812 101810 437da7 101894 428b28 58 API calls __getptd_noexit 101810->101894 101812->101810 101814 437ddd 101812->101814 101813 437dac 101895 428db6 9 API calls __woutput_l 101813->101895 101820 437e4e 101814->101820 101817 437df9 101896 437e22 LeaveCriticalSection __unlock_fhandle 101817->101896 101819 437db6 __lseeki64 101819->101803 101821 437e6e 101820->101821 101822 4244ea __wsopen_nolock 58 API calls 101821->101822 101825 437e8a 101822->101825 101823 428dc6 __invoke_watson 8 API calls 101824 4385a0 101823->101824 101827 437d85 __wsopen_helper 103 API calls 101824->101827 101826 437ec4 101825->101826 101838 437ee7 101825->101838 101842 437fc1 101825->101842 101828 428af4 __lseeki64 58 API calls 101826->101828 101829 4385ba 101827->101829 101830 437ec9 101828->101830 101829->101817 101831 428b28 ___libm_error_support 58 API calls 101830->101831 101832 437ed6 101831->101832 101834 428db6 __woutput_l 9 API calls 101832->101834 101833 437fa5 101835 428af4 __lseeki64 58 API calls 101833->101835 101863 437ee0 101834->101863 101837 437faa 101835->101837 101836 437f83 101843 42d294 __alloc_osfhnd 61 API calls 101836->101843 101839 428b28 ___libm_error_support 58 API calls 101837->101839 101838->101833 101838->101836 101840 437fb7 101839->101840 101841 428db6 __woutput_l 9 API calls 101840->101841 101841->101842 101842->101823 101844 438051 101843->101844 101845 43805b 101844->101845 101846 43807e 101844->101846 101848 428af4 __lseeki64 58 API calls 101845->101848 101847 437cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101846->101847 101857 4380a0 101847->101857 101849 438060 101848->101849 101851 428b28 ___libm_error_support 58 API calls 101849->101851 101850 43811e GetFileType 101852 43816b 101850->101852 101853 438129 GetLastError 101850->101853 101855 43806a 101851->101855 101866 42d52a __set_osfhnd 59 API calls 101852->101866 101856 428b07 __dosmaperr 58 API calls 101853->101856 101854 4380ec GetLastError 101858 428b07 __dosmaperr 58 API calls 101854->101858 101859 428b28 ___libm_error_support 58 API calls 101855->101859 101860 438150 CloseHandle 101856->101860 101857->101850 101857->101854 101861 437cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101857->101861 101862 438111 101858->101862 101859->101863 101860->101862 101864 43815e 101860->101864 101865 4380e1 101861->101865 101868 428b28 ___libm_error_support 58 API calls 101862->101868 101863->101817 101867 428b28 ___libm_error_support 58 API calls 101864->101867 101865->101850 101865->101854 101871 438189 101866->101871 101869 438163 101867->101869 101868->101842 101869->101862 101870 438344 101870->101842 101874 438517 CloseHandle 101870->101874 101871->101870 101872 4318c1 __lseeki64_nolock 60 API calls 101871->101872 101889 43820a 101871->101889 101873 4381f3 101872->101873 101877 428af4 __lseeki64 58 API calls 101873->101877 101873->101889 101875 437cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101874->101875 101876 43853e 101875->101876 101879 438546 GetLastError 101876->101879 101880 438572 101876->101880 101877->101889 101878 430e5b 70 API calls __read_nolock 101878->101889 101881 428b07 __dosmaperr 58 API calls 101879->101881 101880->101842 101882 438552 101881->101882 101885 42d43d __free_osfhnd 59 API calls 101882->101885 101883 430add __close_nolock 61 API calls 101883->101889 101884 43823c 101886 4397a2 __chsize_nolock 82 API calls 101884->101886 101884->101889 101885->101880 101886->101884 101887 42d886 __write 78 API calls 101887->101889 101888 4383c1 101890 430add __close_nolock 61 API calls 101888->101890 101889->101870 101889->101878 101889->101883 101889->101884 101889->101887 101889->101888 101891 4318c1 60 API calls __lseeki64_nolock 101889->101891 101892 4383c8 101890->101892 101891->101889 101893 428b28 ___libm_error_support 58 API calls 101892->101893 101893->101842 101894->101813 101895->101819 101896->101819 101898 404b83 101897->101898 101899 404c3f LoadLibraryA 101897->101899 101898->101699 101898->101700 101899->101898 101900 404c50 GetProcAddress 101899->101900 101900->101898 101902 420db6 Mailbox 59 API calls 101901->101902 101903 405240 101902->101903 101903->101707 101905 404ea3 FindResourceExW 101904->101905 101909 404ec0 101904->101909 101906 43d933 LoadResource 101905->101906 101905->101909 101907 43d948 SizeofResource 101906->101907 101906->101909 101908 43d95c LockResource 101907->101908 101907->101909 101908->101909 101909->101708 101911 404ef4 101910->101911 101912 43d9ab 101910->101912 101916 42584d 101911->101916 101914 404f02 101914->101718 101915->101708 101920 425859 __lseeki64 101916->101920 101917 42586b 101929 428b28 58 API calls __getptd_noexit 101917->101929 101919 425891 101931 426c11 101919->101931 101920->101917 101920->101919 101921 425870 101930 428db6 9 API calls __woutput_l 101921->101930 101924 425897 101937 4257be 83 API calls 5 library calls 101924->101937 101926 4258a6 101938 4258c8 LeaveCriticalSection LeaveCriticalSection __wfsopen 101926->101938 101928 42587b __lseeki64 101928->101914 101929->101921 101930->101928 101932 426c43 EnterCriticalSection 101931->101932 101933 426c21 101931->101933 101934 426c39 101932->101934 101933->101932 101935 426c29 101933->101935 101934->101924 101936 429c0b __lock 58 API calls 101935->101936 101936->101934 101937->101926 101938->101928 101942 4255fd 101939->101942 101941 404f2e 101941->101727 101943 425609 __lseeki64 101942->101943 101944 42561f _memset 101943->101944 101945 42564c 101943->101945 101946 425644 __lseeki64 101943->101946 101969 428b28 58 API calls __getptd_noexit 101944->101969 101947 426c11 __lock_file 59 API calls 101945->101947 101946->101941 101948 425652 101947->101948 101955 42541d 101948->101955 101951 425639 101970 428db6 9 API calls __woutput_l 101951->101970 101956 425453 101955->101956 101959 425438 _memset 101955->101959 101971 425686 LeaveCriticalSection LeaveCriticalSection __wfsopen 101956->101971 101957 425443 102067 428b28 58 API calls __getptd_noexit 101957->102067 101959->101956 101959->101957 101961 425493 101959->101961 101961->101956 101966 4255a4 _memset 101961->101966 101972 4246e6 101961->101972 101979 430e5b 101961->101979 102047 430ba7 101961->102047 102069 430cc8 58 API calls 4 library calls 101961->102069 102070 428b28 58 API calls __getptd_noexit 101966->102070 101968 425448 102068 428db6 9 API calls __woutput_l 101968->102068 101969->101951 101970->101946 101971->101946 101973 4246f0 101972->101973 101974 424705 101972->101974 102071 428b28 58 API calls __getptd_noexit 101973->102071 101974->101961 101976 4246f5 102072 428db6 9 API calls __woutput_l 101976->102072 101978 424700 101978->101961 101980 430e93 101979->101980 101981 430e7c 101979->101981 101983 4315cb 101980->101983 101988 430ecd 101980->101988 102082 428af4 58 API calls __getptd_noexit 101981->102082 102098 428af4 58 API calls __getptd_noexit 101983->102098 101985 430e81 102083 428b28 58 API calls __getptd_noexit 101985->102083 101986 4315d0 102099 428b28 58 API calls __getptd_noexit 101986->102099 101990 430ed5 101988->101990 101996 430eec 101988->101996 102084 428af4 58 API calls __getptd_noexit 101990->102084 101991 430ee1 102100 428db6 9 API calls __woutput_l 101991->102100 101993 430eda 102085 428b28 58 API calls __getptd_noexit 101993->102085 101995 430f01 102086 428af4 58 API calls __getptd_noexit 101995->102086 101996->101995 101999 430f1b 101996->101999 102000 430f39 101996->102000 102027 430e88 101996->102027 101999->101995 102004 430f26 101999->102004 102087 42881d 58 API calls 2 library calls 102000->102087 102002 430f49 102005 430f51 102002->102005 102006 430f6c 102002->102006 102073 435c6b 102004->102073 102088 428b28 58 API calls __getptd_noexit 102005->102088 102090 4318c1 60 API calls 3 library calls 102006->102090 102007 43103a 102009 4310b3 ReadFile 102007->102009 102014 431050 GetConsoleMode 102007->102014 102012 431593 GetLastError 102009->102012 102013 4310d5 102009->102013 102011 430f56 102089 428af4 58 API calls __getptd_noexit 102011->102089 102016 4315a0 102012->102016 102017 431093 102012->102017 102013->102012 102021 4310a5 102013->102021 102018 4310b0 102014->102018 102019 431064 102014->102019 102096 428b28 58 API calls __getptd_noexit 102016->102096 102029 431099 102017->102029 102091 428b07 58 API calls 3 library calls 102017->102091 102018->102009 102019->102018 102022 43106a ReadConsoleW 102019->102022 102021->102029 102030 43110a 102021->102030 102031 431377 102021->102031 102022->102021 102024 43108d GetLastError 102022->102024 102023 4315a5 102097 428af4 58 API calls __getptd_noexit 102023->102097 102024->102017 102027->101961 102028 422d55 _free 58 API calls 102028->102027 102029->102027 102029->102028 102033 431176 ReadFile 102030->102033 102038 4311f7 102030->102038 102031->102029 102037 43147d ReadFile 102031->102037 102034 431197 GetLastError 102033->102034 102045 4311a1 102033->102045 102034->102045 102035 4312b4 102041 431264 MultiByteToWideChar 102035->102041 102094 4318c1 60 API calls 3 library calls 102035->102094 102036 4312a4 102093 428b28 58 API calls __getptd_noexit 102036->102093 102040 4314a0 GetLastError 102037->102040 102046 4314ae 102037->102046 102038->102029 102038->102035 102038->102036 102038->102041 102040->102046 102041->102024 102041->102029 102045->102030 102092 4318c1 60 API calls 3 library calls 102045->102092 102046->102031 102095 4318c1 60 API calls 3 library calls 102046->102095 102048 430bb2 102047->102048 102049 430bc7 102047->102049 102134 428b28 58 API calls __getptd_noexit 102048->102134 102053 430bfc 102049->102053 102058 430bc2 102049->102058 102136 435fe4 58 API calls __malloc_crt 102049->102136 102051 430bb7 102135 428db6 9 API calls __woutput_l 102051->102135 102055 4246e6 __fflush_nolock 58 API calls 102053->102055 102056 430c10 102055->102056 102101 430d47 102056->102101 102058->101961 102059 430c17 102059->102058 102060 4246e6 __fflush_nolock 58 API calls 102059->102060 102061 430c3a 102060->102061 102061->102058 102062 4246e6 __fflush_nolock 58 API calls 102061->102062 102063 430c46 102062->102063 102063->102058 102064 4246e6 __fflush_nolock 58 API calls 102063->102064 102065 430c53 102064->102065 102066 4246e6 __fflush_nolock 58 API calls 102065->102066 102066->102058 102067->101968 102068->101956 102069->101961 102070->101968 102071->101976 102072->101978 102074 435c83 102073->102074 102075 435c76 102073->102075 102078 435c8f 102074->102078 102079 428b28 ___libm_error_support 58 API calls 102074->102079 102076 428b28 ___libm_error_support 58 API calls 102075->102076 102077 435c7b 102076->102077 102077->102007 102078->102007 102080 435cb0 102079->102080 102081 428db6 __woutput_l 9 API calls 102080->102081 102081->102077 102082->101985 102083->102027 102084->101993 102085->101991 102086->101993 102087->102002 102088->102011 102089->102027 102090->102004 102091->102029 102092->102045 102093->102029 102094->102041 102095->102046 102096->102023 102097->102029 102098->101986 102099->101991 102100->102027 102102 430d53 __lseeki64 102101->102102 102103 430d60 102102->102103 102104 430d77 102102->102104 102105 428af4 __lseeki64 58 API calls 102103->102105 102106 430e3b 102104->102106 102109 430d8b 102104->102109 102108 430d65 102105->102108 102107 428af4 __lseeki64 58 API calls 102106->102107 102110 430dae 102107->102110 102111 428b28 ___libm_error_support 58 API calls 102108->102111 102112 430db6 102109->102112 102113 430da9 102109->102113 102118 428b28 ___libm_error_support 58 API calls 102110->102118 102126 430d6c __lseeki64 102111->102126 102115 430dc3 102112->102115 102116 430dd8 102112->102116 102114 428af4 __lseeki64 58 API calls 102113->102114 102114->102110 102119 428af4 __lseeki64 58 API calls 102115->102119 102117 42d206 ___lock_fhandle 59 API calls 102116->102117 102121 430dde 102117->102121 102122 430dd0 102118->102122 102120 430dc8 102119->102120 102123 428b28 ___libm_error_support 58 API calls 102120->102123 102124 430df1 102121->102124 102125 430e04 102121->102125 102128 428db6 __woutput_l 9 API calls 102122->102128 102123->102122 102127 430e5b __read_nolock 70 API calls 102124->102127 102129 428b28 ___libm_error_support 58 API calls 102125->102129 102126->102059 102130 430dfd 102127->102130 102128->102126 102131 430e09 102129->102131 102133 430e33 __read LeaveCriticalSection 102130->102133 102132 428af4 __lseeki64 58 API calls 102131->102132 102132->102130 102133->102126 102134->102051 102135->102058 102136->102053 102140 42520a GetSystemTimeAsFileTime 102137->102140 102139 468f6e 102139->101729 102141 425238 __aulldiv 102140->102141 102141->102139 102143 425c6c __lseeki64 102142->102143 102144 425c93 102143->102144 102145 425c7e 102143->102145 102146 426c11 __lock_file 59 API calls 102144->102146 102156 428b28 58 API calls __getptd_noexit 102145->102156 102148 425c99 102146->102148 102158 4258d0 67 API calls 6 library calls 102148->102158 102149 425c83 102157 428db6 9 API calls __woutput_l 102149->102157 102152 425ca4 102159 425cc4 LeaveCriticalSection LeaveCriticalSection __wfsopen 102152->102159 102154 425cb6 102155 425c8e __lseeki64 102154->102155 102155->101734 102156->102149 102157->102155 102158->102152 102159->102154 102160->101599 102161->101612 102162->101614 102163->101611 102164->101620 102166 409169 Mailbox 102165->102166 102167 43f19f 102166->102167 102172 409173 102166->102172 102168 420db6 Mailbox 59 API calls 102167->102168 102170 43f1ab 102168->102170 102169 40917a 102169->101624 102172->102169 102173 409c90 59 API calls Mailbox 102172->102173 102173->102172 102174->101635 102175->101632 102179 469748 __tzset_nolock _wcscmp 102176->102179 102177 404f0b 74 API calls 102177->102179 102178 469109 GetSystemTimeAsFileTime 102178->102179 102179->102177 102179->102178 102180 4695dc 102179->102180 102181 404ee5 85 API calls 102179->102181 102180->101641 102180->101669 102181->102179 102183 468b1f 102182->102183 102184 468b11 102182->102184 102186 468b64 102183->102186 102187 42525b 115 API calls 102183->102187 102198 468b28 102183->102198 102185 42525b 115 API calls 102184->102185 102185->102183 102213 468d91 102186->102213 102189 468b49 102187->102189 102189->102186 102191 468b52 102189->102191 102190 468ba8 102192 468bac 102190->102192 102193 468bcd 102190->102193 102195 4253a6 __fcloseall 83 API calls 102191->102195 102191->102198 102194 468bb9 102192->102194 102197 4253a6 __fcloseall 83 API calls 102192->102197 102217 4689a9 102193->102217 102194->102198 102202 4253a6 __fcloseall 83 API calls 102194->102202 102195->102198 102197->102194 102198->101670 102200 468bfb 102226 468c2b 102200->102226 102201 468bdb 102203 468be8 102201->102203 102205 4253a6 __fcloseall 83 API calls 102201->102205 102202->102198 102203->102198 102207 4253a6 __fcloseall 83 API calls 102203->102207 102205->102203 102207->102198 102210 468c16 102210->102198 102212 4253a6 __fcloseall 83 API calls 102210->102212 102212->102198 102214 468db6 102213->102214 102216 468d9f __tzset_nolock _memmove 102213->102216 102215 4255e2 __fread_nolock 74 API calls 102214->102215 102215->102216 102216->102190 102218 42571c _W_store_winword 58 API calls 102217->102218 102219 4689b8 102218->102219 102220 42571c _W_store_winword 58 API calls 102219->102220 102221 4689cc 102220->102221 102222 42571c _W_store_winword 58 API calls 102221->102222 102223 4689e0 102222->102223 102224 468d0d 58 API calls 102223->102224 102225 4689f3 102223->102225 102224->102225 102225->102200 102225->102201 102227 468c40 102226->102227 102228 468cf8 102227->102228 102230 468c02 102227->102230 102231 468a05 74 API calls 102227->102231 102255 468e12 102227->102255 102263 468aa1 74 API calls 102227->102263 102259 468f35 102228->102259 102234 468d0d 102230->102234 102231->102227 102235 468d20 102234->102235 102236 468d1a 102234->102236 102238 422d55 _free 58 API calls 102235->102238 102240 468d31 102235->102240 102237 422d55 _free 58 API calls 102236->102237 102237->102235 102238->102240 102239 468c09 102239->102210 102242 4253a6 102239->102242 102240->102239 102241 422d55 _free 58 API calls 102240->102241 102241->102239 102243 4253b2 __lseeki64 102242->102243 102244 4253c6 102243->102244 102245 4253de 102243->102245 102312 428b28 58 API calls __getptd_noexit 102244->102312 102247 426c11 __lock_file 59 API calls 102245->102247 102252 4253d6 __lseeki64 102245->102252 102249 4253f0 102247->102249 102248 4253cb 102313 428db6 9 API calls __woutput_l 102248->102313 102296 42533a 102249->102296 102252->102210 102257 468e21 102255->102257 102258 468e61 102255->102258 102257->102227 102258->102257 102264 468ee8 102258->102264 102260 468f42 102259->102260 102261 468f53 102259->102261 102262 424863 80 API calls 102260->102262 102261->102230 102262->102261 102263->102227 102265 468f14 102264->102265 102266 468f25 102264->102266 102268 424863 102265->102268 102266->102258 102269 42486f __lseeki64 102268->102269 102270 4248a5 102269->102270 102271 42488d 102269->102271 102274 42489d __lseeki64 102269->102274 102272 426c11 __lock_file 59 API calls 102270->102272 102293 428b28 58 API calls __getptd_noexit 102271->102293 102275 4248ab 102272->102275 102274->102266 102281 42470a 102275->102281 102276 424892 102294 428db6 9 API calls __woutput_l 102276->102294 102283 424719 102281->102283 102290 424737 102281->102290 102282 424727 102284 428b28 ___libm_error_support 58 API calls 102282->102284 102283->102282 102287 424751 _memmove 102283->102287 102283->102290 102285 42472c 102284->102285 102286 428db6 __woutput_l 9 API calls 102285->102286 102286->102290 102288 42ae1e __flsbuf 78 API calls 102287->102288 102289 424a3d __flush 78 API calls 102287->102289 102287->102290 102291 4246e6 __fflush_nolock 58 API calls 102287->102291 102292 42d886 __write 78 API calls 102287->102292 102288->102287 102289->102287 102295 4248dd LeaveCriticalSection LeaveCriticalSection __wfsopen 102290->102295 102291->102287 102292->102287 102293->102276 102294->102274 102295->102274 102297 425349 102296->102297 102298 42535d 102296->102298 102351 428b28 58 API calls __getptd_noexit 102297->102351 102305 425359 102298->102305 102315 424a3d 102298->102315 102300 42534e 102352 428db6 9 API calls __woutput_l 102300->102352 102314 425415 LeaveCriticalSection LeaveCriticalSection __wfsopen 102305->102314 102307 4246e6 __fflush_nolock 58 API calls 102308 425377 102307->102308 102325 430a02 102308->102325 102310 42537d 102310->102305 102311 422d55 _free 58 API calls 102310->102311 102311->102305 102312->102248 102313->102252 102314->102252 102316 424a50 102315->102316 102317 424a74 102315->102317 102316->102317 102318 4246e6 __fflush_nolock 58 API calls 102316->102318 102321 430b77 102317->102321 102319 424a6d 102318->102319 102353 42d886 102319->102353 102322 430b84 102321->102322 102324 425371 102321->102324 102323 422d55 _free 58 API calls 102322->102323 102322->102324 102323->102324 102324->102307 102326 430a0e __lseeki64 102325->102326 102327 430a32 102326->102327 102328 430a1b 102326->102328 102330 430abd 102327->102330 102332 430a42 102327->102332 102478 428af4 58 API calls __getptd_noexit 102328->102478 102483 428af4 58 API calls __getptd_noexit 102330->102483 102331 430a20 102479 428b28 58 API calls __getptd_noexit 102331->102479 102335 430a60 102332->102335 102336 430a6a 102332->102336 102480 428af4 58 API calls __getptd_noexit 102335->102480 102339 42d206 ___lock_fhandle 59 API calls 102336->102339 102337 430a65 102484 428b28 58 API calls __getptd_noexit 102337->102484 102341 430a70 102339->102341 102342 430a83 102341->102342 102343 430a8e 102341->102343 102463 430add 102342->102463 102481 428b28 58 API calls __getptd_noexit 102343->102481 102344 430ac9 102485 428db6 9 API calls __woutput_l 102344->102485 102346 430a27 __lseeki64 102346->102310 102349 430a89 102482 430ab5 LeaveCriticalSection __unlock_fhandle 102349->102482 102351->102300 102352->102305 102354 42d892 __lseeki64 102353->102354 102355 42d8b6 102354->102355 102356 42d89f 102354->102356 102358 42d955 102355->102358 102359 42d8ca 102355->102359 102454 428af4 58 API calls __getptd_noexit 102356->102454 102460 428af4 58 API calls __getptd_noexit 102358->102460 102362 42d8f2 102359->102362 102363 42d8e8 102359->102363 102361 42d8a4 102455 428b28 58 API calls __getptd_noexit 102361->102455 102381 42d206 102362->102381 102456 428af4 58 API calls __getptd_noexit 102363->102456 102367 42d8ed 102461 428b28 58 API calls __getptd_noexit 102367->102461 102368 42d8f8 102370 42d90b 102368->102370 102371 42d91e 102368->102371 102390 42d975 102370->102390 102457 428b28 58 API calls __getptd_noexit 102371->102457 102372 42d961 102462 428db6 9 API calls __woutput_l 102372->102462 102376 42d8ab __lseeki64 102376->102317 102377 42d917 102459 42d94d LeaveCriticalSection __unlock_fhandle 102377->102459 102378 42d923 102458 428af4 58 API calls __getptd_noexit 102378->102458 102382 42d212 __lseeki64 102381->102382 102383 42d261 EnterCriticalSection 102382->102383 102385 429c0b __lock 58 API calls 102382->102385 102384 42d287 __lseeki64 102383->102384 102384->102368 102386 42d237 102385->102386 102387 42d24f 102386->102387 102388 429e2b __mtinitlocks InitializeCriticalSectionAndSpinCount 102386->102388 102389 42d28b ___lock_fhandle LeaveCriticalSection 102387->102389 102388->102387 102389->102383 102391 42d982 __write_nolock 102390->102391 102392 42d9b6 102391->102392 102393 42d9e0 102391->102393 102394 42d9c1 102391->102394 102396 42c5f6 __woutput_l 6 API calls 102392->102396 102399 42da38 102393->102399 102400 42da1c 102393->102400 102395 428af4 __lseeki64 58 API calls 102394->102395 102398 42d9c6 102395->102398 102397 42e1d6 102396->102397 102397->102377 102401 428b28 ___libm_error_support 58 API calls 102398->102401 102402 42da51 102399->102402 102405 4318c1 __lseeki64_nolock 60 API calls 102399->102405 102403 428af4 __lseeki64 58 API calls 102400->102403 102404 42d9cd 102401->102404 102406 435c6b __flsbuf 58 API calls 102402->102406 102407 42da21 102403->102407 102408 428db6 __woutput_l 9 API calls 102404->102408 102405->102402 102409 42da5f 102406->102409 102410 428b28 ___libm_error_support 58 API calls 102407->102410 102408->102392 102411 42ddb8 102409->102411 102416 4299ac __beginthread 58 API calls 102409->102416 102412 42da28 102410->102412 102414 42ddd6 102411->102414 102415 42e14b WriteFile 102411->102415 102413 428db6 __woutput_l 9 API calls 102412->102413 102413->102392 102417 42defa 102414->102417 102422 42ddec 102414->102422 102418 42ddab GetLastError 102415->102418 102419 42dd78 102415->102419 102420 42da8b GetConsoleMode 102416->102420 102427 42dfef 102417->102427 102429 42df05 102417->102429 102418->102419 102419->102392 102421 42e184 102419->102421 102431 42ded8 102419->102431 102420->102411 102423 42daca 102420->102423 102421->102392 102425 428b28 ___libm_error_support 58 API calls 102421->102425 102422->102421 102424 42de5b WriteFile 102422->102424 102423->102411 102426 42dada GetConsoleCP 102423->102426 102424->102418 102428 42de98 102424->102428 102430 42e1b2 102425->102430 102426->102421 102447 42db09 102426->102447 102427->102421 102432 42e064 WideCharToMultiByte 102427->102432 102428->102422 102433 42debc 102428->102433 102429->102421 102434 42df6a WriteFile 102429->102434 102435 428af4 __lseeki64 58 API calls 102430->102435 102436 42dee3 102431->102436 102437 42e17b 102431->102437 102432->102418 102446 42e0ab 102432->102446 102433->102419 102434->102418 102439 42dfb9 102434->102439 102435->102392 102440 428b28 ___libm_error_support 58 API calls 102436->102440 102438 428b07 __dosmaperr 58 API calls 102437->102438 102438->102392 102439->102419 102439->102429 102439->102433 102442 42dee8 102440->102442 102441 42e0b3 WriteFile 102444 42e106 GetLastError 102441->102444 102441->102446 102445 428af4 __lseeki64 58 API calls 102442->102445 102443 4235f5 __write_nolock 58 API calls 102443->102447 102444->102446 102445->102392 102446->102419 102446->102427 102446->102433 102446->102441 102447->102419 102447->102443 102448 42dbf2 WideCharToMultiByte 102447->102448 102449 4362ba 60 API calls __write_nolock 102447->102449 102452 42dc5f 102447->102452 102448->102419 102450 42dc2d WriteFile 102448->102450 102449->102447 102450->102418 102450->102452 102451 437a5e WriteConsoleW CreateFileW __putwch_nolock 102451->102452 102452->102418 102452->102419 102452->102447 102452->102451 102453 42dc87 WriteFile 102452->102453 102453->102418 102453->102452 102454->102361 102455->102376 102456->102367 102457->102378 102458->102377 102459->102376 102460->102367 102461->102372 102462->102376 102486 42d4c3 102463->102486 102465 430b41 102499 42d43d 59 API calls 2 library calls 102465->102499 102466 430b1f 102466->102465 102470 42d4c3 __lseeki64_nolock 58 API calls 102466->102470 102467 430aeb 102467->102465 102467->102466 102469 42d4c3 __lseeki64_nolock 58 API calls 102467->102469 102472 430b16 102469->102472 102473 430b2b CloseHandle 102470->102473 102471 430b49 102474 430b6b 102471->102474 102500 428b07 58 API calls 3 library calls 102471->102500 102475 42d4c3 __lseeki64_nolock 58 API calls 102472->102475 102473->102465 102476 430b37 GetLastError 102473->102476 102474->102349 102475->102466 102476->102465 102478->102331 102479->102346 102480->102337 102481->102349 102482->102346 102483->102337 102484->102344 102485->102346 102487 42d4e3 102486->102487 102488 42d4ce 102486->102488 102490 428af4 __lseeki64 58 API calls 102487->102490 102492 42d508 102487->102492 102489 428af4 __lseeki64 58 API calls 102488->102489 102491 42d4d3 102489->102491 102493 42d512 102490->102493 102494 428b28 ___libm_error_support 58 API calls 102491->102494 102492->102467 102495 428b28 ___libm_error_support 58 API calls 102493->102495 102496 42d4db 102494->102496 102497 42d51a 102495->102497 102496->102467 102498 428db6 __woutput_l 9 API calls 102497->102498 102498->102496 102499->102471 102500->102474 102563 431940 102501->102563 102504 404799 102569 407d8c 102504->102569 102505 40477c 102506 407bcc 59 API calls 102505->102506 102508 404788 102506->102508 102565 407726 102508->102565 102511 420791 102512 431940 __write_nolock 102511->102512 102513 42079e GetLongPathNameW 102512->102513 102514 407bcc 59 API calls 102513->102514 102515 4072bd 102514->102515 102516 40700b 102515->102516 102517 407667 59 API calls 102516->102517 102518 40701d 102517->102518 102519 404750 60 API calls 102518->102519 102520 407028 102519->102520 102521 407033 102520->102521 102526 43e885 102520->102526 102522 403f74 59 API calls 102521->102522 102524 40703f 102522->102524 102573 4034c2 102524->102573 102528 43e89f 102526->102528 102579 407908 61 API calls 102526->102579 102527 407052 Mailbox 102527->101437 102530 404ddd 136 API calls 102529->102530 102531 40688f 102530->102531 102532 43e031 102531->102532 102533 404ddd 136 API calls 102531->102533 102534 46955b 122 API calls 102532->102534 102535 4068a3 102533->102535 102536 43e046 102534->102536 102535->102532 102537 4068ab 102535->102537 102538 43e067 102536->102538 102539 43e04a 102536->102539 102541 43e052 102537->102541 102542 4068b7 102537->102542 102540 420db6 Mailbox 59 API calls 102538->102540 102543 404e4a 84 API calls 102539->102543 102562 43e0ac Mailbox 102540->102562 102686 4642f8 90 API calls _wprintf 102541->102686 102580 406a8c 102542->102580 102543->102541 102547 43e060 102547->102538 102548 43e260 102549 422d55 _free 58 API calls 102548->102549 102550 43e268 102549->102550 102551 404e4a 84 API calls 102550->102551 102556 43e271 102551->102556 102555 422d55 _free 58 API calls 102555->102556 102556->102555 102557 404e4a 84 API calls 102556->102557 102690 45f7a1 89 API calls 4 library calls 102556->102690 102557->102556 102559 407de1 59 API calls 102559->102562 102562->102548 102562->102556 102562->102559 102672 40750f 102562->102672 102680 40735d 102562->102680 102687 45f73d 59 API calls 2 library calls 102562->102687 102688 45f65e 61 API calls 2 library calls 102562->102688 102689 46737f 59 API calls Mailbox 102562->102689 102564 40475d GetFullPathNameW 102563->102564 102564->102504 102564->102505 102566 407734 102565->102566 102567 407d2c 59 API calls 102566->102567 102568 404794 102567->102568 102568->102511 102570 407da6 102569->102570 102572 407d99 102569->102572 102571 420db6 Mailbox 59 API calls 102570->102571 102571->102572 102572->102508 102574 4034d4 102573->102574 102578 4034f3 _memmove 102573->102578 102577 420db6 Mailbox 59 API calls 102574->102577 102575 420db6 Mailbox 59 API calls 102576 40350a 102575->102576 102576->102527 102577->102578 102578->102575 102579->102526 102581 406ab5 102580->102581 102582 43e41e 102580->102582 102696 4057a6 60 API calls Mailbox 102581->102696 102782 45f7a1 89 API calls 4 library calls 102582->102782 102585 43e431 102783 45f7a1 89 API calls 4 library calls 102585->102783 102586 406ad7 102697 4057f6 102586->102697 102589 406af4 102591 407667 59 API calls 102589->102591 102593 406b00 102591->102593 102592 43e44d 102595 406b61 102592->102595 102710 420957 60 API calls __write_nolock 102593->102710 102597 43e460 102595->102597 102598 406b6f 102595->102598 102596 406b0c 102599 407667 59 API calls 102596->102599 102600 405c6f CloseHandle 102597->102600 102601 407667 59 API calls 102598->102601 102602 406b18 102599->102602 102603 43e46c 102600->102603 102604 406b78 102601->102604 102606 404750 60 API calls 102602->102606 102607 404ddd 136 API calls 102603->102607 102605 407667 59 API calls 102604->102605 102608 406b81 102605->102608 102609 406b26 102606->102609 102610 43e488 102607->102610 102720 40459b 102608->102720 102711 405850 ReadFile SetFilePointerEx 102609->102711 102613 43e4b1 102610->102613 102614 46955b 122 API calls 102610->102614 102784 45f7a1 89 API calls 4 library calls 102613->102784 102618 43e4a4 102614->102618 102615 406b98 102617 406b52 102712 405aee 102617->102712 102621 43e4cd 102618->102621 102622 43e4ac 102618->102622 102625 404e4a 84 API calls 102621->102625 102624 404e4a 84 API calls 102622->102624 102624->102613 102626 43e4d2 102625->102626 102627 420db6 Mailbox 59 API calls 102626->102627 102634 43e506 102627->102634 102631 403bbb 102631->101291 102631->101300 102635 40750f 59 API calls 102634->102635 102668 43e54f Mailbox 102635->102668 102638 43e740 102789 4672df 59 API calls Mailbox 102638->102789 102642 406d0c Mailbox 102691 4057d4 102642->102691 102645 43e762 102790 47fbce 59 API calls 2 library calls 102645->102790 102648 43e76f 102650 422d55 _free 58 API calls 102648->102650 102650->102642 102653 40750f 59 API calls 102653->102668 102662 407de1 59 API calls 102662->102668 102666 43e792 102791 45f7a1 89 API calls 4 library calls 102666->102791 102668->102638 102668->102653 102668->102662 102668->102666 102785 45f73d 59 API calls 2 library calls 102668->102785 102786 45f65e 61 API calls 2 library calls 102668->102786 102787 46737f 59 API calls Mailbox 102668->102787 102788 407213 59 API calls Mailbox 102668->102788 102669 43e7ab 102670 422d55 _free 58 API calls 102669->102670 102671 43e4c8 102670->102671 102671->102642 102673 4075af 102672->102673 102677 407522 _memmove 102672->102677 102675 420db6 Mailbox 59 API calls 102673->102675 102674 420db6 Mailbox 59 API calls 102676 407529 102674->102676 102675->102677 102678 420db6 Mailbox 59 API calls 102676->102678 102679 407552 102676->102679 102677->102674 102678->102679 102679->102562 102681 407370 102680->102681 102684 40741e 102680->102684 102683 420db6 Mailbox 59 API calls 102681->102683 102685 4073a2 102681->102685 102682 420db6 59 API calls Mailbox 102682->102685 102683->102685 102684->102562 102685->102682 102685->102684 102686->102547 102687->102562 102688->102562 102689->102562 102690->102556 102692 405c6f CloseHandle 102691->102692 102693 4057dc Mailbox 102692->102693 102694 405c6f CloseHandle 102693->102694 102695 4057eb 102694->102695 102695->102631 102696->102586 102698 405c6f CloseHandle 102697->102698 102699 405802 102698->102699 102794 405c99 102699->102794 102701 405844 102701->102585 102701->102589 102702 405821 102702->102701 102802 405610 102702->102802 102704 405833 102819 40527b SetFilePointerEx SetFilePointerEx 102704->102819 102706 40583a 102706->102701 102707 43dc07 102706->102707 102820 46345a SetFilePointerEx SetFilePointerEx WriteFile 102707->102820 102709 43dc37 102709->102701 102710->102596 102711->102617 102719 405b08 102712->102719 102713 43dd28 102834 405c4e SetFilePointerEx 102713->102834 102714 405b8f SetFilePointerEx 102833 405c4e SetFilePointerEx 102714->102833 102717 43dd42 102718 405b63 102718->102595 102719->102713 102719->102714 102719->102718 102721 407667 59 API calls 102720->102721 102722 4045b1 102721->102722 102723 407667 59 API calls 102722->102723 102724 4045b9 102723->102724 102725 407667 59 API calls 102724->102725 102726 4045c1 102725->102726 102727 407667 59 API calls 102726->102727 102728 4045c9 102727->102728 102729 43d4d2 102728->102729 102730 4045fd 102728->102730 102731 408047 59 API calls 102729->102731 102732 40784b 59 API calls 102730->102732 102733 43d4db 102731->102733 102734 40460b 102732->102734 102735 407d8c 59 API calls 102733->102735 102736 407d2c 59 API calls 102734->102736 102738 404640 102735->102738 102737 404615 102736->102737 102737->102738 102739 40784b 59 API calls 102737->102739 102740 404680 102738->102740 102742 40465f 102738->102742 102753 43d4fb 102738->102753 102743 404636 102739->102743 102835 40784b 102740->102835 102747 4079f2 59 API calls 102742->102747 102746 407d2c 59 API calls 102743->102746 102744 404691 102749 4046a3 102744->102749 102751 408047 59 API calls 102744->102751 102745 43d5cb 102750 407bcc 59 API calls 102745->102750 102746->102738 102748 404669 102747->102748 102748->102740 102754 40784b 59 API calls 102748->102754 102752 4046b3 102749->102752 102755 408047 59 API calls 102749->102755 102765 43d588 102750->102765 102751->102749 102757 4046ba 102752->102757 102758 408047 59 API calls 102752->102758 102753->102745 102756 43d5b4 102753->102756 102768 43d532 102753->102768 102754->102740 102755->102752 102756->102745 102762 43d59f 102756->102762 102759 408047 59 API calls 102757->102759 102767 4046c1 Mailbox 102757->102767 102758->102757 102759->102767 102760 4079f2 59 API calls 102760->102765 102761 43d590 102763 407bcc 59 API calls 102761->102763 102764 407bcc 59 API calls 102762->102764 102763->102765 102764->102765 102765->102740 102765->102760 102848 407924 59 API calls 2 library calls 102765->102848 102767->102615 102768->102761 102769 43d57b 102768->102769 102770 407bcc 59 API calls 102769->102770 102770->102765 102782->102585 102783->102592 102784->102671 102785->102668 102786->102668 102787->102668 102788->102668 102789->102645 102790->102648 102791->102669 102795 405cb2 CreateFileW 102794->102795 102796 43dd58 102794->102796 102797 405cd4 102795->102797 102796->102797 102798 43dd5e CreateFileW 102796->102798 102797->102702 102798->102797 102799 43dd84 102798->102799 102800 405aee 2 API calls 102799->102800 102801 43dd8f 102800->102801 102801->102797 102803 43dba5 102802->102803 102804 40562b 102802->102804 102813 4056ba 102803->102813 102827 405cdf 102803->102827 102805 405aee 2 API calls 102804->102805 102804->102813 102806 40564d 102805->102806 102807 40522e 59 API calls 102806->102807 102809 405657 102807->102809 102809->102803 102810 405664 102809->102810 102811 420db6 Mailbox 59 API calls 102810->102811 102812 40566f 102811->102812 102814 40522e 59 API calls 102812->102814 102813->102704 102815 40567a 102814->102815 102821 405bc0 102815->102821 102817 4056a7 102818 405aee 2 API calls 102817->102818 102818->102813 102819->102706 102820->102709 102822 405c33 102821->102822 102826 405bce 102821->102826 102832 405c4e SetFilePointerEx 102822->102832 102823 405bf6 102823->102817 102825 405c06 ReadFile 102825->102823 102825->102826 102826->102823 102826->102825 102828 405aee 2 API calls 102827->102828 102829 405d00 102828->102829 102830 405aee 2 API calls 102829->102830 102831 405d14 102830->102831 102831->102813 102832->102826 102833->102718 102834->102717 102836 4078b7 102835->102836 102837 40785a 102835->102837 102838 407d2c 59 API calls 102836->102838 102837->102836 102839 407865 102837->102839 102845 407888 _memmove 102838->102845 102840 407880 102839->102840 102841 43eb09 102839->102841 102849 407f27 59 API calls Mailbox 102840->102849 102842 408029 59 API calls 102841->102842 102844 43eb13 102842->102844 102846 420db6 Mailbox 59 API calls 102844->102846 102845->102744 102847 43eb33 102846->102847 102848->102765 102849->102845 102851 406d95 102850->102851 102852 406ea9 102850->102852 102851->102852 102853 420db6 Mailbox 59 API calls 102851->102853 102852->101443 102855 406dbc 102853->102855 102854 420db6 Mailbox 59 API calls 102856 406e31 102854->102856 102855->102854 102856->102852 102858 40735d 59 API calls 102856->102858 102860 40750f 59 API calls 102856->102860 102863 406240 102856->102863 102888 456553 59 API calls Mailbox 102856->102888 102858->102856 102860->102856 102861->101446 102862->101448 102864 407a16 59 API calls 102863->102864 102884 406265 102864->102884 102865 40646a 102870 407d8c 59 API calls 102870->102884 102871 40750f 59 API calls 102871->102884 102872 43dff6 102879 406799 _memmove 102880 43df92 102881 408029 59 API calls 102880->102881 102884->102865 102884->102870 102884->102871 102884->102872 102884->102879 102884->102880 102885 407e4f 59 API calls 102884->102885 102889 405f6c 60 API calls 102884->102889 102890 405d41 59 API calls Mailbox 102884->102890 102891 405e72 60 API calls 102884->102891 102892 407924 59 API calls 2 library calls 102884->102892 102886 40643b CharUpperBuffW 102885->102886 102886->102884 102888->102856 102889->102884 102890->102884 102891->102884 102892->102884 102895->101461 102896->101462 103393 401055 103398 402649 103393->103398 103396 422d40 __cinit 67 API calls 103397 401064 103396->103397 103399 407667 59 API calls 103398->103399 103400 4026b7 103399->103400 103405 403582 103400->103405 103403 402754 103404 40105a 103403->103404 103408 403416 59 API calls 2 library calls 103403->103408 103404->103396 103409 4035b0 103405->103409 103408->103403 103410 4035bd 103409->103410 103411 4035a1 103409->103411 103410->103411 103412 4035c4 RegOpenKeyExW 103410->103412 103411->103403 103412->103411 103413 4035de RegQueryValueExW 103412->103413 103414 403614 RegCloseKey 103413->103414 103415 4035ff 103413->103415 103414->103411 103415->103414 103416 401066 103421 40f76f 103416->103421 103418 40106c 103419 422d40 __cinit 67 API calls 103418->103419 103420 401076 103419->103420 103422 40f790 103421->103422 103454 41ff03 103422->103454 103426 40f7d7 103427 407667 59 API calls 103426->103427 103428 40f7e1 103427->103428 103429 407667 59 API calls 103428->103429 103430 40f7eb 103429->103430 103431 407667 59 API calls 103430->103431 103432 40f7f5 103431->103432 103433 407667 59 API calls 103432->103433 103434 40f833 103433->103434 103435 407667 59 API calls 103434->103435 103436 40f8fe 103435->103436 103464 415f87 103436->103464 103440 40f930 103441 407667 59 API calls 103440->103441 103442 40f93a 103441->103442 103492 41fd9e 103442->103492 103444 40f981 103445 40f991 GetStdHandle 103444->103445 103446 40f9dd 103445->103446 103447 4445ab 103445->103447 103448 40f9e5 OleInitialize 103446->103448 103447->103446 103449 4445b4 103447->103449 103448->103418 103499 466b38 64 API calls Mailbox 103449->103499 103451 4445bb 103500 467207 CreateThread 103451->103500 103453 4445c7 CloseHandle 103453->103448 103501 41ffdc 103454->103501 103457 41ffdc 59 API calls 103458 41ff45 103457->103458 103459 407667 59 API calls 103458->103459 103460 41ff51 103459->103460 103461 407bcc 59 API calls 103460->103461 103462 40f796 103461->103462 103463 420162 6 API calls 103462->103463 103463->103426 103465 407667 59 API calls 103464->103465 103466 415f97 103465->103466 103467 407667 59 API calls 103466->103467 103468 415f9f 103467->103468 103508 415a9d 103468->103508 103471 415a9d 59 API calls 103472 415faf 103471->103472 103473 407667 59 API calls 103472->103473 103474 415fba 103473->103474 103475 420db6 Mailbox 59 API calls 103474->103475 103476 40f908 103475->103476 103477 4160f9 103476->103477 103478 416107 103477->103478 103479 407667 59 API calls 103478->103479 103480 416112 103479->103480 103481 407667 59 API calls 103480->103481 103482 41611d 103481->103482 103483 407667 59 API calls 103482->103483 103484 416128 103483->103484 103485 407667 59 API calls 103484->103485 103486 416133 103485->103486 103487 415a9d 59 API calls 103486->103487 103488 41613e 103487->103488 103489 420db6 Mailbox 59 API calls 103488->103489 103490 416145 RegisterWindowMessageW 103489->103490 103490->103440 103493 45576f 103492->103493 103494 41fdae 103492->103494 103511 469ae7 60 API calls 103493->103511 103496 420db6 Mailbox 59 API calls 103494->103496 103498 41fdb6 103496->103498 103497 45577a 103498->103444 103499->103451 103500->103453 103512 4671ed 65 API calls 103500->103512 103502 407667 59 API calls 103501->103502 103503 41ffe7 103502->103503 103504 407667 59 API calls 103503->103504 103505 41ffef 103504->103505 103506 407667 59 API calls 103505->103506 103507 41ff3b 103506->103507 103507->103457 103509 407667 59 API calls 103508->103509 103510 415aa5 103509->103510 103510->103471 103511->103497 103513 401016 103518 404974 103513->103518 103516 422d40 __cinit 67 API calls 103517 401025 103516->103517 103519 420db6 Mailbox 59 API calls 103518->103519 103520 40497c 103519->103520 103521 40101b 103520->103521 103525 404936 103520->103525 103521->103516 103526 404951 103525->103526 103527 40493f 103525->103527 103529 4049a0 103526->103529 103528 422d40 __cinit 67 API calls 103527->103528 103528->103526 103530 407667 59 API calls 103529->103530 103531 4049b8 GetVersionExW 103530->103531 103532 407bcc 59 API calls 103531->103532 103533 4049fb 103532->103533 103534 407d2c 59 API calls 103533->103534 103537 404a28 103533->103537 103535 404a1c 103534->103535 103536 407726 59 API calls 103535->103536 103536->103537 103538 404a93 GetCurrentProcess IsWow64Process 103537->103538 103540 43d864 103537->103540 103539 404aac 103538->103539 103541 404ac2 103539->103541 103542 404b2b GetSystemInfo 103539->103542 103553 404b37 103541->103553 103543 404af8 103542->103543 103543->103521 103546 404ad4 103549 404b37 2 API calls 103546->103549 103547 404b1f GetSystemInfo 103548 404ae9 103547->103548 103548->103543 103551 404aef FreeLibrary 103548->103551 103550 404adc GetNativeSystemInfo 103549->103550 103550->103548 103551->103543 103554 404ad0 103553->103554 103555 404b40 LoadLibraryA 103553->103555 103554->103546 103554->103547 103555->103554 103556 404b51 GetProcAddress 103555->103556 103556->103554 103557 38923b0 103571 3890000 103557->103571 103559 389244c 103574 38922a0 103559->103574 103577 3893470 GetPEB 103571->103577 103573 389068b 103573->103559 103575 38922a9 Sleep 103574->103575 103576 38922b7 103575->103576 103578 389349a 103577->103578 103578->103573 103579 40552a 103586 405ab8 103579->103586 103585 40555a Mailbox 103587 420db6 Mailbox 59 API calls 103586->103587 103588 405acb 103587->103588 103589 420db6 Mailbox 59 API calls 103588->103589 103590 40553c 103589->103590 103591 4054d2 103590->103591 103598 4058cf 103591->103598 103593 405514 103593->103585 103597 408061 61 API calls Mailbox 103593->103597 103594 405bc0 2 API calls 103595 4054e3 103594->103595 103595->103593 103595->103594 103605 405a7a 103595->103605 103597->103585 103599 4058e0 103598->103599 103600 43dc3c 103598->103600 103599->103595 103614 455ecd 59 API calls Mailbox 103600->103614 103602 43dc46 103603 420db6 Mailbox 59 API calls 103602->103603 103604 43dc52 103603->103604 103606 43dcee 103605->103606 103607 405a8e 103605->103607 103620 455ecd 59 API calls Mailbox 103606->103620 103615 4059b9 103607->103615 103610 405a9a 103610->103595 103611 43dcf9 103612 420db6 Mailbox 59 API calls 103611->103612 103613 43dd0e _memmove 103612->103613 103614->103602 103616 4059d1 103615->103616 103619 4059ca _memmove 103615->103619 103617 420db6 Mailbox 59 API calls 103616->103617 103618 43dc7e 103616->103618 103617->103619 103619->103610 103620->103611 103621 40e5ab 103624 40d100 103621->103624 103623 40e5b9 103625 40d37d 103624->103625 103626 40d11d 103624->103626 103638 40d54b 103625->103638 103673 469e4a 89 API calls 4 library calls 103625->103673 103627 4426e0 103626->103627 103628 442691 103626->103628 103633 40d144 103626->103633 103668 47a3e6 341 API calls __cinit 103627->103668 103629 442694 103628->103629 103639 4426af 103628->103639 103632 4426a0 103629->103632 103629->103633 103666 47a9fa 341 API calls 103632->103666 103633->103625 103636 422d40 __cinit 67 API calls 103633->103636 103633->103638 103644 4427fc 103633->103644 103648 4084c0 69 API calls 103633->103648 103649 40d434 103633->103649 103655 409ea0 341 API calls 103633->103655 103656 408047 59 API calls 103633->103656 103658 408740 68 API calls __cinit 103633->103658 103659 408542 68 API calls 103633->103659 103661 40843a 68 API calls 103633->103661 103662 40cf7c 341 API calls 103633->103662 103663 409dda 59 API calls Mailbox 103633->103663 103664 40cf00 89 API calls 103633->103664 103665 40cd7d 341 API calls 103633->103665 103669 408a52 68 API calls 103633->103669 103670 409d3c 60 API calls Mailbox 103633->103670 103671 45678d 60 API calls 103633->103671 103636->103633 103637 4428b5 103637->103637 103638->103623 103639->103625 103667 47aea2 341 API calls 3 library calls 103639->103667 103643 40d443 103643->103623 103672 47a751 89 API calls 103644->103672 103648->103633 103660 408a52 68 API calls 103649->103660 103655->103633 103656->103633 103658->103633 103659->103633 103660->103643 103661->103633 103662->103633 103663->103633 103664->103633 103665->103633 103666->103638 103667->103625 103668->103633 103669->103633 103670->103633 103671->103633 103672->103625 103673->103637 103674 40107d 103679 40708b 103674->103679 103676 40108c 103677 422d40 __cinit 67 API calls 103676->103677 103678 401096 103677->103678 103680 40709b __write_nolock 103679->103680 103681 407667 59 API calls 103680->103681 103682 407151 103681->103682 103683 404706 61 API calls 103682->103683 103684 40715a 103683->103684 103710 42050b 103684->103710 103687 407cab 59 API calls 103688 407173 103687->103688 103689 403f74 59 API calls 103688->103689 103690 407182 103689->103690 103691 407667 59 API calls 103690->103691 103692 40718b 103691->103692 103693 407d8c 59 API calls 103692->103693 103694 407194 RegOpenKeyExW 103693->103694 103695 43e8b1 RegQueryValueExW 103694->103695 103699 4071b6 Mailbox 103694->103699 103696 43e943 RegCloseKey 103695->103696 103697 43e8ce 103695->103697 103696->103699 103709 43e955 _wcscat Mailbox __wsetenvp 103696->103709 103698 420db6 Mailbox 59 API calls 103697->103698 103700 43e8e7 103698->103700 103699->103676 103701 40522e 59 API calls 103700->103701 103702 43e8f2 RegQueryValueExW 103701->103702 103703 43e90f 103702->103703 103706 43e929 103702->103706 103704 407bcc 59 API calls 103703->103704 103704->103706 103705 4079f2 59 API calls 103705->103709 103706->103696 103707 407de1 59 API calls 103707->103709 103708 403f74 59 API calls 103708->103709 103709->103699 103709->103705 103709->103707 103709->103708 103711 431940 __write_nolock 103710->103711 103712 420518 GetFullPathNameW 103711->103712 103713 42053a 103712->103713 103714 407bcc 59 API calls 103713->103714 103715 407165 103714->103715 103715->103687 103716 43fdfc 103717 40ab30 Mailbox _memmove 103716->103717 103721 420db6 59 API calls Mailbox 103717->103721 103739 40a057 103717->103739 103740 407de1 59 API calls 103717->103740 103745 409f37 Mailbox 103717->103745 103747 47bc6b 341 API calls 103717->103747 103749 40b2b6 103717->103749 103750 409ea0 341 API calls 103717->103750 103752 44086a 103717->103752 103754 440878 103717->103754 103756 44085c 103717->103756 103757 40b21c 103717->103757 103761 40b525 103717->103761 103762 456e8f 59 API calls 103717->103762 103767 411fc3 103717->103767 103807 46d07b 103717->103807 103854 47df23 103717->103854 103857 47445a 103717->103857 103866 47c2e0 103717->103866 103898 467956 103717->103898 103904 45617e 103717->103904 103909 409c90 59 API calls Mailbox 103717->103909 103913 47c193 85 API calls 2 library calls 103717->103913 103719 45617e Mailbox 59 API calls 103719->103739 103721->103717 103724 420db6 59 API calls Mailbox 103724->103745 103725 440055 103914 469e4a 89 API calls 4 library calls 103725->103914 103729 40b475 103734 408047 59 API calls 103729->103734 103730 440064 103732 40b47a 103732->103725 103744 4409e5 103732->103744 103734->103739 103736 408047 59 API calls 103736->103745 103737 407667 59 API calls 103737->103745 103738 422d40 67 API calls __cinit 103738->103745 103740->103717 103741 456e8f 59 API calls 103741->103745 103742 4409d6 103919 469e4a 89 API calls 4 library calls 103742->103919 103920 469e4a 89 API calls 4 library calls 103744->103920 103745->103724 103745->103725 103745->103729 103745->103732 103745->103736 103745->103737 103745->103738 103745->103739 103745->103741 103745->103742 103746 40a55a 103745->103746 103907 40c8c0 341 API calls 2 library calls 103745->103907 103908 40b900 60 API calls Mailbox 103745->103908 103918 469e4a 89 API calls 4 library calls 103746->103918 103747->103717 103912 40f6a3 341 API calls 103749->103912 103750->103717 103916 409c90 59 API calls Mailbox 103752->103916 103917 469e4a 89 API calls 4 library calls 103754->103917 103756->103719 103756->103739 103910 409d3c 60 API calls Mailbox 103757->103910 103759 40b22d 103911 409d3c 60 API calls Mailbox 103759->103911 103915 469e4a 89 API calls 4 library calls 103761->103915 103762->103717 103921 409a98 103767->103921 103770 420db6 Mailbox 59 API calls 103772 411ff4 103770->103772 103773 412004 103772->103773 103949 4057a6 60 API calls Mailbox 103772->103949 103777 409837 84 API calls 103773->103777 103774 446585 103775 412029 103774->103775 103953 46f574 59 API calls 103774->103953 103778 409b3c 59 API calls 103775->103778 103783 412036 103775->103783 103779 412012 103777->103779 103780 4465cd 103778->103780 103781 4057f6 67 API calls 103779->103781 103782 4465d5 103780->103782 103780->103783 103784 412021 103781->103784 103785 409b3c 59 API calls 103782->103785 103786 405cdf 2 API calls 103783->103786 103784->103774 103784->103775 103952 4058ba CloseHandle 103784->103952 103788 41203d 103785->103788 103786->103788 103789 4465e7 103788->103789 103790 412057 103788->103790 103792 420db6 Mailbox 59 API calls 103789->103792 103791 407667 59 API calls 103790->103791 103793 41205f 103791->103793 103794 4465ed 103792->103794 103934 405572 103793->103934 103796 446601 103794->103796 103954 405850 ReadFile SetFilePointerEx 103794->103954 103801 446605 _memmove 103796->103801 103955 4676c4 59 API calls 2 library calls 103796->103955 103798 41206e 103798->103801 103950 409a3c 59 API calls Mailbox 103798->103950 103802 412082 Mailbox 103803 4120bc 103802->103803 103804 405c6f CloseHandle 103802->103804 103803->103717 103805 4120b0 103804->103805 103805->103803 103951 4058ba CloseHandle 103805->103951 103808 46d09a 103807->103808 103809 46d0a5 103807->103809 103810 409b3c 59 API calls 103808->103810 103813 407667 59 API calls 103809->103813 103849 46d17f Mailbox 103809->103849 103810->103809 103811 420db6 Mailbox 59 API calls 103812 46d1c8 103811->103812 103814 46d1d4 103812->103814 103960 4057a6 60 API calls Mailbox 103812->103960 103815 46d0c9 103813->103815 103819 409837 84 API calls 103814->103819 103817 407667 59 API calls 103815->103817 103818 46d0d2 103817->103818 103820 409837 84 API calls 103818->103820 103821 46d1ec 103819->103821 103823 46d0de 103820->103823 103822 4057f6 67 API calls 103821->103822 103824 46d1fb 103822->103824 103825 40459b 59 API calls 103823->103825 103826 46d233 103824->103826 103827 46d1ff GetLastError 103824->103827 103828 46d0f3 103825->103828 103832 46d295 103826->103832 103833 46d25e 103826->103833 103829 46d218 103827->103829 103830 407b2e 59 API calls 103828->103830 103850 46d188 Mailbox 103829->103850 103961 4058ba CloseHandle 103829->103961 103831 46d126 103830->103831 103835 46d178 103831->103835 103840 463c37 3 API calls 103831->103840 103836 420db6 Mailbox 59 API calls 103832->103836 103834 420db6 Mailbox 59 API calls 103833->103834 103837 46d263 103834->103837 103839 409b3c 59 API calls 103835->103839 103841 46d29a 103836->103841 103842 46d274 103837->103842 103844 407667 59 API calls 103837->103844 103839->103849 103843 46d136 103840->103843 103846 407667 59 API calls 103841->103846 103841->103850 103962 47fbce 59 API calls 2 library calls 103842->103962 103843->103835 103845 46d13a 103843->103845 103844->103842 103848 407de1 59 API calls 103845->103848 103846->103850 103851 46d147 103848->103851 103849->103811 103849->103850 103850->103717 103959 463a2a 63 API calls Mailbox 103851->103959 103853 46d150 Mailbox 103853->103835 103855 47cadd 130 API calls 103854->103855 103856 47df33 103855->103856 103856->103717 103858 409837 84 API calls 103857->103858 103859 474494 103858->103859 103860 406240 94 API calls 103859->103860 103861 4744a4 103860->103861 103862 4744c9 103861->103862 103863 409ea0 341 API calls 103861->103863 103864 409a98 59 API calls 103862->103864 103865 4744cd 103862->103865 103863->103862 103864->103865 103865->103717 103867 407667 59 API calls 103866->103867 103868 47c2f4 103867->103868 103869 407667 59 API calls 103868->103869 103870 47c2fc 103869->103870 103871 407667 59 API calls 103870->103871 103872 47c304 103871->103872 103873 409837 84 API calls 103872->103873 103897 47c312 103873->103897 103874 407924 59 API calls 103874->103897 103875 407bcc 59 API calls 103875->103897 103876 47c4fb 103877 47c528 Mailbox 103876->103877 103965 409a3c 59 API calls Mailbox 103876->103965 103877->103717 103879 47c4e2 103881 407cab 59 API calls 103879->103881 103880 408047 59 API calls 103880->103897 103883 47c4ef 103881->103883 103882 47c4fd 103884 407cab 59 API calls 103882->103884 103886 407b2e 59 API calls 103883->103886 103887 47c50c 103884->103887 103885 407e4f 59 API calls 103889 47c3a9 CharUpperBuffW 103885->103889 103886->103876 103890 407b2e 59 API calls 103887->103890 103888 407e4f 59 API calls 103891 47c469 CharUpperBuffW 103888->103891 103963 40843a 68 API calls 103889->103963 103890->103876 103964 40c5a7 69 API calls 2 library calls 103891->103964 103894 409837 84 API calls 103894->103897 103895 407cab 59 API calls 103895->103897 103896 407b2e 59 API calls 103896->103897 103897->103874 103897->103875 103897->103876 103897->103877 103897->103879 103897->103880 103897->103882 103897->103885 103897->103888 103897->103894 103897->103895 103897->103896 103899 467962 103898->103899 103900 420db6 Mailbox 59 API calls 103899->103900 103901 467970 103900->103901 103902 407667 59 API calls 103901->103902 103903 46797e 103901->103903 103902->103903 103903->103717 103966 4560c0 103904->103966 103906 45618c 103906->103717 103907->103745 103908->103745 103909->103717 103910->103759 103911->103749 103912->103761 103913->103717 103914->103730 103915->103756 103916->103756 103917->103756 103918->103739 103919->103744 103920->103739 103922 43f7d6 103921->103922 103923 409aa8 103921->103923 103924 43f7e7 103922->103924 103925 407bcc 59 API calls 103922->103925 103928 420db6 Mailbox 59 API calls 103923->103928 103926 407d8c 59 API calls 103924->103926 103925->103924 103927 43f7f1 103926->103927 103932 407667 59 API calls 103927->103932 103933 409ad4 103927->103933 103929 409abb 103928->103929 103929->103927 103930 409ac6 103929->103930 103931 407de1 59 API calls 103930->103931 103930->103933 103931->103933 103932->103933 103933->103770 103933->103774 103935 4055a2 103934->103935 103936 40557d 103934->103936 103937 407d8c 59 API calls 103935->103937 103936->103935 103939 40558c 103936->103939 103945 46325e 103937->103945 103940 405ab8 59 API calls 103939->103940 103942 46337e 103940->103942 103941 46328d 103941->103798 103944 4054d2 61 API calls 103942->103944 103946 46338c 103944->103946 103945->103941 103956 4631fa ReadFile SetFilePointerEx 103945->103956 103957 407924 59 API calls 2 library calls 103945->103957 103948 46339c Mailbox 103946->103948 103958 4077da 61 API calls Mailbox 103946->103958 103948->103798 103949->103773 103950->103802 103951->103803 103952->103774 103953->103774 103954->103796 103955->103801 103956->103945 103957->103945 103958->103948 103959->103853 103960->103814 103961->103850 103962->103850 103963->103897 103964->103897 103965->103877 103967 4560e8 103966->103967 103968 4560cb 103966->103968 103967->103906 103968->103967 103970 4560ab 59 API calls Mailbox 103968->103970 103970->103968

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00403B68
                                      • IsDebuggerPresent.KERNEL32 ref: 00403B7A
                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,004C52F8,004C52E0,?,?), ref: 00403BEB
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                        • Part of subcall function 0041092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00403C14,004C52F8,?,?,?), ref: 0041096E
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00403C6F
                                      • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,004B7770,00000010), ref: 0043D281
                                      • SetCurrentDirectoryW.KERNEL32(?,004C52F8,?,?,?), ref: 0043D2B9
                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,004B4260,004C52F8,?,?,?), ref: 0043D33F
                                      • ShellExecuteW.SHELL32(00000000,?,?), ref: 0043D346
                                        • Part of subcall function 00403A46: GetSysColorBrush.USER32(0000000F), ref: 00403A50
                                        • Part of subcall function 00403A46: LoadCursorW.USER32(00000000,00007F00), ref: 00403A5F
                                        • Part of subcall function 00403A46: LoadIconW.USER32(00000063), ref: 00403A76
                                        • Part of subcall function 00403A46: LoadIconW.USER32(000000A4), ref: 00403A88
                                        • Part of subcall function 00403A46: LoadIconW.USER32(000000A2), ref: 00403A9A
                                        • Part of subcall function 00403A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00403AC0
                                        • Part of subcall function 00403A46: RegisterClassExW.USER32(?), ref: 00403B16
                                        • Part of subcall function 004039D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00403A03
                                        • Part of subcall function 004039D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00403A24
                                        • Part of subcall function 004039D5: ShowWindow.USER32(00000000,?,?), ref: 00403A38
                                        • Part of subcall function 004039D5: ShowWindow.USER32(00000000,?,?), ref: 00403A41
                                        • Part of subcall function 0040434A: _memset.LIBCMT ref: 00404370
                                        • Part of subcall function 0040434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00404415
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                      • String ID: This is a third-party compiled AutoIt script.$runas$%I
                                      • API String ID: 529118366-2806069697
                                      • Opcode ID: 75782a8a224d27579c0f57f95c8fe3441172d367920e7b25ccf15a4b17c315e2
                                      • Instruction ID: 3b6422646bc5bb7d448bfeb78fc2b200dbb07c6b17ab8a28721e135d33d4e7f3
                                      • Opcode Fuzzy Hash: 75782a8a224d27579c0f57f95c8fe3441172d367920e7b25ccf15a4b17c315e2
                                      • Instruction Fuzzy Hash: 8D519275D08108AADB01AFB5EC05EEE7BB8AB45745B1040BFF811B21E1DA786685CB2D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1037 4049a0-404a00 call 407667 GetVersionExW call 407bcc 1042 404a06 1037->1042 1043 404b0b-404b0d 1037->1043 1044 404a09-404a0e 1042->1044 1045 43d767-43d773 1043->1045 1047 404b12-404b13 1044->1047 1048 404a14 1044->1048 1046 43d774-43d778 1045->1046 1049 43d77b-43d787 1046->1049 1050 43d77a 1046->1050 1051 404a15-404a4c call 407d2c call 407726 1047->1051 1048->1051 1049->1046 1052 43d789-43d78e 1049->1052 1050->1049 1060 404a52-404a53 1051->1060 1061 43d864-43d867 1051->1061 1052->1044 1054 43d794-43d79b 1052->1054 1054->1045 1056 43d79d 1054->1056 1059 43d7a2-43d7a5 1056->1059 1062 404a93-404aaa GetCurrentProcess IsWow64Process 1059->1062 1063 43d7ab-43d7c9 1059->1063 1060->1059 1064 404a59-404a64 1060->1064 1065 43d880-43d884 1061->1065 1066 43d869 1061->1066 1067 404aac 1062->1067 1068 404aaf-404ac0 1062->1068 1063->1062 1069 43d7cf-43d7d5 1063->1069 1070 43d7ea-43d7f0 1064->1070 1071 404a6a-404a6c 1064->1071 1073 43d886-43d88f 1065->1073 1074 43d86f-43d878 1065->1074 1072 43d86c 1066->1072 1067->1068 1076 404ac2-404ad2 call 404b37 1068->1076 1077 404b2b-404b35 GetSystemInfo 1068->1077 1078 43d7d7-43d7da 1069->1078 1079 43d7df-43d7e5 1069->1079 1082 43d7f2-43d7f5 1070->1082 1083 43d7fa-43d800 1070->1083 1080 404a72-404a75 1071->1080 1081 43d805-43d811 1071->1081 1072->1074 1073->1072 1075 43d891-43d894 1073->1075 1074->1065 1075->1074 1094 404ad4-404ae1 call 404b37 1076->1094 1095 404b1f-404b29 GetSystemInfo 1076->1095 1084 404af8-404b08 1077->1084 1078->1062 1079->1062 1088 43d831-43d834 1080->1088 1089 404a7b-404a8a 1080->1089 1085 43d813-43d816 1081->1085 1086 43d81b-43d821 1081->1086 1082->1062 1083->1062 1085->1062 1086->1062 1088->1062 1091 43d83a-43d84f 1088->1091 1092 404a90 1089->1092 1093 43d826-43d82c 1089->1093 1096 43d851-43d854 1091->1096 1097 43d859-43d85f 1091->1097 1092->1062 1093->1062 1102 404ae3-404ae7 GetNativeSystemInfo 1094->1102 1103 404b18-404b1d 1094->1103 1098 404ae9-404aed 1095->1098 1096->1062 1097->1062 1098->1084 1101 404aef-404af2 FreeLibrary 1098->1101 1101->1084 1102->1098 1103->1102
                                      APIs
                                      • GetVersionExW.KERNEL32(?), ref: 004049CD
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                      • GetCurrentProcess.KERNEL32(?,0048FAEC,00000000,00000000,?), ref: 00404A9A
                                      • IsWow64Process.KERNEL32(00000000), ref: 00404AA1
                                      • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00404AE7
                                      • FreeLibrary.KERNEL32(00000000), ref: 00404AF2
                                      • GetSystemInfo.KERNEL32(00000000), ref: 00404B23
                                      • GetSystemInfo.KERNEL32(00000000), ref: 00404B2F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                      • String ID:
                                      • API String ID: 1986165174-0
                                      • Opcode ID: a5e0abf809287e674f8bb8489bef206d60b78f809478fdba31fe0aa4f183fcd5
                                      • Instruction ID: 9368d54b81b13d28e750e9b7a77ce7499fab44d9898740901c219fded0589530
                                      • Opcode Fuzzy Hash: a5e0abf809287e674f8bb8489bef206d60b78f809478fdba31fe0aa4f183fcd5
                                      • Instruction Fuzzy Hash: 7A91A4719897C0DACB21DBA894501ABBFF5AF69300F444D6FD1C6A3B41D238B908C76E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1104 404e89-404ea1 CreateStreamOnHGlobal 1105 404ec1-404ec6 1104->1105 1106 404ea3-404eba FindResourceExW 1104->1106 1107 43d933-43d942 LoadResource 1106->1107 1108 404ec0 1106->1108 1107->1108 1109 43d948-43d956 SizeofResource 1107->1109 1108->1105 1109->1108 1110 43d95c-43d967 LockResource 1109->1110 1110->1108 1111 43d96d-43d975 1110->1111 1112 43d979-43d98b 1111->1112 1112->1108
                                      APIs
                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00404D8E,?,?,00000000,00000000), ref: 00404E99
                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00404D8E,?,?,00000000,00000000), ref: 00404EB0
                                      • LoadResource.KERNEL32(?,00000000,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F), ref: 0043D937
                                      • SizeofResource.KERNEL32(?,00000000,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F), ref: 0043D94C
                                      • LockResource.KERNEL32(00404D8E,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F,00000000), ref: 0043D95F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                      • String ID: SCRIPT
                                      • API String ID: 3051347437-3967369404
                                      • Opcode ID: 41d1929798edb895ac9d7ecac736fa75257a1a0119b35b9f9055d793dd554d7f
                                      • Instruction ID: 68981a4d98a1b9f26aaf18e99fd77eadcf83d6f3c297b7fdd3b7e429ee84fbe5
                                      • Opcode Fuzzy Hash: 41d1929798edb895ac9d7ecac736fa75257a1a0119b35b9f9055d793dd554d7f
                                      • Instruction Fuzzy Hash: 59119EB0200300BFD7208B65EC48F2B7BBAFBC9B11F20467DF505D62A0DB71E8058665
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: DdL$DdL$DdL$DdL$Variable must be of type 'Object'.
                                      • API String ID: 0-2838938394
                                      • Opcode ID: 120386d4fc6e855f28c2b8f8895e5f1d1af3e51dfff1d057292853d04a681f51
                                      • Instruction ID: 023dab180a9d3d77a7e8607c3136a2e1727c845c037ec0be429657ea2820e701
                                      • Opcode Fuzzy Hash: 120386d4fc6e855f28c2b8f8895e5f1d1af3e51dfff1d057292853d04a681f51
                                      • Instruction Fuzzy Hash: C3A29E75A00205CFDB24CF56C480AAAB7B1FF58314F24887BE905AB391D739ED52CB99
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(?,0043E398), ref: 0046446A
                                      • FindFirstFileW.KERNELBASE(?,?), ref: 0046447B
                                      • FindClose.KERNEL32(00000000), ref: 0046448B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FileFind$AttributesCloseFirst
                                      • String ID:
                                      • API String ID: 48322524-0
                                      • Opcode ID: 4840215ffa09c9e98f8c71f503fabca7b99ef5557041bbbf62c8821922d9d811
                                      • Instruction ID: 0270b6235cd3a211ff5fd07bbdee7491b27fcb3ec88e67c823a813e2b68c3cf0
                                      • Opcode Fuzzy Hash: 4840215ffa09c9e98f8c71f503fabca7b99ef5557041bbbf62c8821922d9d811
                                      • Instruction Fuzzy Hash: 54E0D8328105006B4610AB78EC0E4EE775C9E85335F100B6AFC35C11D0FB789904969F
                                      APIs
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00410A5B
                                      • timeGetTime.WINMM ref: 00410D16
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00410E53
                                      • Sleep.KERNEL32(0000000A), ref: 00410E61
                                      • LockWindowUpdate.USER32(00000000,?,?), ref: 00410EFA
                                      • DestroyWindow.USER32 ref: 00410F06
                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00410F20
                                      • Sleep.KERNEL32(0000000A,?,?), ref: 00444E83
                                      • TranslateMessage.USER32(?), ref: 00445C60
                                      • DispatchMessageW.USER32(?), ref: 00445C6E
                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00445C82
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                      • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pbL$pbL$pbL$pbL
                                      • API String ID: 4212290369-1082885916
                                      • Opcode ID: 72d9911149f3490be87acfaf3fb2333c6187fa06fb6b67b392ca5871fe4a4e7f
                                      • Instruction ID: d38973a2ad724f636fdb88fa2895c4b9f48f3c0ad1428ec49bcc8c13362f202a
                                      • Opcode Fuzzy Hash: 72d9911149f3490be87acfaf3fb2333c6187fa06fb6b67b392ca5871fe4a4e7f
                                      • Instruction Fuzzy Hash: BBB29470608741DFEB24DF24C445BABB7E4BF84304F14492FE54997292D779E885CB8A

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00468F5F: __time64.LIBCMT ref: 00468F69
                                        • Part of subcall function 00404EE5: _fseek.LIBCMT ref: 00404EFD
                                      • __wsplitpath.LIBCMT ref: 00469234
                                        • Part of subcall function 004240FB: __wsplitpath_helper.LIBCMT ref: 0042413B
                                      • _wcscpy.LIBCMT ref: 00469247
                                      • _wcscat.LIBCMT ref: 0046925A
                                      • __wsplitpath.LIBCMT ref: 0046927F
                                      • _wcscat.LIBCMT ref: 00469295
                                      • _wcscat.LIBCMT ref: 004692A8
                                        • Part of subcall function 00468FA5: _memmove.LIBCMT ref: 00468FDE
                                        • Part of subcall function 00468FA5: _memmove.LIBCMT ref: 00468FED
                                      • _wcscmp.LIBCMT ref: 004691EF
                                        • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469824
                                        • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469837
                                      • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00469452
                                      • _wcsncpy.LIBCMT ref: 004694C5
                                      • DeleteFileW.KERNEL32(?,?), ref: 004694FB
                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00469511
                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00469522
                                      • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00469534
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                      • String ID:
                                      • API String ID: 1500180987-0
                                      • Opcode ID: dafe4648b5bbac87b0fd5884d323520927b6c8dc5856a1245f48faeb858b36b7
                                      • Instruction ID: 02a21988af13e7247216c1d96107bbd8e14577c6ac0cce12fd44c5267f831f24
                                      • Opcode Fuzzy Hash: dafe4648b5bbac87b0fd5884d323520927b6c8dc5856a1245f48faeb858b36b7
                                      • Instruction Fuzzy Hash: 22C13DB1900129AADF11DF95CC81ADEB7BCEF85314F0040ABF609E6251EB749E858F69

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00404706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004C52F8,?,004037AE,?), ref: 00404724
                                        • Part of subcall function 0042050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00407165), ref: 0042052D
                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 004071A8
                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0043E8C8
                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0043E909
                                      • RegCloseKey.ADVAPI32(?), ref: 0043E947
                                      • _wcscat.LIBCMT ref: 0043E9A0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\$`X
                                      • API String ID: 2673923337-1788059236
                                      • Opcode ID: 7ecad6e5ad07ceea5605b64ce129b88e03927fddba482c9648cd5a3546083039
                                      • Instruction ID: d25a402f486e77f999364444344266e14871576642d40cf04fb282302ec68e46
                                      • Opcode Fuzzy Hash: 7ecad6e5ad07ceea5605b64ce129b88e03927fddba482c9648cd5a3546083039
                                      • Instruction Fuzzy Hash: E9718E71509301AEC340EF26E841D5BBBE8FF88314F51893FF445972A1DB79A948CB5A

                                      Control-flow Graph

                                      APIs
                                      • GetSysColorBrush.USER32(0000000F), ref: 00403074
                                      • RegisterClassExW.USER32(00000030), ref: 0040309E
                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                      • InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                      • LoadIconW.USER32(000000A9), ref: 004030F2
                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                      • API String ID: 2914291525-1005189915
                                      • Opcode ID: 8f69357ad4fd7de76c78bba9f685936345070209800999283baa0b23664e753e
                                      • Instruction ID: 4440f0663549e4d62e3da2fdffcae7bb40582d53fb7b12173dce245a48cd956c
                                      • Opcode Fuzzy Hash: 8f69357ad4fd7de76c78bba9f685936345070209800999283baa0b23664e753e
                                      • Instruction Fuzzy Hash: 5F317A71801348AFDB50DFA4DC84A9DBFF0FB09310F24456EE480E62A0D7B91599CF69

                                      Control-flow Graph

                                      APIs
                                      • GetSysColorBrush.USER32(0000000F), ref: 00403074
                                      • RegisterClassExW.USER32(00000030), ref: 0040309E
                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                      • InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                      • LoadIconW.USER32(000000A9), ref: 004030F2
                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                      • API String ID: 2914291525-1005189915
                                      • Opcode ID: 1851e2fbc18e2f99d75288993840a6d640a6fda4d586a764550e5d38fc6b7f12
                                      • Instruction ID: 5f72cbcfe52bedf9aac6cae92f5874e6cc1455117f94183018d2e1bba946cea4
                                      • Opcode Fuzzy Hash: 1851e2fbc18e2f99d75288993840a6d640a6fda4d586a764550e5d38fc6b7f12
                                      • Instruction Fuzzy Hash: DD21F9B1911208AFEB40EF94EC48B9DBBF4FB08700F10453AF511A62A0D7B555948FA9

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00420162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00420193
                                        • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0042019B
                                        • Part of subcall function 00420162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 004201A6
                                        • Part of subcall function 00420162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 004201B1
                                        • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000011,00000000), ref: 004201B9
                                        • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000012,00000000), ref: 004201C1
                                        • Part of subcall function 004160F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0040F930), ref: 00416154
                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0040F9CD
                                      • OleInitialize.OLE32(00000000), ref: 0040FA4A
                                      • CloseHandle.KERNEL32(00000000), ref: 004445C8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                      • String ID: 0$0$<WL$P$p.$%I$SL
                                      • API String ID: 1986988660-1332611753
                                      • Opcode ID: f1d586e74e90da6579d0351fd7316c379a8bbb145f25a8de60af12f35c3acec0
                                      • Instruction ID: cacde0f204b6a9090d7281a683cdea215049a4593ae0d5a2ec8f4d386ae10ecf
                                      • Opcode Fuzzy Hash: f1d586e74e90da6579d0351fd7316c379a8bbb145f25a8de60af12f35c3acec0
                                      • Instruction Fuzzy Hash: 6581ADB4901A809EC3C8EF3AA944F5D7BE5AB9830A790853F9419C7272E77874C58F1D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 801 403633-403681 803 4036e1-4036e3 801->803 804 403683-403686 801->804 803->804 805 4036e5 803->805 806 4036e7 804->806 807 403688-40368f 804->807 808 4036ca-4036d2 DefWindowProcW 805->808 809 4036ed-4036f0 806->809 810 43d0cc-43d0fa call 411070 call 411093 806->810 811 403695-40369a 807->811 812 40374b-403753 PostQuitMessage 807->812 814 4036d8-4036de 808->814 815 4036f2-4036f3 809->815 816 403715-40373c SetTimer RegisterWindowMessageW 809->816 844 43d0ff-43d106 810->844 818 4036a0-4036a2 811->818 819 43d154-43d168 call 462527 811->819 813 403711-403713 812->813 813->814 820 4036f9-40370c KillTimer call 40443a call 403114 815->820 821 43d06f-43d072 815->821 816->813 823 40373e-403749 CreatePopupMenu 816->823 824 403755-403764 call 4044a0 818->824 825 4036a8-4036ad 818->825 819->813 837 43d16e 819->837 820->813 829 43d074-43d076 821->829 830 43d0a8-43d0c7 MoveWindow 821->830 823->813 824->813 833 4036b3-4036b8 825->833 834 43d139-43d140 825->834 839 43d097-43d0a3 SetFocus 829->839 840 43d078-43d07b 829->840 830->813 835 43d124-43d134 call 462d36 833->835 836 4036be-4036c4 833->836 834->808 842 43d146-43d14f call 457c36 834->842 835->813 836->808 836->844 837->808 839->813 840->836 845 43d081-43d092 call 411070 840->845 842->808 844->808 849 43d10c-43d11f call 40443a call 40434a 844->849 845->813 849->808
                                      APIs
                                      • DefWindowProcW.USER32(?,?,?,?), ref: 004036D2
                                      • KillTimer.USER32(?,00000001), ref: 004036FC
                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0040371F
                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0040372A
                                      • CreatePopupMenu.USER32 ref: 0040373E
                                      • PostQuitMessage.USER32(00000000), ref: 0040374D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                      • String ID: TaskbarCreated$%I
                                      • API String ID: 129472671-1195164674
                                      • Opcode ID: efb809b380ac49921d1d4b9ba267e99454419b305186d5d2b410c1dd532dd333
                                      • Instruction ID: dec945db719cbeb7d7ffc5e313a4f07f26295059660cff28048481092df75402
                                      • Opcode Fuzzy Hash: efb809b380ac49921d1d4b9ba267e99454419b305186d5d2b410c1dd532dd333
                                      • Instruction Fuzzy Hash: F34127B1110505ABDB246F68EC09F7E3E98EB44302F50453BF602A63E1C67EAD95972E

                                      Control-flow Graph

                                      APIs
                                      • GetSysColorBrush.USER32(0000000F), ref: 00403A50
                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00403A5F
                                      • LoadIconW.USER32(00000063), ref: 00403A76
                                      • LoadIconW.USER32(000000A4), ref: 00403A88
                                      • LoadIconW.USER32(000000A2), ref: 00403A9A
                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00403AC0
                                      • RegisterClassExW.USER32(?), ref: 00403B16
                                        • Part of subcall function 00403041: GetSysColorBrush.USER32(0000000F), ref: 00403074
                                        • Part of subcall function 00403041: RegisterClassExW.USER32(00000030), ref: 0040309E
                                        • Part of subcall function 00403041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                        • Part of subcall function 00403041: InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                        • Part of subcall function 00403041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                        • Part of subcall function 00403041: LoadIconW.USER32(000000A9), ref: 004030F2
                                        • Part of subcall function 00403041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                      • String ID: #$0$AutoIt v3
                                      • API String ID: 423443420-4155596026
                                      • Opcode ID: e93e5f7a6ad55884e62165224cde73996e1a183fbeab7dcf433d053beda00650
                                      • Instruction ID: 95199bfa57b98a40bbf2a31e3c8143aaf86e5cd3d1ec7ed5ae4cf298cf618104
                                      • Opcode Fuzzy Hash: e93e5f7a6ad55884e62165224cde73996e1a183fbeab7dcf433d053beda00650
                                      • Instruction Fuzzy Hash: C4214874D00308AFEB50DFA4EC09F9D7BF4FB08711F1045BAE500A62A1D3B966948F88

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$RL
                                      • API String ID: 1825951767-3937808951
                                      • Opcode ID: 1f880c6c9c00a8649edbcc544dbd53457ed1c241aa2dd41ff2e8243fa3774e0c
                                      • Instruction ID: 217e4a9907ead401ca9bb1711b2953d037e75f133ca24ff269f2dfb0051b1760
                                      • Opcode Fuzzy Hash: 1f880c6c9c00a8649edbcc544dbd53457ed1c241aa2dd41ff2e8243fa3774e0c
                                      • Instruction Fuzzy Hash: DAA13CB29102199ACB04EFA1DC91EEEBB78BF14314F40053FE415B7191DB786A08CBA9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 983 38925c0-389266e call 3890000 986 3892675-389269b call 38934d0 CreateFileW 983->986 989 389269d 986->989 990 38926a2-38926b2 986->990 991 38927ed-38927f1 989->991 998 38926b9-38926d3 VirtualAlloc 990->998 999 38926b4 990->999 992 3892833-3892836 991->992 993 38927f3-38927f7 991->993 995 3892839-3892840 992->995 996 38927f9-38927fc 993->996 997 3892803-3892807 993->997 1002 3892842-389284d 995->1002 1003 3892895-38928aa 995->1003 996->997 1004 3892809-3892813 997->1004 1005 3892817-389281b 997->1005 1000 38926da-38926f1 ReadFile 998->1000 1001 38926d5 998->1001 999->991 1006 38926f8-3892738 VirtualAlloc 1000->1006 1007 38926f3 1000->1007 1001->991 1008 389284f 1002->1008 1009 3892851-389285d 1002->1009 1010 38928ba-38928c2 1003->1010 1011 38928ac-38928b7 VirtualFree 1003->1011 1004->1005 1012 389282b 1005->1012 1013 389281d-3892827 1005->1013 1014 389273a 1006->1014 1015 389273f-389275a call 3893720 1006->1015 1007->991 1008->1003 1016 389285f-389286f 1009->1016 1017 3892871-389287d 1009->1017 1011->1010 1012->992 1013->1012 1014->991 1023 3892765-389276f 1015->1023 1019 3892893 1016->1019 1020 389288a-3892890 1017->1020 1021 389287f-3892888 1017->1021 1019->995 1020->1019 1021->1019 1024 3892771-38927a0 call 3893720 1023->1024 1025 38927a2-38927b6 call 3893530 1023->1025 1024->1023 1030 38927b8 1025->1030 1031 38927ba-38927be 1025->1031 1030->991 1033 38927ca-38927ce 1031->1033 1034 38927c0-38927c4 CloseHandle 1031->1034 1035 38927de-38927e7 1033->1035 1036 38927d0-38927db VirtualFree 1033->1036 1034->1033 1035->986 1035->991 1036->1035
                                      APIs
                                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03892691
                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 038928B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2116592061.0000000003890000.00000040.00001000.00020000.00000000.sdmp, Offset: 03890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3890000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CreateFileFreeVirtual
                                      • String ID:
                                      • API String ID: 204039940-0
                                      • Opcode ID: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                      • Instruction ID: a1d2af6e223f8d5a3664e151e30aad16305453218d98f4d65d678c424292adf7
                                      • Opcode Fuzzy Hash: ed516440ab75e0c1ded8a7b1870b24392b753ad5cf7d4aa929dd61e32643855c
                                      • Instruction Fuzzy Hash: 66A10774E0020DEBEF14DFE4C994BAEB7B5BF48304F24859AE511BB280D7759A41CB94

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1114 4039d5-403a45 CreateWindowExW * 2 ShowWindow * 2
                                      APIs
                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00403A03
                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00403A24
                                      • ShowWindow.USER32(00000000,?,?), ref: 00403A38
                                      • ShowWindow.USER32(00000000,?,?), ref: 00403A41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$CreateShow
                                      • String ID: AutoIt v3$edit
                                      • API String ID: 1584632944-3779509399
                                      • Opcode ID: 63781ed4ae1f3443bb25091dad28ecbd1b84819009c2b11518bfb31f136976a9
                                      • Instruction ID: be7595edf0713681b26590b93805f6b8ae52c85786ba9eb407d90bea5093dcab
                                      • Opcode Fuzzy Hash: 63781ed4ae1f3443bb25091dad28ecbd1b84819009c2b11518bfb31f136976a9
                                      • Instruction Fuzzy Hash: 5DF03A705002907EEB705723AC48E2F2EBDD7C6F50B00407EB900E2170C2752881CEB8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1115 38923b0-38924c2 call 3890000 call 38922a0 CreateFileW 1122 38924c9-38924d9 1115->1122 1123 38924c4 1115->1123 1126 38924db 1122->1126 1127 38924e0-38924fa VirtualAlloc 1122->1127 1124 3892579-389257e 1123->1124 1126->1124 1128 38924fc 1127->1128 1129 38924fe-3892515 ReadFile 1127->1129 1128->1124 1130 3892519-3892553 call 38922e0 call 38912a0 1129->1130 1131 3892517 1129->1131 1136 389256f-3892577 ExitProcess 1130->1136 1137 3892555-389256a call 3892330 1130->1137 1131->1124 1136->1124 1137->1136
                                      APIs
                                        • Part of subcall function 038922A0: Sleep.KERNELBASE(000001F4), ref: 038922B1
                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 038924B8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2116592061.0000000003890000.00000040.00001000.00020000.00000000.sdmp, Offset: 03890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3890000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CreateFileSleep
                                      • String ID: JIJSXUTZROT4
                                      • API String ID: 2694422964-972064407
                                      • Opcode ID: ba63b91ca706e6e185e85508e39357c12d886b8989ed9410d0a8b83744a031c9
                                      • Instruction ID: 096379a601ecac78a1f5dd8daf8e5430798e2e9f74e4bce71ea41fed544b318e
                                      • Opcode Fuzzy Hash: ba63b91ca706e6e185e85508e39357c12d886b8989ed9410d0a8b83744a031c9
                                      • Instruction Fuzzy Hash: 0F516E31E1424DEAEF10DBE4C855BEEBB79AF48300F0445A9E608BB2C0D7751B45CBA6

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1139 40407c-404092 1140 404098-4040ad call 407a16 1139->1140 1141 40416f-404173 1139->1141 1144 4040b3-4040d3 call 407bcc 1140->1144 1145 43d3c8-43d3d7 LoadStringW 1140->1145 1148 43d3e2-43d3fa call 407b2e call 406fe3 1144->1148 1149 4040d9-4040dd 1144->1149 1145->1148 1158 4040ed-40416a call 422de0 call 40454e call 422dbc Shell_NotifyIconW call 405904 1148->1158 1161 43d400-43d41e call 407cab call 406fe3 call 407cab 1148->1161 1151 4040e3-4040e8 call 407b2e 1149->1151 1152 404174-40417d call 408047 1149->1152 1151->1158 1152->1158 1158->1141 1161->1158
                                      APIs
                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0043D3D7
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                      • _memset.LIBCMT ref: 004040FC
                                      • _wcscpy.LIBCMT ref: 00404150
                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00404160
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                      • String ID: Line:
                                      • API String ID: 3942752672-1585850449
                                      • Opcode ID: 39951a8ce5b0738e13e1a1a673d27ad5b11c367fbdb94cdb61db56639bfb0f31
                                      • Instruction ID: 5bc5e1414a994c2bc470de53771d73d2d6dd5f3f474fa0ef1b1349c24bbf7672
                                      • Opcode Fuzzy Hash: 39951a8ce5b0738e13e1a1a673d27ad5b11c367fbdb94cdb61db56639bfb0f31
                                      • Instruction Fuzzy Hash: 0C31A0B1408305AAD360EB61DC45FDF77E8AB84308F10493FB685A21D1DB78A649CB9F
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                      • String ID:
                                      • API String ID: 1559183368-0
                                      • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                      • Instruction ID: c535a9b74c3be08fb66675131960c2e3f57dfdec9721024cad96d7a05cd33cf3
                                      • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                      • Instruction Fuzzy Hash: 9051BB30B00B15EBCB149E65F84066FB7B2AF40325F94472FF825963D4D7789D918B49
                                      APIs
                                        • Part of subcall function 00404DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E0F
                                      • _free.LIBCMT ref: 0043E263
                                      • _free.LIBCMT ref: 0043E2AA
                                        • Part of subcall function 00406A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00406BAD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _free$CurrentDirectoryLibraryLoad
                                      • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                      • API String ID: 2861923089-1757145024
                                      • Opcode ID: e32cfc87817963b176bc4a4294c91714abab4d97e23f02fc51bef44531d14c00
                                      • Instruction ID: bc1048028433ed9b22f3ef3a1c1c6008be5ef254c57e4e777beaa03c5b85f979
                                      • Opcode Fuzzy Hash: e32cfc87817963b176bc4a4294c91714abab4d97e23f02fc51bef44531d14c00
                                      • Instruction Fuzzy Hash: 0D916E71901229AFCF04EFA6C8419EEB7B4FF08314F10446FE815AB2E1DB78A955CB59
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,004035A1,SwapMouseButtons,00000004,?), ref: 004035D4
                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,004035A1,SwapMouseButtons,00000004,?,?,?,?,00402754), ref: 004035F5
                                      • RegCloseKey.KERNELBASE(00000000,?,?,004035A1,SwapMouseButtons,00000004,?,?,?,?,00402754), ref: 00403617
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CloseOpenQueryValue
                                      • String ID: Control Panel\Mouse
                                      • API String ID: 3677997916-824357125
                                      • Opcode ID: fddb709fe4a1b7e3bb6eda9662e0779279b58f522ad42de317fca39f37a0c6b5
                                      • Instruction ID: b1ff216ba3ee978410a1c1c06e663b0c2c98cd46aaa17f39490786bf8a1b1252
                                      • Opcode Fuzzy Hash: fddb709fe4a1b7e3bb6eda9662e0779279b58f522ad42de317fca39f37a0c6b5
                                      • Instruction Fuzzy Hash: 84114871510208BFDB20CF64DC409AFBBBCEF45741F10486AE805E7250D6729E449768
                                      APIs
                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 03891ACD
                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03891AF1
                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03891B13
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2116592061.0000000003890000.00000040.00001000.00020000.00000000.sdmp, Offset: 03890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3890000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                      • String ID:
                                      • API String ID: 2438371351-0
                                      • Opcode ID: 4a62210935fbc19ac52c28b7856ac9112c9a9e608a38d15f0a7da1a89c903d0f
                                      • Instruction ID: 4faf08538125106c3de4b8bdb793ae827863006675e6769fee017fec01c7d481
                                      • Opcode Fuzzy Hash: 4a62210935fbc19ac52c28b7856ac9112c9a9e608a38d15f0a7da1a89c903d0f
                                      • Instruction Fuzzy Hash: 31622B34A18219DBEB24CFA4C844BDEB376EF58700F1491A9D10DEB390E7799E81CB59
                                      APIs
                                        • Part of subcall function 00404EE5: _fseek.LIBCMT ref: 00404EFD
                                        • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469824
                                        • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469837
                                      • _free.LIBCMT ref: 004696A2
                                      • _free.LIBCMT ref: 004696A9
                                      • _free.LIBCMT ref: 00469714
                                        • Part of subcall function 00422D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00429A24), ref: 00422D69
                                        • Part of subcall function 00422D55: GetLastError.KERNEL32(00000000,?,00429A24), ref: 00422D7B
                                      • _free.LIBCMT ref: 0046971C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                      • String ID:
                                      • API String ID: 1552873950-0
                                      • Opcode ID: 50af52b8f22919c11c7515362fb071ee60fc7e1c9e9e4129b0e36dbf2dd802cb
                                      • Instruction ID: ca2eec8eb8578c2366e6fbf42eaf411172dd757ca1b938988fe54b4571807f9b
                                      • Opcode Fuzzy Hash: 50af52b8f22919c11c7515362fb071ee60fc7e1c9e9e4129b0e36dbf2dd802cb
                                      • Instruction Fuzzy Hash: 88515EB1904219ABDF249F65DC81A9EBB79EF88304F1044AEF209A3241DB755E90CF59
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                      • String ID:
                                      • API String ID: 2782032738-0
                                      • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                      • Instruction ID: 7e2b6cc7ad03bd9c76499a1e37937a2f988b0f8539bc111f38111bac958280d8
                                      • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                      • Instruction Fuzzy Hash: 9341D434B006659BDB189F69E88096F7BA5EFC2364B50813FE82587640DB78DD418B48
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID: AU3!P/I$EA06
                                      • API String ID: 4104443479-1914660620
                                      • Opcode ID: 16f5da041bfe5336b7d6228a32569345bac751845b8ec38fb7b22f9adfc250c8
                                      • Instruction ID: ff6ab1fe0fa27ea81cbcababf34b5742e04188ff143208347500ec0318cc5285
                                      • Opcode Fuzzy Hash: 16f5da041bfe5336b7d6228a32569345bac751845b8ec38fb7b22f9adfc250c8
                                      • Instruction Fuzzy Hash: F1418AB1A0415867DB219B6498517BF7BA19FC5304F28407BEE82BB3C2D63C5D4583AA
                                      APIs
                                      • _memset.LIBCMT ref: 0043EA39
                                      • GetOpenFileNameW.COMDLG32(?), ref: 0043EA83
                                        • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                        • Part of subcall function 00420791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004207B0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Name$Path$FileFullLongOpen_memset
                                      • String ID: X
                                      • API String ID: 3777226403-3081909835
                                      • Opcode ID: f7a2dfced1c7fac4da1122c6cfde17308801e93c3a8658db5658365851755d62
                                      • Instruction ID: baa1e7331fae4d359aac7897d23b5e8ce5a65ce190648e6f88e75d23560a4c0c
                                      • Opcode Fuzzy Hash: f7a2dfced1c7fac4da1122c6cfde17308801e93c3a8658db5658365851755d62
                                      • Instruction Fuzzy Hash: 4421A471A102589BCB41DF95D845BDE7BF8AF49314F00806FE508B7281DBB85989CFAA
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __fread_nolock_memmove
                                      • String ID: EA06
                                      • API String ID: 1988441806-3962188686
                                      • Opcode ID: 12b9eb2746c946ee24d761f12b33ae587f64773302ff2959e1666c5e9a364bcc
                                      • Instruction ID: 3cd15271acb3b06ac884f373c06a49f445b450121f82016c471601618c020999
                                      • Opcode Fuzzy Hash: 12b9eb2746c946ee24d761f12b33ae587f64773302ff2959e1666c5e9a364bcc
                                      • Instruction Fuzzy Hash: 8F01F9719042287EDB18CAA9D816EFE7BFCDB11301F00459FF552D2181E878E6048764
                                      APIs
                                      • GetTempPathW.KERNEL32(00000104,?), ref: 004698F8
                                      • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0046990F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Temp$FileNamePath
                                      • String ID: aut
                                      • API String ID: 3285503233-3010740371
                                      • Opcode ID: d3e801ab242beb6fec4b4f89e1aaff04be832202f3ef9fc21f6b566375e79959
                                      • Instruction ID: d76eb4abf93f0e171a782776cb2de2514a1bc3ee8d101bd4a6c1c3d5b9ef8161
                                      • Opcode Fuzzy Hash: d3e801ab242beb6fec4b4f89e1aaff04be832202f3ef9fc21f6b566375e79959
                                      • Instruction Fuzzy Hash: D0D05E7954030DABDB50ABA0DC0EFDA773CE704700F0006F5BA54D10A1EAB1A5988BA9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bf39c0aeb8de4ec05ce974e713a19d7eb12ea51f3f860088833816695d615087
                                      • Instruction ID: 208f182f3c9136cc863dec11eab3d0960db0a10b8073f2b3425ab1c058278d8f
                                      • Opcode Fuzzy Hash: bf39c0aeb8de4ec05ce974e713a19d7eb12ea51f3f860088833816695d615087
                                      • Instruction Fuzzy Hash: 8AF13A716083019FC714DF29C480A6ABBE5FF88318F54892EF8999B392D734E945CF86
                                      APIs
                                      • _memset.LIBCMT ref: 00404370
                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00404415
                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00404432
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: IconNotifyShell_$_memset
                                      • String ID:
                                      • API String ID: 1505330794-0
                                      • Opcode ID: 55e578eaf81f1082cb721cb8179a93cbba9ea3621e04278649df261dfa9eaab8
                                      • Instruction ID: 448a70bf35e4549ae47872dc9eb977fea889799f7ce089bf6dae1479d4278b9a
                                      • Opcode Fuzzy Hash: 55e578eaf81f1082cb721cb8179a93cbba9ea3621e04278649df261dfa9eaab8
                                      • Instruction Fuzzy Hash: 4E3184B05047019FD760DF24D884A9BBBF8FB98308F00093FEA9A92391D7746944CB5A
                                      APIs
                                      • __FF_MSGBANNER.LIBCMT ref: 00425733
                                        • Part of subcall function 0042A16B: __NMSG_WRITE.LIBCMT ref: 0042A192
                                        • Part of subcall function 0042A16B: __NMSG_WRITE.LIBCMT ref: 0042A19C
                                      • __NMSG_WRITE.LIBCMT ref: 0042573A
                                        • Part of subcall function 0042A1C8: GetModuleFileNameW.KERNEL32(00000000,004C33BA,00000104,?,00000001,00000000), ref: 0042A25A
                                        • Part of subcall function 0042A1C8: ___crtMessageBoxW.LIBCMT ref: 0042A308
                                        • Part of subcall function 0042309F: ___crtCorExitProcess.LIBCMT ref: 004230A5
                                        • Part of subcall function 0042309F: ExitProcess.KERNEL32 ref: 004230AE
                                        • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                      • RtlAllocateHeap.NTDLL(00E90000,00000000,00000001,00000000,?,?,?,00420DD3,?), ref: 0042575F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                      • String ID:
                                      • API String ID: 1372826849-0
                                      • Opcode ID: 173bc1eb0939af60788e3920f729a181213a4711687b08a62f5fb4dd74449d1b
                                      • Instruction ID: 12628286b9c33790f0bcaf27d243d0f78d5a939af01e39ac9af769d2403f214a
                                      • Opcode Fuzzy Hash: 173bc1eb0939af60788e3920f729a181213a4711687b08a62f5fb4dd74449d1b
                                      • Instruction Fuzzy Hash: 8101D235380B31DADA102B36BC42A2E67588BC2766FD0043FF9059A281DE7C9D01866D
                                      APIs
                                      • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00469548,?,?,?,?,?,00000004), ref: 004698BB
                                      • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00469548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 004698D1
                                      • CloseHandle.KERNEL32(00000000,?,00469548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 004698D8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: File$CloseCreateHandleTime
                                      • String ID:
                                      • API String ID: 3397143404-0
                                      • Opcode ID: bd87c49bddbed0dd2230edd6d70eff61a4bb717c0cd42ce1b208173b53aacf55
                                      • Instruction ID: c759ec0fed9c3a555ac5ec6521767d99e991bc38b38178bd45d0c2782cb34c4e
                                      • Opcode Fuzzy Hash: bd87c49bddbed0dd2230edd6d70eff61a4bb717c0cd42ce1b208173b53aacf55
                                      • Instruction Fuzzy Hash: 6EE08632140214B7D7212B54EC0DFDE7B19EB06760F144535FF14A90E087B12925979C
                                      APIs
                                      • _free.LIBCMT ref: 00468D1B
                                        • Part of subcall function 00422D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00429A24), ref: 00422D69
                                        • Part of subcall function 00422D55: GetLastError.KERNEL32(00000000,?,00429A24), ref: 00422D7B
                                      • _free.LIBCMT ref: 00468D2C
                                      • _free.LIBCMT ref: 00468D3E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: c56cf7ee783aa8295308e84720220828ccc4d403300e1e82c1220f1652f177a4
                                      • Instruction ID: 6b151060fb8ed88ed9ffdc5938a612973e117ec8253147f08314cae1c0c73c84
                                      • Opcode Fuzzy Hash: c56cf7ee783aa8295308e84720220828ccc4d403300e1e82c1220f1652f177a4
                                      • Instruction Fuzzy Hash: 10E0C2B170171253CB20A579BA40A8313DC4F4C3967440A0FB40DD7282DEACF842803C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: CALL
                                      • API String ID: 0-4196123274
                                      • Opcode ID: 2afe63c8bdd9a74ddce146e2b87d36e1758f744257439f75635e53a533a40e58
                                      • Instruction ID: c803bb07f2a617980fc862d1973d54e65b33ee20ceb4547c7cbfd92c67e19f3b
                                      • Opcode Fuzzy Hash: 2afe63c8bdd9a74ddce146e2b87d36e1758f744257439f75635e53a533a40e58
                                      • Instruction Fuzzy Hash: 8A225B70608301DFD724DF14C454A6AB7E1FF44308F15896EE98AAB3A2D739EC55CB8A
                                      APIs
                                      • IsThemeActive.UXTHEME ref: 00404834
                                        • Part of subcall function 0042336C: __lock.LIBCMT ref: 00423372
                                        • Part of subcall function 0042336C: DecodePointer.KERNEL32(00000001,?,00404849,00457C74), ref: 0042337E
                                        • Part of subcall function 0042336C: EncodePointer.KERNEL32(?,?,00404849,00457C74), ref: 00423389
                                        • Part of subcall function 004048FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00404915
                                        • Part of subcall function 004048FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040492A
                                        • Part of subcall function 00403B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00403B68
                                        • Part of subcall function 00403B3A: IsDebuggerPresent.KERNEL32 ref: 00403B7A
                                        • Part of subcall function 00403B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,004C52F8,004C52E0,?,?), ref: 00403BEB
                                        • Part of subcall function 00403B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00403C6F
                                      • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00404874
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                      • String ID:
                                      • API String ID: 1438897964-0
                                      • Opcode ID: 13bbe0c74f5194e49c071aa5a0b14ab81aac5f2f5d26dabd82ae82306b4d1084
                                      • Instruction ID: 9525eea27cfe2a06ee6bb0b94f8a439f0fec78f72a1223afaaa4f4cc7b3f6ca0
                                      • Opcode Fuzzy Hash: 13bbe0c74f5194e49c071aa5a0b14ab81aac5f2f5d26dabd82ae82306b4d1084
                                      • Instruction Fuzzy Hash: 96118E729143019BC700EF69E80591EBBE8EB95754F10893FF440932B2DB749A49CB9E
                                      APIs
                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00405821,?,?,?,?), ref: 00405CC7
                                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00405821,?,?,?,?), ref: 0043DD73
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: aed05ab6a1b88559d57bbe8f1293197c90d85f92c05dbd21c07c0e87b90c3386
                                      • Instruction ID: 3e9ad2372c7cfb2b297ed5c82f770502f6fc7a31e1f40b0728b8e52e39df89fe
                                      • Opcode Fuzzy Hash: aed05ab6a1b88559d57bbe8f1293197c90d85f92c05dbd21c07c0e87b90c3386
                                      • Instruction Fuzzy Hash: 9A018870144708BEF7201E24CC8AF673ADCEB05768F10832AFAD56A1D0C6B81C458F58
                                      APIs
                                        • Part of subcall function 0042571C: __FF_MSGBANNER.LIBCMT ref: 00425733
                                        • Part of subcall function 0042571C: __NMSG_WRITE.LIBCMT ref: 0042573A
                                        • Part of subcall function 0042571C: RtlAllocateHeap.NTDLL(00E90000,00000000,00000001,00000000,?,?,?,00420DD3,?), ref: 0042575F
                                      • std::exception::exception.LIBCMT ref: 00420DEC
                                      • __CxxThrowException@8.LIBCMT ref: 00420E01
                                        • Part of subcall function 0042859B: RaiseException.KERNEL32(?,?,?,004B9E78,00000000,?,?,?,?,00420E06,?,004B9E78,?,00000001), ref: 004285F0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                      • String ID:
                                      • API String ID: 3902256705-0
                                      • Opcode ID: 87bb70d5579a02d49aac5620635c4af45f8313e50e00e2e64927f1571595629b
                                      • Instruction ID: 7ce0db18d3e86308d2e94e4ef4c1f65fcbea9f9514d772724804ad69f7891851
                                      • Opcode Fuzzy Hash: 87bb70d5579a02d49aac5620635c4af45f8313e50e00e2e64927f1571595629b
                                      • Instruction Fuzzy Hash: BAF0863560223976CB10BA95FD015DF7BE89F01315F90452FF90496282DFB89A8091DD
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __lock_file_memset
                                      • String ID:
                                      • API String ID: 26237723-0
                                      • Opcode ID: ba8f5e451a8ec4a75135d94e347059916301475a1d87ff8d947c1e1db94b3a7d
                                      • Instruction ID: eb59cd814e1449f2521413b7bdb600bd306f3e119aeaedc73612e9d55c5f6ff2
                                      • Opcode Fuzzy Hash: ba8f5e451a8ec4a75135d94e347059916301475a1d87ff8d947c1e1db94b3a7d
                                      • Instruction Fuzzy Hash: B901D871A01624ABCF21AF66BC0259F7B61AF50325FD0411FB81817251DB398551DF59
                                      APIs
                                        • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                      • __lock_file.LIBCMT ref: 004253EB
                                        • Part of subcall function 00426C11: __lock.LIBCMT ref: 00426C34
                                      • __fclose_nolock.LIBCMT ref: 004253F6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                      • String ID:
                                      • API String ID: 2800547568-0
                                      • Opcode ID: 835793fb4b5a24fbea1eeed30733b59c67049ef9a82bceb899d9520eea3a16f0
                                      • Instruction ID: fafcd99f2ade88ab86af259f2ce8aa17897398df1327fb2dd29172a4384519b5
                                      • Opcode Fuzzy Hash: 835793fb4b5a24fbea1eeed30733b59c67049ef9a82bceb899d9520eea3a16f0
                                      • Instruction Fuzzy Hash: 56F09C71B026249AD710BF66780579D66E06F41378FA1914FE814E71C1CFBC49419B5E
                                      APIs
                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 03891ACD
                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03891AF1
                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03891B13
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2116592061.0000000003890000.00000040.00001000.00020000.00000000.sdmp, Offset: 03890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3890000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                      • String ID:
                                      • API String ID: 2438371351-0
                                      • Opcode ID: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                                      • Instruction ID: d32f1a721390c3ad961bb4eac615a82a7f615b915b992b3e90a47f867d7da249
                                      • Opcode Fuzzy Hash: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                                      • Instruction Fuzzy Hash: FB12CE24E18658C6EB24DF64D8547DEB232EF68300F1090E9D10DEB7A5E77A4E81CF5A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e4de2e2d03d8a1cfc152d54f1212043f51e6c6ddac13aaa9f3635d4fd650aba1
                                      • Instruction ID: 6b63161941b3488df7078e909ce163a2a1fa0d71039c57995929c397e8c210d0
                                      • Opcode Fuzzy Hash: e4de2e2d03d8a1cfc152d54f1212043f51e6c6ddac13aaa9f3635d4fd650aba1
                                      • Instruction Fuzzy Hash: 4C51D234700604AFDF14EF65C981EAE77A6AF45318F15816EF906AB382DA38ED01CB49
                                      APIs
                                      • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00405B96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: 0a56fba6add9114e978367d08c36dc312f4c33068dc276e25079fb3dbbe776f4
                                      • Instruction ID: 1b656b166a304b9d337e3dd4d9fe6df5e0790be29ec59920d2bb6ad29cb972c8
                                      • Opcode Fuzzy Hash: 0a56fba6add9114e978367d08c36dc312f4c33068dc276e25079fb3dbbe776f4
                                      • Instruction Fuzzy Hash: F0315C31A00A09AFDB18DF6DC480A6EB7B5FF48310F14866AD815A3754D774B990CF95
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ClearVariant
                                      • String ID:
                                      • API String ID: 1473721057-0
                                      • Opcode ID: 97021d4f32bf3e563f1c3d98945ec58ba0baed1b1e7fd12fc4625a598daddbb7
                                      • Instruction ID: 88ec2210b97eaeb66bd16e67604d6e353b3070822350be419431805434595ad1
                                      • Opcode Fuzzy Hash: 97021d4f32bf3e563f1c3d98945ec58ba0baed1b1e7fd12fc4625a598daddbb7
                                      • Instruction Fuzzy Hash: 24414C746083419FDB14DF14C444B1ABBE1BF45318F0988ADE8999B362C739EC45CF4A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID:
                                      • API String ID: 4104443479-0
                                      • Opcode ID: 6dc17c72b4f7d30803e79318b6c4fafb2251f9d93ece774b7f80856152c7d42e
                                      • Instruction ID: 5aee7fa9bcd607eba38c972a5a3afb297840d704fa760c95cbb8f93a96c2956d
                                      • Opcode Fuzzy Hash: 6dc17c72b4f7d30803e79318b6c4fafb2251f9d93ece774b7f80856152c7d42e
                                      • Instruction Fuzzy Hash: 2821D471910A08EBCB009F52F84076A7BB8FB09310F21957BE485D5151DB7494D0D74E
                                      APIs
                                        • Part of subcall function 00404BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00404BEF
                                        • Part of subcall function 0042525B: __wfsopen.LIBCMT ref: 00425266
                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E0F
                                        • Part of subcall function 00404B6A: FreeLibrary.KERNEL32(00000000), ref: 00404BA4
                                        • Part of subcall function 00404C70: _memmove.LIBCMT ref: 00404CBA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Library$Free$Load__wfsopen_memmove
                                      • String ID:
                                      • API String ID: 1396898556-0
                                      • Opcode ID: 38ec5427debe44dbaf010247b0005924d02b12c3bdd9824270641944ab0405bf
                                      • Instruction ID: 9236aa628d2d192556c2689c07174e5c913df1e85eea92ba98d954e2704214a9
                                      • Opcode Fuzzy Hash: 38ec5427debe44dbaf010247b0005924d02b12c3bdd9824270641944ab0405bf
                                      • Instruction Fuzzy Hash: 8511C471600205ABCF14BF71C812FAE77A8AFC4718F10883FF641B71C1DA79AA059B99
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ClearVariant
                                      • String ID:
                                      • API String ID: 1473721057-0
                                      • Opcode ID: d91c9a0b3bf6359c916e12f661e99ff5d5878bbf1d500bec4267ef2357e72d6d
                                      • Instruction ID: 88ab595809d02070da327240463ca908ecab152c49247d70464b3f23f3751fdf
                                      • Opcode Fuzzy Hash: d91c9a0b3bf6359c916e12f661e99ff5d5878bbf1d500bec4267ef2357e72d6d
                                      • Instruction Fuzzy Hash: 4C214874508301DFDB14DF24C444A1ABBE1BF88314F05886DF88957762C739E815CB9B
                                      APIs
                                      • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,004056A7,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00405C16
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: 004768512cec5bb2a12ad018666046467aa459102812d405fbf65d0c4fac9fff
                                      • Instruction ID: 772d3f2de97e4a3295a634e8ff1b07ab9ba467494f4d4c1bb2e9b048b5294e56
                                      • Opcode Fuzzy Hash: 004768512cec5bb2a12ad018666046467aa459102812d405fbf65d0c4fac9fff
                                      • Instruction Fuzzy Hash: C5112831204B049FE3208F19C880B67B7F8EB44764F10C92EE9AA96A91D774F845CF64
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID:
                                      • API String ID: 4104443479-0
                                      • Opcode ID: 9f3ded07322f352e8a10de6e5b29e511e5eed242f4c9ed39c3b1c7becfd31a48
                                      • Instruction ID: b26529ee9b914c12feaffd8856b12b4ff76ce3a38eeed91d3c5b717ccaf7fb48
                                      • Opcode Fuzzy Hash: 9f3ded07322f352e8a10de6e5b29e511e5eed242f4c9ed39c3b1c7becfd31a48
                                      • Instruction Fuzzy Hash: 7E01DFB9300902AFC301EB29D441D26F7A9FF8A314714812EE818C7702DB38EC21CBE4
                                      APIs
                                      • __lock_file.LIBCMT ref: 004248A6
                                        • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __getptd_noexit__lock_file
                                      • String ID:
                                      • API String ID: 2597487223-0
                                      • Opcode ID: 067e945b42619cd5e532bb4c940c68e511b21f2bac583ba92795690b8c8a8ee6
                                      • Instruction ID: a5fe8b5ebddeabdc03b7defa85b5706b3c04092d14be9d7edba4dc341e0ab760
                                      • Opcode Fuzzy Hash: 067e945b42619cd5e532bb4c940c68e511b21f2bac583ba92795690b8c8a8ee6
                                      • Instruction Fuzzy Hash: B4F0F431B11224EBDF11BFB2AC053AE36A0EF41328F91440EF42096281DB7C8951DB5D
                                      APIs
                                      • FreeLibrary.KERNEL32(?,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E7E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FreeLibrary
                                      • String ID:
                                      • API String ID: 3664257935-0
                                      • Opcode ID: 5e403c8a90df1ee0e06371f2d57000cd02bd76b5d635224a6d232ab0319aed21
                                      • Instruction ID: e65952a518aebd30c2be6c87fe4ab6250acd6cacf129c027b051fb699af34d37
                                      • Opcode Fuzzy Hash: 5e403c8a90df1ee0e06371f2d57000cd02bd76b5d635224a6d232ab0319aed21
                                      • Instruction Fuzzy Hash: 85F01CB1501711CFCB349F64E494817B7E1BF94369320893FE2D692650C7359844DB84
                                      APIs
                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004207B0
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: LongNamePath_memmove
                                      • String ID:
                                      • API String ID: 2514874351-0
                                      • Opcode ID: 5311bc10bcd02c3da6376a961da6fa5eeea3c1e89524b7fc1d9ecfef85fbf38f
                                      • Instruction ID: 9246c12fdc37fcd41ca4db90d4c6e7f6585ba1f285f6c4ea688713946de2f6cd
                                      • Opcode Fuzzy Hash: 5311bc10bcd02c3da6376a961da6fa5eeea3c1e89524b7fc1d9ecfef85fbf38f
                                      • Instruction Fuzzy Hash: F5E0263290012817C720E2599C05FEA77ACDF882A0F0401BAFC0CD3204D964AC808694
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __fread_nolock
                                      • String ID:
                                      • API String ID: 2638373210-0
                                      • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                      • Instruction ID: 3b5d1e22e3b7b83ea6e308f8ce2403907d65c91d4ff9c09852f69d04d9ef645c
                                      • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                      • Instruction Fuzzy Hash: BDE092B0204B005BD7388A24D800BA373E1AB05304F00091EF2AAC3341EB67B841C75D
                                      APIs
                                      • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,0043DD42,?,?,00000000), ref: 00405C5F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: 14cfb4b96d04a2f7cb021406aaf56b6dbb63ecfee093867407aa16a4735cb87b
                                      • Instruction ID: 2996e6a09d4b0f83628727b5f35a7304175fa4664712b8752db8e98aaff89e7d
                                      • Opcode Fuzzy Hash: 14cfb4b96d04a2f7cb021406aaf56b6dbb63ecfee093867407aa16a4735cb87b
                                      • Instruction Fuzzy Hash: 75D0C77464020CBFE710DB80DC46FAD777CD705710F200194FD0456290D6B27D548795
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __wfsopen
                                      • String ID:
                                      • API String ID: 197181222-0
                                      • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                      • Instruction ID: 26467e9723955137fe9c45439b6ceb4f873de5a2d7ef111d81715968119f48b2
                                      • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                      • Instruction Fuzzy Hash: 99B0927654020CB7CE012A82FC02A593B199B41768F8080A1FB0C181A2A677A6649A99
                                      APIs
                                      • GetLastError.KERNEL32(00000002,00000000), ref: 0046D1FF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorLast
                                      • String ID:
                                      • API String ID: 1452528299-0
                                      • Opcode ID: d81b8c3b7d84a9f245ed8a40e92f49507cf5ef320bf31692410e98e754887602
                                      • Instruction ID: fca64642930eea01f473371421ac76cd1d6e5c7f539a83d07f9f97c05c5cdcbf
                                      • Opcode Fuzzy Hash: d81b8c3b7d84a9f245ed8a40e92f49507cf5ef320bf31692410e98e754887602
                                      • Instruction Fuzzy Hash: 9D717674A043018FC704EF65C491A6AB7E0EF85318F04496EF996973A2DB38ED45CB5B
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                      • Instruction ID: 57d61025d726f571206bde1542701663147cad70cf876be0f0a1b4f50b8a7032
                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                      • Instruction Fuzzy Hash: 9031E7B0B001159BC71CDF0AE484A6AF7E5FB49300BA48696E40ACB356D635EDC1DB89
                                      APIs
                                      • Sleep.KERNELBASE(000001F4), ref: 038922B1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2116592061.0000000003890000.00000040.00001000.00020000.00000000.sdmp, Offset: 03890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3890000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                      • Instruction ID: df8b062fcf7db1358f0a5c4557dcca62b1ca1632a21d91a3a4f47a48d5dd6624
                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                      • Instruction Fuzzy Hash: 89E0E67494010EEFDB00EFF8D94969E7FB4EF04301F1005A1FD01D2280D6309D508A72
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0048CB37
                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0048CB95
                                      • GetWindowLongW.USER32(?,000000F0), ref: 0048CBD6
                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0048CC00
                                      • SendMessageW.USER32 ref: 0048CC29
                                      • _wcsncpy.LIBCMT ref: 0048CC95
                                      • GetKeyState.USER32(00000011), ref: 0048CCB6
                                      • GetKeyState.USER32(00000009), ref: 0048CCC3
                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0048CCD9
                                      • GetKeyState.USER32(00000010), ref: 0048CCE3
                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0048CD0C
                                      • SendMessageW.USER32 ref: 0048CD33
                                      • SendMessageW.USER32(?,00001030,?,0048B348), ref: 0048CE37
                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0048CE4D
                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0048CE60
                                      • SetCapture.USER32(?), ref: 0048CE69
                                      • ClientToScreen.USER32(?,?), ref: 0048CECE
                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0048CEDB
                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0048CEF5
                                      • ReleaseCapture.USER32 ref: 0048CF00
                                      • GetCursorPos.USER32(?), ref: 0048CF3A
                                      • ScreenToClient.USER32(?,?), ref: 0048CF47
                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0048CFA3
                                      • SendMessageW.USER32 ref: 0048CFD1
                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0048D00E
                                      • SendMessageW.USER32 ref: 0048D03D
                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0048D05E
                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0048D06D
                                      • GetCursorPos.USER32(?), ref: 0048D08D
                                      • ScreenToClient.USER32(?,?), ref: 0048D09A
                                      • GetParent.USER32(?), ref: 0048D0BA
                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0048D123
                                      • SendMessageW.USER32 ref: 0048D154
                                      • ClientToScreen.USER32(?,?), ref: 0048D1B2
                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0048D1E2
                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0048D20C
                                      • SendMessageW.USER32 ref: 0048D22F
                                      • ClientToScreen.USER32(?,?), ref: 0048D281
                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0048D2B5
                                        • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                      • GetWindowLongW.USER32(?,000000F0), ref: 0048D351
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                      • String ID: @GUI_DRAGID$F$PY$pbL
                                      • API String ID: 3977979337-2820081963
                                      • Opcode ID: 1caa29f66c07aeaac961bf0f309f85b3cad2f84c41591bcb7e9ea1e4fbcca684
                                      • Instruction ID: aa2ec0652ddf211ac3aa7531e5acae26c7b16f0e73498be5a03c601873f34f9f
                                      • Opcode Fuzzy Hash: 1caa29f66c07aeaac961bf0f309f85b3cad2f84c41591bcb7e9ea1e4fbcca684
                                      • Instruction Fuzzy Hash: FE42DE74604640AFC720EF24D888EAEBBE5FF48310F140A2EF559973A1C735E855DB6A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove$_memset
                                      • String ID: ]K$3cA$DEFINE$P\K$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_A
                                      • API String ID: 1357608183-1426331590
                                      • Opcode ID: b28a790e45669a4902d64bf1598fd7c3bcb7bf2305bb98875f8069baf6f44106
                                      • Instruction ID: 24ac3008a4780d7342888deeabfce4e0a58b67e9339f094d14e98286774badb8
                                      • Opcode Fuzzy Hash: b28a790e45669a4902d64bf1598fd7c3bcb7bf2305bb98875f8069baf6f44106
                                      • Instruction Fuzzy Hash: A193A471A002199BDB24CF58C8817EEB7B1FF48315F24815BED45AB392E7789D86CB48
                                      APIs
                                      • GetForegroundWindow.USER32(00000000,?), ref: 004048DF
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0043D665
                                      • IsIconic.USER32(?), ref: 0043D66E
                                      • ShowWindow.USER32(?,00000009), ref: 0043D67B
                                      • SetForegroundWindow.USER32(?), ref: 0043D685
                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0043D69B
                                      • GetCurrentThreadId.KERNEL32 ref: 0043D6A2
                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043D6AE
                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0043D6BF
                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0043D6C7
                                      • AttachThreadInput.USER32(00000000,?,00000001), ref: 0043D6CF
                                      • SetForegroundWindow.USER32(?), ref: 0043D6D2
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D6E7
                                      • keybd_event.USER32(00000012,00000000), ref: 0043D6F2
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D6FC
                                      • keybd_event.USER32(00000012,00000000), ref: 0043D701
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D70A
                                      • keybd_event.USER32(00000012,00000000), ref: 0043D70F
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D719
                                      • keybd_event.USER32(00000012,00000000), ref: 0043D71E
                                      • SetForegroundWindow.USER32(?), ref: 0043D721
                                      • AttachThreadInput.USER32(?,?,00000000), ref: 0043D748
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 4125248594-2988720461
                                      • Opcode ID: c65cf632393a49513bea40c5a00901192d62317a1410f3ef3d84c68e5820f373
                                      • Instruction ID: c1ca6a344bcdfaba0e974823023d667c19296b4d148af4653ab9434bf50545cf
                                      • Opcode Fuzzy Hash: c65cf632393a49513bea40c5a00901192d62317a1410f3ef3d84c68e5820f373
                                      • Instruction Fuzzy Hash: AE319671A40318BBEB206F619C49F7F7F6CEB48B50F10443AFA04EA1D1D6B45D11ABA9
                                      APIs
                                        • Part of subcall function 004587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                        • Part of subcall function 004587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                        • Part of subcall function 004587E1: GetLastError.KERNEL32 ref: 00458865
                                      • _memset.LIBCMT ref: 00458353
                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 004583A5
                                      • CloseHandle.KERNEL32(?), ref: 004583B6
                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004583CD
                                      • GetProcessWindowStation.USER32 ref: 004583E6
                                      • SetProcessWindowStation.USER32(00000000), ref: 004583F0
                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0045840A
                                        • Part of subcall function 004581CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00458309), ref: 004581E0
                                        • Part of subcall function 004581CB: CloseHandle.KERNEL32(?,?,00458309), ref: 004581F2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                      • String ID: $default$winsta0
                                      • API String ID: 2063423040-1027155976
                                      • Opcode ID: 3a53f2d67c23753e165086b43acb0b13e7b8bfd62fe5a953519ecd0bbab698eb
                                      • Instruction ID: 3323b63beeccf06d974511bf231c05544c13643482a2b8641c754c26865e528a
                                      • Opcode Fuzzy Hash: 3a53f2d67c23753e165086b43acb0b13e7b8bfd62fe5a953519ecd0bbab698eb
                                      • Instruction Fuzzy Hash: F3814871900209BFDF119FA5DC45AEE7B78AF08305F14416EFC10B6262EF399A19DB28
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?), ref: 0046C78D
                                      • FindClose.KERNEL32(00000000), ref: 0046C7E1
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0046C806
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0046C81D
                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0046C844
                                      • __swprintf.LIBCMT ref: 0046C890
                                      • __swprintf.LIBCMT ref: 0046C8D3
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                      • __swprintf.LIBCMT ref: 0046C927
                                        • Part of subcall function 00423698: __woutput_l.LIBCMT ref: 004236F1
                                      • __swprintf.LIBCMT ref: 0046C975
                                        • Part of subcall function 00423698: __flsbuf.LIBCMT ref: 00423713
                                        • Part of subcall function 00423698: __flsbuf.LIBCMT ref: 0042372B
                                      • __swprintf.LIBCMT ref: 0046C9C4
                                      • __swprintf.LIBCMT ref: 0046CA13
                                      • __swprintf.LIBCMT ref: 0046CA62
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                      • API String ID: 3953360268-2428617273
                                      • Opcode ID: 150219efb076c8e31d38ec05fe3cc4f6cd7d907c04efca016fb2ae6b0515fe65
                                      • Instruction ID: 7d9c3182f1c50569ad22dcb29b7867164fdd6ce968260aea251e7ba13e5350ae
                                      • Opcode Fuzzy Hash: 150219efb076c8e31d38ec05fe3cc4f6cd7d907c04efca016fb2ae6b0515fe65
                                      • Instruction Fuzzy Hash: AFA13EB1504304ABC710EFA5C885DAFB7ECFF94708F40492EF585D6192EA38DA08CB66
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0046EFB6
                                      • _wcscmp.LIBCMT ref: 0046EFCB
                                      • _wcscmp.LIBCMT ref: 0046EFE2
                                      • GetFileAttributesW.KERNEL32(?), ref: 0046EFF4
                                      • SetFileAttributesW.KERNEL32(?,?), ref: 0046F00E
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0046F026
                                      • FindClose.KERNEL32(00000000), ref: 0046F031
                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0046F04D
                                      • _wcscmp.LIBCMT ref: 0046F074
                                      • _wcscmp.LIBCMT ref: 0046F08B
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0046F09D
                                      • SetCurrentDirectoryW.KERNEL32(004B8920), ref: 0046F0BB
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046F0C5
                                      • FindClose.KERNEL32(00000000), ref: 0046F0D2
                                      • FindClose.KERNEL32(00000000), ref: 0046F0E4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                      • String ID: *.*
                                      • API String ID: 1803514871-438819550
                                      • Opcode ID: 6ca42bdee5e764a2d4c938babfd9147ccfee36eb28773e9f100ec5c7d0d625b2
                                      • Instruction ID: e0d4b25dfa95f140917fd6c0b332215adfde449a0ea65fd213ed944f24ec6cf3
                                      • Opcode Fuzzy Hash: 6ca42bdee5e764a2d4c938babfd9147ccfee36eb28773e9f100ec5c7d0d625b2
                                      • Instruction Fuzzy Hash: EC31E7325011187ADF14EFA4EC48AEF77AC9F44360F10057BE844D2191EB79DA88CB6E
                                      APIs
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00480953
                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,0048F910,00000000,?,00000000,?,?), ref: 004809C1
                                      • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00480A09
                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00480A92
                                      • RegCloseKey.ADVAPI32(?), ref: 00480DB2
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00480DBF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Close$ConnectCreateRegistryValue
                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                      • API String ID: 536824911-966354055
                                      • Opcode ID: 48b2887cb0eff9e66e47d371a5f3cf713fc0fd43f119af82fd19e54f7d076c5b
                                      • Instruction ID: 75f0257f13d9dd97868b06569ad7b6a65722ecc89240c550ead6eefe92fcdcfb
                                      • Opcode Fuzzy Hash: 48b2887cb0eff9e66e47d371a5f3cf713fc0fd43f119af82fd19e54f7d076c5b
                                      • Instruction Fuzzy Hash: 3E023A756106119FCB54EF15D841E2AB7E5FF89314F04886EF8899B3A2CB38EC45CB89
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0DJ$0EJ$0FJ$3cA$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGJ$_A
                                      • API String ID: 0-559809668
                                      • Opcode ID: 6a8c43c5cd2287656802195d535ea908290b48d8ab3bfd826a36c9d68e310c78
                                      • Instruction ID: 6096d484c95c14ad7aa8192e29e4e3e8d71b99b3f093478e4f466f6acf52d5c9
                                      • Opcode Fuzzy Hash: 6a8c43c5cd2287656802195d535ea908290b48d8ab3bfd826a36c9d68e310c78
                                      • Instruction Fuzzy Hash: 13727E75E002199BDB14CF59C8807EEB7B5FF48311F15816BE809EB291E7389E85CB98
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0046F113
                                      • _wcscmp.LIBCMT ref: 0046F128
                                      • _wcscmp.LIBCMT ref: 0046F13F
                                        • Part of subcall function 00464385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 004643A0
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0046F16E
                                      • FindClose.KERNEL32(00000000), ref: 0046F179
                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0046F195
                                      • _wcscmp.LIBCMT ref: 0046F1BC
                                      • _wcscmp.LIBCMT ref: 0046F1D3
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0046F1E5
                                      • SetCurrentDirectoryW.KERNEL32(004B8920), ref: 0046F203
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046F20D
                                      • FindClose.KERNEL32(00000000), ref: 0046F21A
                                      • FindClose.KERNEL32(00000000), ref: 0046F22C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                      • String ID: *.*
                                      • API String ID: 1824444939-438819550
                                      • Opcode ID: 5e4c1ca136502ca1550e0c7352cbc5842e7fcfe98f56b9ff86b85f6952a77760
                                      • Instruction ID: 359f8111c83e04d014ff149dee767818393646aa3285bf91305061d844a33625
                                      • Opcode Fuzzy Hash: 5e4c1ca136502ca1550e0c7352cbc5842e7fcfe98f56b9ff86b85f6952a77760
                                      • Instruction Fuzzy Hash: 1031C3365001196ADF10AEA4FC54AEE77AC9F45360F2005BBE844A2190EA39DE89CA6D
                                      APIs
                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0046A20F
                                      • __swprintf.LIBCMT ref: 0046A231
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0046A26E
                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0046A293
                                      • _memset.LIBCMT ref: 0046A2B2
                                      • _wcsncpy.LIBCMT ref: 0046A2EE
                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0046A323
                                      • CloseHandle.KERNEL32(00000000), ref: 0046A32E
                                      • RemoveDirectoryW.KERNEL32(?), ref: 0046A337
                                      • CloseHandle.KERNEL32(00000000), ref: 0046A341
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                      • String ID: :$\$\??\%s
                                      • API String ID: 2733774712-3457252023
                                      • Opcode ID: f5c4c2d66afbbd10ee5f85d9a25c73fd31d49a88663bd8fadf72adc8619a6d0a
                                      • Instruction ID: f10b276181cf8096dd79107661fba1eb4aa855f6953dd7c4d63ebe7d830bec3b
                                      • Opcode Fuzzy Hash: f5c4c2d66afbbd10ee5f85d9a25c73fd31d49a88663bd8fadf72adc8619a6d0a
                                      • Instruction Fuzzy Hash: 1E31C571500119ABDB20DFA0DC49FEF77BCEF88704F1044BAF908E2260E77496948B29
                                      APIs
                                      • GetKeyboardState.USER32(?), ref: 00460097
                                      • SetKeyboardState.USER32(?), ref: 00460102
                                      • GetAsyncKeyState.USER32(000000A0), ref: 00460122
                                      • GetKeyState.USER32(000000A0), ref: 00460139
                                      • GetAsyncKeyState.USER32(000000A1), ref: 00460168
                                      • GetKeyState.USER32(000000A1), ref: 00460179
                                      • GetAsyncKeyState.USER32(00000011), ref: 004601A5
                                      • GetKeyState.USER32(00000011), ref: 004601B3
                                      • GetAsyncKeyState.USER32(00000012), ref: 004601DC
                                      • GetKeyState.USER32(00000012), ref: 004601EA
                                      • GetAsyncKeyState.USER32(0000005B), ref: 00460213
                                      • GetKeyState.USER32(0000005B), ref: 00460221
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: State$Async$Keyboard
                                      • String ID:
                                      • API String ID: 541375521-0
                                      • Opcode ID: f2f36dec6c4a46bfceebef3e5bbc60e354e372eebad2095a13b7bb07ab711d72
                                      • Instruction ID: c6705f0abb03acfe1c66d12a8beead0d319d3067caf51b1e954f1b2a293a3a50
                                      • Opcode Fuzzy Hash: f2f36dec6c4a46bfceebef3e5bbc60e354e372eebad2095a13b7bb07ab711d72
                                      • Instruction Fuzzy Hash: 7F51BC2090478829FB35D7A098547EBBFB49F12380F08459F99C2566C3FA5C9A8CC75B
                                      APIs
                                        • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004804AC
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0048054B
                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 004805E3
                                      • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00480822
                                      • RegCloseKey.ADVAPI32(00000000), ref: 0048082F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                      • String ID:
                                      • API String ID: 1240663315-0
                                      • Opcode ID: 9d87856c38a9d93c7161446bb850259f05157b7d437a96975fe27cb1f4f70a78
                                      • Instruction ID: efbac3d2c4afa975f371ae5d5fee671ec22ce1fa5a9a6cb729be810612663562
                                      • Opcode Fuzzy Hash: 9d87856c38a9d93c7161446bb850259f05157b7d437a96975fe27cb1f4f70a78
                                      • Instruction Fuzzy Hash: A5E16E71614200AFCB54EF25C891D2FBBE4EF89314B04896EF84ADB3A2D634ED45CB56
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                      • String ID:
                                      • API String ID: 1737998785-0
                                      • Opcode ID: 0df1e9f21622c81d98583a297edaa4e67f2beae9162bbdb6d1b4a4ef07667aeb
                                      • Instruction ID: 6a8dd1f95291b63ae5b16d2a5a0d869dcb5166510358231783c1e180ef80644f
                                      • Opcode Fuzzy Hash: 0df1e9f21622c81d98583a297edaa4e67f2beae9162bbdb6d1b4a4ef07667aeb
                                      • Instruction Fuzzy Hash: CE2191352002109FDB00AF54EC09B6E7BA8EF44751F10847AF945E72A2EB38AC05CB5D
                                      APIs
                                        • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                        • Part of subcall function 00464A31: GetFileAttributesW.KERNEL32(?,0046370B), ref: 00464A32
                                      • FindFirstFileW.KERNEL32(?,?), ref: 004638A3
                                      • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0046394B
                                      • MoveFileW.KERNEL32(?,?), ref: 0046395E
                                      • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0046397B
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046399D
                                      • FindClose.KERNEL32(00000000,?,?,?,?), ref: 004639B9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                      • String ID: \*.*
                                      • API String ID: 4002782344-1173974218
                                      • Opcode ID: 26624c8a837bacf5fd13b4aa42f53dba038ef71def3b36361762fc5ef34f55ea
                                      • Instruction ID: 5f3270bf9419f81a9c4f0e0ab399985bb250d256c3569b2459e2ec67edc6ab47
                                      • Opcode Fuzzy Hash: 26624c8a837bacf5fd13b4aa42f53dba038ef71def3b36361762fc5ef34f55ea
                                      • Instruction Fuzzy Hash: 5551717180514CAACF05EFA1C9929EEB778AF14319F60047EE40277191EB396F0DCB5A
                                      APIs
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                      • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0046F440
                                      • Sleep.KERNEL32(0000000A), ref: 0046F470
                                      • _wcscmp.LIBCMT ref: 0046F484
                                      • _wcscmp.LIBCMT ref: 0046F49F
                                      • FindNextFileW.KERNEL32(?,?), ref: 0046F53D
                                      • FindClose.KERNEL32(00000000), ref: 0046F553
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                      • String ID: *.*
                                      • API String ID: 713712311-438819550
                                      • Opcode ID: ebe3f9ffe5fb607ae5b3deb848c46cff6f5cd88b834a1917a36d8c192f5e9aaa
                                      • Instruction ID: 52678bcd3f78e7a2dee1500e624958e336d76892905c76040bb4fc6126c74c58
                                      • Opcode Fuzzy Hash: ebe3f9ffe5fb607ae5b3deb848c46cff6f5cd88b834a1917a36d8c192f5e9aaa
                                      • Instruction Fuzzy Hash: D0418D71904219AFCF10EF64DC45AEFBBB4FF04314F50446BE855A2291EB38AE88CB59
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __itow__swprintf
                                      • String ID: 3cA$_A
                                      • API String ID: 674341424-3480954128
                                      • Opcode ID: d9078be34de6cee8688b8c34d108ff651b6ea43b1cb2c340e6b430119740be92
                                      • Instruction ID: 703a96bf305cb9905ff3d3c25826e0fcfbd93ba8a00a4d78e9854e8314894fca
                                      • Opcode Fuzzy Hash: d9078be34de6cee8688b8c34d108ff651b6ea43b1cb2c340e6b430119740be92
                                      • Instruction Fuzzy Hash: AB229B716083009FD724DF14C881BABB7E4AF85314F11492EF89A97392DB78E945CB9B
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID:
                                      • API String ID: 4104443479-0
                                      • Opcode ID: a8e114b89ee3d3e07b5a02269b8e4b1b3d6020a585e744cb467895f69b6b81fe
                                      • Instruction ID: fe3fa380dd79410c0d4e58696af30f423fcd40af0ea7aa6f8d28fb308e13f721
                                      • Opcode Fuzzy Hash: a8e114b89ee3d3e07b5a02269b8e4b1b3d6020a585e744cb467895f69b6b81fe
                                      • Instruction Fuzzy Hash: 9D12AC70A00609DFCF04DFA5D981AEEB3F5FF88304F10452AE846A7291EB39AD55CB59
                                      APIs
                                        • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                        • Part of subcall function 00464A31: GetFileAttributesW.KERNEL32(?,0046370B), ref: 00464A32
                                      • FindFirstFileW.KERNEL32(?,?), ref: 00463B89
                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00463BD9
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00463BEA
                                      • FindClose.KERNEL32(00000000), ref: 00463C01
                                      • FindClose.KERNEL32(00000000), ref: 00463C0A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                      • String ID: \*.*
                                      • API String ID: 2649000838-1173974218
                                      • Opcode ID: 96d29382e03484a320f516895544157d3a37e8fe8136e7796f76b3790cbe649f
                                      • Instruction ID: d92a094c1329feed7b4442d2e5959bdd658be9ba27de190bb3aff8693c431efe
                                      • Opcode Fuzzy Hash: 96d29382e03484a320f516895544157d3a37e8fe8136e7796f76b3790cbe649f
                                      • Instruction Fuzzy Hash: 383192714083849FC301EF64C8918AFB7A8AE91319F400D2EF4D5921D2EB39EA0DC75B
                                      APIs
                                        • Part of subcall function 004587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                        • Part of subcall function 004587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                        • Part of subcall function 004587E1: GetLastError.KERNEL32 ref: 00458865
                                      • ExitWindowsEx.USER32(?,00000000), ref: 004651F9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                      • String ID: $@$SeShutdownPrivilege
                                      • API String ID: 2234035333-194228
                                      • Opcode ID: 54329107cda8fc21248f4887d0b4108f88f23b4200919f0ee4a3738f6efa1ba1
                                      • Instruction ID: a9b7a44e2451b6884de2a96c8f52f71cfd0e95415fa4985b61f57267d5601e10
                                      • Opcode Fuzzy Hash: 54329107cda8fc21248f4887d0b4108f88f23b4200919f0ee4a3738f6efa1ba1
                                      • Instruction Fuzzy Hash: D201F7317916116BF7286668ACAAFBB7358DB05345F2008BBFD03E21D2FD591C058A9F
                                      APIs
                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 004762DC
                                      • WSAGetLastError.WSOCK32(00000000), ref: 004762EB
                                      • bind.WSOCK32(00000000,?,00000010), ref: 00476307
                                      • listen.WSOCK32(00000000,00000005), ref: 00476316
                                      • WSAGetLastError.WSOCK32(00000000), ref: 00476330
                                      • closesocket.WSOCK32(00000000,00000000), ref: 00476344
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorLast$bindclosesocketlistensocket
                                      • String ID:
                                      • API String ID: 1279440585-0
                                      • Opcode ID: 146cf2852e84b98676a1cb8b53444c853230e893978cbd9bf0c490d800ba36be
                                      • Instruction ID: 9cc0b371228dcaf8913226d6fe42490e105b9b769aefcc5547ebbaeef9b3f94b
                                      • Opcode Fuzzy Hash: 146cf2852e84b98676a1cb8b53444c853230e893978cbd9bf0c490d800ba36be
                                      • Instruction Fuzzy Hash: 6521F2312006049FCB10FF64C845A6EB7BAEF44324F15856EEC1AA73D2C734AC05CB59
                                      APIs
                                        • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                        • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                      • _memmove.LIBCMT ref: 00450258
                                      • _memmove.LIBCMT ref: 0045036D
                                      • _memmove.LIBCMT ref: 00450414
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove$Exception@8Throwstd::exception::exception
                                      • String ID:
                                      • API String ID: 1300846289-0
                                      • Opcode ID: 5a0ca2682455a1b7dacbf7eaf5851ad7c92f76331ea816cefe7be43f3ea40331
                                      • Instruction ID: ce31bd404333394545349dab4fd8ad238969c684e33d592a62d2001407cdf1f6
                                      • Opcode Fuzzy Hash: 5a0ca2682455a1b7dacbf7eaf5851ad7c92f76331ea816cefe7be43f3ea40331
                                      • Instruction Fuzzy Hash: 3202E270A00205DBCF04DF65D9816AEBBF5EF84304F54806EE80ADB392EB39D955CB99
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 004019FA
                                      • GetSysColor.USER32(0000000F), ref: 00401A4E
                                      • SetBkColor.GDI32(?,00000000), ref: 00401A61
                                        • Part of subcall function 00401290: DefDlgProcW.USER32(?,00000020,?), ref: 004012D8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ColorProc$LongWindow
                                      • String ID:
                                      • API String ID: 3744519093-0
                                      • Opcode ID: 4efa2b084a7e6e9de83d2e6db744f1d5afabdb7607f02b1fd5fb4c4e4c8d896b
                                      • Instruction ID: d041ec2a837aeb515327988813bafb0785b4d0a615f46c6b1421ede386c2745f
                                      • Opcode Fuzzy Hash: 4efa2b084a7e6e9de83d2e6db744f1d5afabdb7607f02b1fd5fb4c4e4c8d896b
                                      • Instruction Fuzzy Hash: A4A124B1202544BAE629BA694C88F7F255CDF45345F14053FF602F62F2CA3C9D429ABE
                                      APIs
                                        • Part of subcall function 00477D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00477DB6
                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0047679E
                                      • WSAGetLastError.WSOCK32(00000000), ref: 004767C7
                                      • bind.WSOCK32(00000000,?,00000010), ref: 00476800
                                      • WSAGetLastError.WSOCK32(00000000), ref: 0047680D
                                      • closesocket.WSOCK32(00000000,00000000), ref: 00476821
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                      • String ID:
                                      • API String ID: 99427753-0
                                      • Opcode ID: c3678cbd9f04907b78b21f7c60552e65a77e2ac58af8dde8cfff1331ff6b0f68
                                      • Instruction ID: 4f4fa4b069b112be458f20050bee2991dabce79e459f6d74e9331a247e2dcb9e
                                      • Opcode Fuzzy Hash: c3678cbd9f04907b78b21f7c60552e65a77e2ac58af8dde8cfff1331ff6b0f68
                                      • Instruction Fuzzy Hash: E941D275A00600AFDB10BF258C86F6E77A89F45718F05C56EFA59BB3C3CA789D008799
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                      • String ID:
                                      • API String ID: 292994002-0
                                      • Opcode ID: 7ffe818374d74fed162708100ced44c3bb0424a7746e5ca8e896d501ecac1497
                                      • Instruction ID: 2bf7cd1b22f0a435aba1bf6783624a0e9851140f374647b9b1574053626a0f4e
                                      • Opcode Fuzzy Hash: 7ffe818374d74fed162708100ced44c3bb0424a7746e5ca8e896d501ecac1497
                                      • Instruction Fuzzy Hash: BB11B232700911ABEB217F269C44A6F7B99EF447A1B40483EFC45E3242DB789C0287AD
                                      APIs
                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004580C0
                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004580CA
                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004580D9
                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004580E0
                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004580F6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                      • String ID:
                                      • API String ID: 44706859-0
                                      • Opcode ID: 81dd5e2c95f6d95ffeb542e083d257e40e9b1a3105d490f338a4361df31bd442
                                      • Instruction ID: 8dae455e1ba13099d0d58f164bb34b259a0b96a713bdc7d240504e0717c8d456
                                      • Opcode Fuzzy Hash: 81dd5e2c95f6d95ffeb542e083d257e40e9b1a3105d490f338a4361df31bd442
                                      • Instruction Fuzzy Hash: EBF08C30200614AFEB104FA4EC8CE6B3BACEF4A755B10043EF90592251DF649C09DB64
                                      APIs
                                      • CoInitialize.OLE32(00000000), ref: 0046C432
                                      • CoCreateInstance.OLE32(00492D6C,00000000,00000001,00492BDC,?), ref: 0046C44A
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                      • CoUninitialize.OLE32 ref: 0046C6B7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CreateInitializeInstanceUninitialize_memmove
                                      • String ID: .lnk
                                      • API String ID: 2683427295-24824748
                                      • Opcode ID: 404ab1768b0f25de35ad5526db641cbf692591db454d1bf8f9908bc64766e525
                                      • Instruction ID: adb56a4b7a52abdaef05598002f92e73435f728c8d9d90c66f29e414dbdf6fe1
                                      • Opcode Fuzzy Hash: 404ab1768b0f25de35ad5526db641cbf692591db454d1bf8f9908bc64766e525
                                      • Instruction Fuzzy Hash: 5AA14AB1104205AFD700EF55C881EAFB7E8EF85308F00492EF595972A2EB75EE09CB56
                                      APIs
                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00404AD0), ref: 00404B45
                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404B57
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: GetNativeSystemInfo$kernel32.dll
                                      • API String ID: 2574300362-192647395
                                      • Opcode ID: a73fa7ec54199ac5cd1cc7a5405e6f37b5fe8d156d6918c0c451661c08ead94f
                                      • Instruction ID: eac2b9657e48c1354d3ce07b29e145d4c0a45f8badf8df95cafcbf2a1bd35060
                                      • Opcode Fuzzy Hash: a73fa7ec54199ac5cd1cc7a5405e6f37b5fe8d156d6918c0c451661c08ead94f
                                      • Instruction Fuzzy Hash: 8ED01274A10713CFD720AF31D818B0A76E4AF45751B218C3F9485D6690D678F8C4C75C
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0047EE3D
                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0047EE4B
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                      • Process32NextW.KERNEL32(00000000,?), ref: 0047EF0B
                                      • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0047EF1A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                      • String ID:
                                      • API String ID: 2576544623-0
                                      • Opcode ID: fa09d2a248c555c856fafc541719bafc709d681ca500a6c4443aef0b496f1386
                                      • Instruction ID: a98c0e68db7b9d45d0fd814aff1298f869d04e0007e226020b87bcf654703779
                                      • Opcode Fuzzy Hash: fa09d2a248c555c856fafc541719bafc709d681ca500a6c4443aef0b496f1386
                                      • Instruction Fuzzy Hash: BB519171504300AFD310EF21CC85EABB7E8EF88714F10492EF595A72A1DB34AD08CB96
                                      APIs
                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0045E628
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: lstrlen
                                      • String ID: ($|
                                      • API String ID: 1659193697-1631851259
                                      • Opcode ID: f379fe3d7a712482d9e6716fbfa6b33f72221a7867f36e4c9f34936809415def
                                      • Instruction ID: d66d97c7bb63d5e7dad9b567a4e3f94d41a6da7275ee88609bc8c1bec3a8e44c
                                      • Opcode Fuzzy Hash: f379fe3d7a712482d9e6716fbfa6b33f72221a7867f36e4c9f34936809415def
                                      • Instruction Fuzzy Hash: 21322675A007059FD728CF2AC481A6AB7F0FF48310B15C56EE89ADB3A2E774E941CB44
                                      APIs
                                      • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0047180A,00000000), ref: 004723E1
                                      • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00472418
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Internet$AvailableDataFileQueryRead
                                      • String ID:
                                      • API String ID: 599397726-0
                                      • Opcode ID: ed8543c8852edefa4ad478e09dad15363f9fd76e79c926baa533897395acb124
                                      • Instruction ID: 97e6fa55f52fdedc64eb36c533065f345fcd4e8e1beeb73d4f24c64f527f6271
                                      • Opcode Fuzzy Hash: ed8543c8852edefa4ad478e09dad15363f9fd76e79c926baa533897395acb124
                                      • Instruction Fuzzy Hash: 0941DA71604205BFEB20DE65DE81EFB77BCEB40314F10806FFA49A6241DABC9E419658
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0046B343
                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0046B39D
                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0046B3EA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorMode$DiskFreeSpace
                                      • String ID:
                                      • API String ID: 1682464887-0
                                      • Opcode ID: 81ae41650c716ddd989f4eaef04133684aee4c9c038b0031e1162c15436ef676
                                      • Instruction ID: 737ef1c34fd19c378388d330bbb387c55d680846c188baab6e7c30573ba64571
                                      • Opcode Fuzzy Hash: 81ae41650c716ddd989f4eaef04133684aee4c9c038b0031e1162c15436ef676
                                      • Instruction Fuzzy Hash: 7D21AE75A10108EFCB00EFA5D880AEEBBB8FF48314F0080AAE905AB351DB359D59CB55
                                      APIs
                                        • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                        • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                      • GetLastError.KERNEL32 ref: 00458865
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                      • String ID:
                                      • API String ID: 1922334811-0
                                      • Opcode ID: a9a40632b7ee75b2fc3ea92821e02d32ec17c7b53a95853adea9eb61ec4e0c01
                                      • Instruction ID: 5e41a7b511489fb1457012ee205441660039eb57adee2e696ecce50f3e5e177b
                                      • Opcode Fuzzy Hash: a9a40632b7ee75b2fc3ea92821e02d32ec17c7b53a95853adea9eb61ec4e0c01
                                      • Instruction Fuzzy Hash: 7511BFB2514204AFE718EFA4EC85D2BB7F8EB05315B60852EF85593212EF34BC448B64
                                      APIs
                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00458774
                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0045878B
                                      • FreeSid.ADVAPI32(?), ref: 0045879B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                      • String ID:
                                      • API String ID: 3429775523-0
                                      • Opcode ID: 008726f0c27652ffd03f151f72c22d205906185045b9f325022e2ab268aa6496
                                      • Instruction ID: 222101879978235e3db2a0a583f2c1bf244a93baf2b2f2d6b5292d8d16c370cf
                                      • Opcode Fuzzy Hash: 008726f0c27652ffd03f151f72c22d205906185045b9f325022e2ab268aa6496
                                      • Instruction Fuzzy Hash: 4CF04F7591130CBFDF00DFF4DC89AAEB7BCEF09201F104879A901E2181D7756A088B54
                                      APIs
                                      • __time64.LIBCMT ref: 0046889B
                                        • Part of subcall function 0042520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00468F6E,00000000,?,?,?,?,0046911F,00000000,?), ref: 00425213
                                        • Part of subcall function 0042520A: __aulldiv.LIBCMT ref: 00425233
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Time$FileSystem__aulldiv__time64
                                      • String ID: 0eL
                                      • API String ID: 2893107130-3167399643
                                      • Opcode ID: 173a61627ebe1b4304b39b54128586dabbe463c8e4c1c1e482927ec7599268c1
                                      • Instruction ID: 2c57299538d283c5d644ae0a39161a0e0d0ec28ce0c746f6c7e9e831f8b60585
                                      • Opcode Fuzzy Hash: 173a61627ebe1b4304b39b54128586dabbe463c8e4c1c1e482927ec7599268c1
                                      • Instruction Fuzzy Hash: B421AF326256108BC729CF29D841A52B3E1EFA5311B698F6DD0F5CB2C0DA38A905CB58
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?), ref: 0046C6FB
                                      • FindClose.KERNEL32(00000000), ref: 0046C72B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Find$CloseFileFirst
                                      • String ID:
                                      • API String ID: 2295610775-0
                                      • Opcode ID: 45c62872381a6feff6d223480115480bdbba5ccbc8d99e64919f1b60502656e7
                                      • Instruction ID: b4b64e4e0be63edce78860a78e1dfdfe78961efcf08952f795b51eb70efe8952
                                      • Opcode Fuzzy Hash: 45c62872381a6feff6d223480115480bdbba5ccbc8d99e64919f1b60502656e7
                                      • Instruction Fuzzy Hash: 411152726106049FDB10EF29D88592AF7E5EF85325F00C52EF9A5D7391DB34AC05CB85
                                      APIs
                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00479468,?,0048FB84,?), ref: 0046A097
                                      • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00479468,?,0048FB84,?), ref: 0046A0A9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorFormatLastMessage
                                      • String ID:
                                      • API String ID: 3479602957-0
                                      • Opcode ID: aedf4ef7b819e7061a1d9f91078b4e07f1c96d427ff214e73d92c0d6c6dea44e
                                      • Instruction ID: 2c9db32d3ae4548df1de74cdb7d607b6943671b75e71bd67b23ca617ca970478
                                      • Opcode Fuzzy Hash: aedf4ef7b819e7061a1d9f91078b4e07f1c96d427ff214e73d92c0d6c6dea44e
                                      • Instruction Fuzzy Hash: D8F0823550522DABDB21AFA4CC48FEE776CBF08361F00416AF909E6191DA349954CBA6
                                      APIs
                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00458309), ref: 004581E0
                                      • CloseHandle.KERNEL32(?,?,00458309), ref: 004581F2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AdjustCloseHandlePrivilegesToken
                                      • String ID:
                                      • API String ID: 81990902-0
                                      • Opcode ID: 69dc32ec314a8cd99589289b842828c25465f5886d8d921c36f64ffc138c73b7
                                      • Instruction ID: 9bafbd08ffd8acbbb2d026fb6ea58a2c51283803ccb0941fee12b6a17b14d6d6
                                      • Opcode Fuzzy Hash: 69dc32ec314a8cd99589289b842828c25465f5886d8d921c36f64ffc138c73b7
                                      • Instruction Fuzzy Hash: 13E04632000620AEE7212B61FC08D777BEAEB04314720882EB8A680431CF22AC90DB18
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00428D57,?,?,?,00000001), ref: 0042A15A
                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0042A163
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: c2bfc4d91f5eef072ecd4d4a99461c52a82975f392c39b974fa7ca05b3ef40fa
                                      • Instruction ID: 9da78fce3b57c7d2137df8720d13279edd616241823e717daaa40eb201d223bb
                                      • Opcode Fuzzy Hash: c2bfc4d91f5eef072ecd4d4a99461c52a82975f392c39b974fa7ca05b3ef40fa
                                      • Instruction Fuzzy Hash: CCB09231254308ABCA022B91EC09B8C3F68EB46AA2F404434FA0D84C60CB6254548B99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
                                      • Instruction ID: 9dbe1c865c2330f56ffee62ed517aae1867acb93b770053fb6672ec4a27fddfc
                                      • Opcode Fuzzy Hash: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
                                      • Instruction Fuzzy Hash: 08322861E29F114DD7239634D832336A258AFB73C8F95D737F819B5AA5EB28D4C34208
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
                                      • Instruction ID: 6c6381ca5121d9a8a5ca5470a2620081c1b3ce1be078dbaf297b8ac86cff2730
                                      • Opcode Fuzzy Hash: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
                                      • Instruction Fuzzy Hash: E2B10130E2AF414DD72396398935336BA5CAFBB2C5F51D72BFC2670D22EB2185934185
                                      APIs
                                      • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00464C76
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: mouse_event
                                      • String ID:
                                      • API String ID: 2434400541-0
                                      • Opcode ID: ee9df15493a40b048f6a63b66618f3ae232bfa5e5e2bfa15106318706817909b
                                      • Instruction ID: b34e2a9394489d035c963e7dd8f40c9807a13273b0ab6c7f74163ad9f46ae88e
                                      • Opcode Fuzzy Hash: ee9df15493a40b048f6a63b66618f3ae232bfa5e5e2bfa15106318706817909b
                                      • Instruction Fuzzy Hash: BED05EA032220838ECA807209D5FF7F1109E3C0B81F96854B7241853C1F8DC6801A03F
                                      APIs
                                      • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00458389), ref: 004587D1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: LogonUser
                                      • String ID:
                                      • API String ID: 1244722697-0
                                      • Opcode ID: 18205445d52b48e02bcf404b6a946f346a5f79f7dd958708f793c28153997f24
                                      • Instruction ID: bbaf709efb0beb88cdfa5f1a33ae6004459e2c5163e494cc38a8a30eb56211a1
                                      • Opcode Fuzzy Hash: 18205445d52b48e02bcf404b6a946f346a5f79f7dd958708f793c28153997f24
                                      • Instruction Fuzzy Hash: 49D05E3226050EAFEF018EA4DC01EAE3B69EB04B01F408521FE15D50A1C775E835AB60
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0042A12A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: de316c34264f802ad97e41e2d96b97a4976e2443a0324b54249a0beeda03384a
                                      • Instruction ID: 5f0b767449e3d37fa0a9cb76ca1a1966b2bcebad2f74a673b8e7725f9ca30b43
                                      • Opcode Fuzzy Hash: de316c34264f802ad97e41e2d96b97a4976e2443a0324b54249a0beeda03384a
                                      • Instruction Fuzzy Hash: E2A0113000020CAB8A022B82EC08888BFACEA022A0B008030F80C808228B32A8208A88
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bc918cabfbc13eeeaccb278bb908b555cf4655f640fadc8373e86b06f087c2cb
                                      • Instruction ID: d3e05baf70842595a15b67714876080b4d37379fdc1224c105ba09137936e944
                                      • Opcode Fuzzy Hash: bc918cabfbc13eeeaccb278bb908b555cf4655f640fadc8373e86b06f087c2cb
                                      • Instruction Fuzzy Hash: 44223730904506CBDF288A68C4A47BEB7A1BF41345F28816FDD468B693DB7C9CD6C74A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                      • Instruction ID: 35e5cfd0643d00128ec34ecd890c43f992cb4d917009b55117061340238bc551
                                      • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                      • Instruction Fuzzy Hash: 18C1D83230507349DF2D4639953403FFAA15EA27B139A076FD8B3CB2D4EE18D965D624
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                      • Instruction ID: 4494295b5c4546222a84ad3f443fcd2c01bced2acdb834a923f1c328fe2fc13d
                                      • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                      • Instruction Fuzzy Hash: CAC1D4333090B34ADF2D4639953403FBAA15EA27B139B036FD4B2DB2D4EE18D925D624
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                      • Instruction ID: 636cddbcb2fdf249d26da9f53af31dfe9a94ad4f1cb0562cff2bfca29c50df3a
                                      • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                      • Instruction Fuzzy Hash: 4FC1A3363150B349DF2D463A943413FBAA15EB27B139B076FD4B2CB2E4EE28D925C614
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2116592061.0000000003890000.00000040.00001000.00020000.00000000.sdmp, Offset: 03890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3890000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                      • Instruction ID: 40e189a383c4e21b1a19b9352b655a7908e4942b65ff1208567a4cae3e1ec0d2
                                      • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                      • Instruction Fuzzy Hash: 6841C171D1051CEBDF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2116592061.0000000003890000.00000040.00001000.00020000.00000000.sdmp, Offset: 03890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3890000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                      • Instruction ID: 15f4c25275c4e87deee727ae35943c4387c917dc6ad1da5b0a30cf79dc70dd2b
                                      • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                      • Instruction Fuzzy Hash: 47018078A04209EFDB45DF98C5909AEF7B5FB48310B2485DAE809A7701D730AE41DB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2116592061.0000000003890000.00000040.00001000.00020000.00000000.sdmp, Offset: 03890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3890000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                      • Instruction ID: 98cb80ee610396746586f533a6333dfa8a4949e62a5781189b5110460733e2f5
                                      • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                      • Instruction Fuzzy Hash: D3018078A04209EFDB44DF98C5909AEF7B5FB88210B2485DAE909AB701D730EE41DB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2116592061.0000000003890000.00000040.00001000.00020000.00000000.sdmp, Offset: 03890000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_3890000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                      • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                      • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                      • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                      APIs
                                      • DeleteObject.GDI32(00000000), ref: 0047785B
                                      • DeleteObject.GDI32(00000000), ref: 0047786D
                                      • DestroyWindow.USER32 ref: 0047787B
                                      • GetDesktopWindow.USER32 ref: 00477895
                                      • GetWindowRect.USER32(00000000), ref: 0047789C
                                      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 004779DD
                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 004779ED
                                      • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477A35
                                      • GetClientRect.USER32(00000000,?), ref: 00477A41
                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00477A7B
                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477A9D
                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477AB0
                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477ABB
                                      • GlobalLock.KERNEL32(00000000), ref: 00477AC4
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477AD3
                                      • GlobalUnlock.KERNEL32(00000000), ref: 00477ADC
                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477AE3
                                      • GlobalFree.KERNEL32(00000000), ref: 00477AEE
                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477B00
                                      • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00492CAC,00000000), ref: 00477B16
                                      • GlobalFree.KERNEL32(00000000), ref: 00477B26
                                      • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00477B4C
                                      • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00477B6B
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477B8D
                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477D7A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                      • String ID: $AutoIt v3$DISPLAY$static
                                      • API String ID: 2211948467-2373415609
                                      • Opcode ID: cbe7ba0df42561e6311dda8264485de7e40118ff6f13b361737e76822355802e
                                      • Instruction ID: 98d8c47751f1291c48596143d1a8e41d269c6aae9b6b01708d63eada7aa7ec2c
                                      • Opcode Fuzzy Hash: cbe7ba0df42561e6311dda8264485de7e40118ff6f13b361737e76822355802e
                                      • Instruction Fuzzy Hash: DE027A71900105EFDB14DFA4DC89EAE7BB9FF49310F10856AF905AB2A1C738AD41CB68
                                      APIs
                                      • CharUpperBuffW.USER32(?,?,0048F910), ref: 00483627
                                      • IsWindowVisible.USER32(?), ref: 0048364B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: BuffCharUpperVisibleWindow
                                      • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                      • API String ID: 4105515805-45149045
                                      • Opcode ID: 5fef8f90a7ac0fbecced279e2fadd5b2ce10d77fbdc079ee24b710e3ec2a39da
                                      • Instruction ID: 9f5fdaa8788cae778637d634d7abea83d78ef325d3b9343814b8d9d38e530adb
                                      • Opcode Fuzzy Hash: 5fef8f90a7ac0fbecced279e2fadd5b2ce10d77fbdc079ee24b710e3ec2a39da
                                      • Instruction Fuzzy Hash: 28D19E702042009BCA04FF11C451A6E77E5AF55759F54886EF8826B3A3DB3DEE0ACB5A
                                      APIs
                                      • SetTextColor.GDI32(?,00000000), ref: 0048A630
                                      • GetSysColorBrush.USER32(0000000F), ref: 0048A661
                                      • GetSysColor.USER32(0000000F), ref: 0048A66D
                                      • SetBkColor.GDI32(?,000000FF), ref: 0048A687
                                      • SelectObject.GDI32(?,00000000), ref: 0048A696
                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 0048A6C1
                                      • GetSysColor.USER32(00000010), ref: 0048A6C9
                                      • CreateSolidBrush.GDI32(00000000), ref: 0048A6D0
                                      • FrameRect.USER32(?,?,00000000), ref: 0048A6DF
                                      • DeleteObject.GDI32(00000000), ref: 0048A6E6
                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 0048A731
                                      • FillRect.USER32(?,?,00000000), ref: 0048A763
                                      • GetWindowLongW.USER32(?,000000F0), ref: 0048A78E
                                        • Part of subcall function 0048A8CA: GetSysColor.USER32(00000012), ref: 0048A903
                                        • Part of subcall function 0048A8CA: SetTextColor.GDI32(?,?), ref: 0048A907
                                        • Part of subcall function 0048A8CA: GetSysColorBrush.USER32(0000000F), ref: 0048A91D
                                        • Part of subcall function 0048A8CA: GetSysColor.USER32(0000000F), ref: 0048A928
                                        • Part of subcall function 0048A8CA: GetSysColor.USER32(00000011), ref: 0048A945
                                        • Part of subcall function 0048A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0048A953
                                        • Part of subcall function 0048A8CA: SelectObject.GDI32(?,00000000), ref: 0048A964
                                        • Part of subcall function 0048A8CA: SetBkColor.GDI32(?,00000000), ref: 0048A96D
                                        • Part of subcall function 0048A8CA: SelectObject.GDI32(?,?), ref: 0048A97A
                                        • Part of subcall function 0048A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0048A999
                                        • Part of subcall function 0048A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0048A9B0
                                        • Part of subcall function 0048A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0048A9C5
                                        • Part of subcall function 0048A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0048A9ED
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                      • String ID:
                                      • API String ID: 3521893082-0
                                      • Opcode ID: 7b1256fc59158ab5e6f9d02b09fb48f7387e023a6acc967d1d418ec17d63a32b
                                      • Instruction ID: fb34620bd59db4fe0d00bba54468f49f6ea6f7247eb536f08ce7ecc3d6e9d283
                                      • Opcode Fuzzy Hash: 7b1256fc59158ab5e6f9d02b09fb48f7387e023a6acc967d1d418ec17d63a32b
                                      • Instruction Fuzzy Hash: 5E917D72408301BFD710AF64DC08A5F7BA9FB89321F100F2EF962961A1D774D949CB5A
                                      APIs
                                      • DestroyWindow.USER32(?,?,?), ref: 00402CA2
                                      • DeleteObject.GDI32(00000000), ref: 00402CE8
                                      • DeleteObject.GDI32(00000000), ref: 00402CF3
                                      • DestroyIcon.USER32(00000000,?,?,?), ref: 00402CFE
                                      • DestroyWindow.USER32(00000000,?,?,?), ref: 00402D09
                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 0043C43B
                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0043C474
                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0043C89D
                                        • Part of subcall function 00401B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00402036,?,00000000,?,?,?,?,004016CB,00000000,?), ref: 00401B9A
                                      • SendMessageW.USER32(?,00001053), ref: 0043C8DA
                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0043C8F1
                                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0043C907
                                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0043C912
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                      • String ID: 0
                                      • API String ID: 464785882-4108050209
                                      • Opcode ID: 584091d76d93fd62f1c26f6df7c467c8d57ccec3c13e6d3928d72dc41c9a9e06
                                      • Instruction ID: 2a922f2165ff82378a3b73503dcd1cf133edd61f128b8a365017e979e5fddc8b
                                      • Opcode Fuzzy Hash: 584091d76d93fd62f1c26f6df7c467c8d57ccec3c13e6d3928d72dc41c9a9e06
                                      • Instruction Fuzzy Hash: E112BF30604211EFDB15DF24C988BAAB7E1BF08304F54557EE855EB2A2C779E842CF99
                                      APIs
                                      • DestroyWindow.USER32(00000000), ref: 004774DE
                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047759D
                                      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004775DB
                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 004775ED
                                      • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00477633
                                      • GetClientRect.USER32(00000000,?), ref: 0047763F
                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00477683
                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00477692
                                      • GetStockObject.GDI32(00000011), ref: 004776A2
                                      • SelectObject.GDI32(00000000,00000000), ref: 004776A6
                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 004776B6
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004776BF
                                      • DeleteDC.GDI32(00000000), ref: 004776C8
                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004776F4
                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 0047770B
                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00477746
                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0047775A
                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 0047776B
                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0047779B
                                      • GetStockObject.GDI32(00000011), ref: 004777A6
                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 004777B1
                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 004777BB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                      • API String ID: 2910397461-517079104
                                      • Opcode ID: b351bee2e5d560126793a78ab67312888dd4a5a95b59d809627758f9da2cab90
                                      • Instruction ID: a65668349d9d90c20bc2e89cb33f711f17b366ce89c6f6fccfd6c75f405f0b1e
                                      • Opcode Fuzzy Hash: b351bee2e5d560126793a78ab67312888dd4a5a95b59d809627758f9da2cab90
                                      • Instruction Fuzzy Hash: C2A18371A00605BFEB14DBA4DC49FAE7BB9EB04714F008129FA14A72E1C774AD44CB68
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0046AD1E
                                      • GetDriveTypeW.KERNEL32(?,0048FAC0,?,\\.\,0048F910), ref: 0046ADFB
                                      • SetErrorMode.KERNEL32(00000000,0048FAC0,?,\\.\,0048F910), ref: 0046AF59
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorMode$DriveType
                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                      • API String ID: 2907320926-4222207086
                                      • Opcode ID: 422cd3f1e8c74b084d883683385dc5793043cf3cdd114b5b27dfe3defd9125f9
                                      • Instruction ID: e912c7b3330773d5b9bf2588ba7fbd63f6bfe130c5f6eb3342ce3002eb002758
                                      • Opcode Fuzzy Hash: 422cd3f1e8c74b084d883683385dc5793043cf3cdd114b5b27dfe3defd9125f9
                                      • Instruction Fuzzy Hash: 2E5186B0648A059ACB04DB61C942DBE73A5EF48708730446FF406B7291EA3DAD62DF5F
                                      APIs
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00489AD2
                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00489B8B
                                      • SendMessageW.USER32(?,00001102,00000002,?), ref: 00489BA7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window
                                      • String ID: 0$PY
                                      • API String ID: 2326795674-1394038836
                                      • Opcode ID: bbffef1c3f5556ac9f62579e4b2e2cb3d8cb8bce677d5197c2d761cc8b7f340f
                                      • Instruction ID: 037bb1afe4fae46b05c87f58b4815c81545e24e54b3e159660ac1ad892e83d44
                                      • Opcode Fuzzy Hash: bbffef1c3f5556ac9f62579e4b2e2cb3d8cb8bce677d5197c2d761cc8b7f340f
                                      • Instruction Fuzzy Hash: 4402BC30104601AFE729EF14C848BBFBBE4FF49304F08492EF999962A1D7799C45CB5A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __wcsnicmp
                                      • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                      • API String ID: 1038674560-86951937
                                      • Opcode ID: 56bdada20e89f684215dc75c39aa2e955cc611c6bdd348fd67fdb2a364574d3b
                                      • Instruction ID: cb422ad940ebd99c4cbaeb9a9904d1c86e4c1b178c3cf2ebe63a60ccd5d4c750
                                      • Opcode Fuzzy Hash: 56bdada20e89f684215dc75c39aa2e955cc611c6bdd348fd67fdb2a364574d3b
                                      • Instruction Fuzzy Hash: 3281E3B07002156ADF10BA62EC42FAB3768AF15704F14403BF9067A1C2EB7CDA55C66D
                                      APIs
                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00488AC1
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00488AD2
                                      • CharNextW.USER32(0000014E), ref: 00488B01
                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00488B42
                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00488B58
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00488B69
                                      • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00488B86
                                      • SetWindowTextW.USER32(?,0000014E), ref: 00488BD8
                                      • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00488BEE
                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00488C1F
                                      • _memset.LIBCMT ref: 00488C44
                                      • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00488C8D
                                      • _memset.LIBCMT ref: 00488CEC
                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00488D16
                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00488D6E
                                      • SendMessageW.USER32(?,0000133D,?,?), ref: 00488E1B
                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00488E3D
                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00488E87
                                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00488EB4
                                      • DrawMenuBar.USER32(?), ref: 00488EC3
                                      • SetWindowTextW.USER32(?,0000014E), ref: 00488EEB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                      • String ID: 0$PY
                                      • API String ID: 1073566785-1394038836
                                      • Opcode ID: 75b2d688dd7d4c6beb7b62a1cd3dfe45e9332fb633fc77113dd557cd467a29dd
                                      • Instruction ID: 787a5fb712104ee4b76f4ba17aa60975d6cacfa81cf9944a1fa1b3bb2a4fb8ea
                                      • Opcode Fuzzy Hash: 75b2d688dd7d4c6beb7b62a1cd3dfe45e9332fb633fc77113dd557cd467a29dd
                                      • Instruction Fuzzy Hash: 44E1B370900218AFDB20AF51CC84EEF7BB9EF04710F50456FFA15AA290DB789985DF69
                                      APIs
                                      • GetSysColor.USER32(00000012), ref: 0048A903
                                      • SetTextColor.GDI32(?,?), ref: 0048A907
                                      • GetSysColorBrush.USER32(0000000F), ref: 0048A91D
                                      • GetSysColor.USER32(0000000F), ref: 0048A928
                                      • CreateSolidBrush.GDI32(?), ref: 0048A92D
                                      • GetSysColor.USER32(00000011), ref: 0048A945
                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0048A953
                                      • SelectObject.GDI32(?,00000000), ref: 0048A964
                                      • SetBkColor.GDI32(?,00000000), ref: 0048A96D
                                      • SelectObject.GDI32(?,?), ref: 0048A97A
                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 0048A999
                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0048A9B0
                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0048A9C5
                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0048A9ED
                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0048AA14
                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 0048AA32
                                      • DrawFocusRect.USER32(?,?), ref: 0048AA3D
                                      • GetSysColor.USER32(00000011), ref: 0048AA4B
                                      • SetTextColor.GDI32(?,00000000), ref: 0048AA53
                                      • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0048AA67
                                      • SelectObject.GDI32(?,0048A5FA), ref: 0048AA7E
                                      • DeleteObject.GDI32(?), ref: 0048AA89
                                      • SelectObject.GDI32(?,?), ref: 0048AA8F
                                      • DeleteObject.GDI32(?), ref: 0048AA94
                                      • SetTextColor.GDI32(?,?), ref: 0048AA9A
                                      • SetBkColor.GDI32(?,?), ref: 0048AAA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                      • String ID:
                                      • API String ID: 1996641542-0
                                      • Opcode ID: abc25fd90fe762b3f008daf3ab58b8cb053e0b194310f7175b751cab352d09e4
                                      • Instruction ID: 67910f5981194f54d32d2413a419bc6a22b5e02dd88e552ef27f67441b011758
                                      • Opcode Fuzzy Hash: abc25fd90fe762b3f008daf3ab58b8cb053e0b194310f7175b751cab352d09e4
                                      • Instruction Fuzzy Hash: AD514F71901208FFDB10AFA4DC48EAE7B79EF08320F114A2AF911AB2A1D7759D54DF54
                                      APIs
                                      • GetCursorPos.USER32(?), ref: 004849CA
                                      • GetDesktopWindow.USER32 ref: 004849DF
                                      • GetWindowRect.USER32(00000000), ref: 004849E6
                                      • GetWindowLongW.USER32(?,000000F0), ref: 00484A48
                                      • DestroyWindow.USER32(?), ref: 00484A74
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00484A9D
                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00484ABB
                                      • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00484AE1
                                      • SendMessageW.USER32(?,00000421,?,?), ref: 00484AF6
                                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00484B09
                                      • IsWindowVisible.USER32(?), ref: 00484B29
                                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00484B44
                                      • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00484B58
                                      • GetWindowRect.USER32(?,?), ref: 00484B70
                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00484B96
                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00484BB0
                                      • CopyRect.USER32(?,?), ref: 00484BC7
                                      • SendMessageW.USER32(?,00000412,00000000), ref: 00484C32
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                      • String ID: ($0$tooltips_class32
                                      • API String ID: 698492251-4156429822
                                      • Opcode ID: 943f141a24a5701e169943524c067f38581a5f413d5e7729d13daee1db30ced1
                                      • Instruction ID: 71fd3677379c23cac636b4aadb2286f0fe2b453109396d863f09e4e9c2446b6d
                                      • Opcode Fuzzy Hash: 943f141a24a5701e169943524c067f38581a5f413d5e7729d13daee1db30ced1
                                      • Instruction Fuzzy Hash: EFB15971604341AFDB04EF65C844A6FBBE4BF88314F008A2EF999AB291D775EC05CB59
                                      APIs
                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 004644AC
                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 004644D2
                                      • _wcscpy.LIBCMT ref: 00464500
                                      • _wcscmp.LIBCMT ref: 0046450B
                                      • _wcscat.LIBCMT ref: 00464521
                                      • _wcsstr.LIBCMT ref: 0046452C
                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00464548
                                      • _wcscat.LIBCMT ref: 00464591
                                      • _wcscat.LIBCMT ref: 00464598
                                      • _wcsncpy.LIBCMT ref: 004645C3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                      • API String ID: 699586101-1459072770
                                      • Opcode ID: 7ea26201da877088fc4ea0abd13a61373b804d597e896c86ff00e0a25f1ab56e
                                      • Instruction ID: 2b480a1fb6a64e9c247c6b56b60e40bdc72f3d5a191167641815a527c939035c
                                      • Opcode Fuzzy Hash: 7ea26201da877088fc4ea0abd13a61373b804d597e896c86ff00e0a25f1ab56e
                                      • Instruction Fuzzy Hash: 7641D431A002107BDB14BA75AC43FBF77ACDF81714F50046FF905A6182FA7C9A4296AE
                                      APIs
                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004028BC
                                      • GetSystemMetrics.USER32(00000007), ref: 004028C4
                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004028EF
                                      • GetSystemMetrics.USER32(00000008), ref: 004028F7
                                      • GetSystemMetrics.USER32(00000004), ref: 0040291C
                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00402939
                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00402949
                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0040297C
                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00402990
                                      • GetClientRect.USER32(00000000,000000FF), ref: 004029AE
                                      • GetStockObject.GDI32(00000011), ref: 004029CA
                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 004029D5
                                        • Part of subcall function 00402344: GetCursorPos.USER32(?), ref: 00402357
                                        • Part of subcall function 00402344: ScreenToClient.USER32(004C57B0,?), ref: 00402374
                                        • Part of subcall function 00402344: GetAsyncKeyState.USER32(00000001), ref: 00402399
                                        • Part of subcall function 00402344: GetAsyncKeyState.USER32(00000002), ref: 004023A7
                                      • SetTimer.USER32(00000000,00000000,00000028,00401256), ref: 004029FC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                      • String ID: AutoIt v3 GUI
                                      • API String ID: 1458621304-248962490
                                      • Opcode ID: a36de548c4631ce081b8fbadebba0c5ef3a0e810f8bc3ad4c9e0b0a6aefc57a8
                                      • Instruction ID: a18fd751d40b92a0f9ce74f9a4650c687106778ef47aaf7a4e9f1722fdb5861d
                                      • Opcode Fuzzy Hash: a36de548c4631ce081b8fbadebba0c5ef3a0e810f8bc3ad4c9e0b0a6aefc57a8
                                      • Instruction Fuzzy Hash: 8AB15075600209EFDB14EFA8DD49BAE77B4FB08314F10463AFA15A62D0DB78A851CB58
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                      • DragQueryPoint.SHELL32(?,?), ref: 0048C627
                                        • Part of subcall function 0048AB37: ClientToScreen.USER32(?,?), ref: 0048AB60
                                        • Part of subcall function 0048AB37: GetWindowRect.USER32(?,?), ref: 0048ABD6
                                        • Part of subcall function 0048AB37: PtInRect.USER32(?,?,0048C014), ref: 0048ABE6
                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0048C690
                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0048C69B
                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0048C6BE
                                      • _wcscat.LIBCMT ref: 0048C6EE
                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0048C705
                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0048C71E
                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 0048C735
                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 0048C757
                                      • DragFinish.SHELL32(?), ref: 0048C75E
                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0048C851
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$PY$pbL
                                      • API String ID: 169749273-2907498447
                                      • Opcode ID: b8b84d95900dc882e1c32104b530ea695d6c2d6b7f28fd2555ef32aedb2ed4ea
                                      • Instruction ID: 4fadb8ae9d86136d60326728fb0320be203031e120dd753c2ba31efb77555f42
                                      • Opcode Fuzzy Hash: b8b84d95900dc882e1c32104b530ea695d6c2d6b7f28fd2555ef32aedb2ed4ea
                                      • Instruction Fuzzy Hash: 1B617F71108300AFC701EF65CC85D9FBBE8EF88714F50092EF591A22A1DB74A949CB6A
                                      APIs
                                      • GetClassNameW.USER32(?,?,00000100), ref: 0045A47A
                                      • __swprintf.LIBCMT ref: 0045A51B
                                      • _wcscmp.LIBCMT ref: 0045A52E
                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0045A583
                                      • _wcscmp.LIBCMT ref: 0045A5BF
                                      • GetClassNameW.USER32(?,?,00000400), ref: 0045A5F6
                                      • GetDlgCtrlID.USER32(?), ref: 0045A648
                                      • GetWindowRect.USER32(?,?), ref: 0045A67E
                                      • GetParent.USER32(?), ref: 0045A69C
                                      • ScreenToClient.USER32(00000000), ref: 0045A6A3
                                      • GetClassNameW.USER32(?,?,00000100), ref: 0045A71D
                                      • _wcscmp.LIBCMT ref: 0045A731
                                      • GetWindowTextW.USER32(?,?,00000400), ref: 0045A757
                                      • _wcscmp.LIBCMT ref: 0045A76B
                                        • Part of subcall function 0042362C: _iswctype.LIBCMT ref: 00423634
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                      • String ID: %s%u
                                      • API String ID: 3744389584-679674701
                                      • Opcode ID: 95e3fc5f615f67332e4c35b97a82dc6745ca588bd40ac62d30e6c881a1c42292
                                      • Instruction ID: eb4c2c17bfd361fdb29ac4d9e78bc58de04dd0089fb3858937583b9ed20721cb
                                      • Opcode Fuzzy Hash: 95e3fc5f615f67332e4c35b97a82dc6745ca588bd40ac62d30e6c881a1c42292
                                      • Instruction Fuzzy Hash: 06A1B431204606BFD714DF60C884BABB7E8FF44316F04462AFD99D2251D738E969CB9A
                                      APIs
                                      • GetClassNameW.USER32(00000008,?,00000400), ref: 0045AF18
                                      • _wcscmp.LIBCMT ref: 0045AF29
                                      • GetWindowTextW.USER32(00000001,?,00000400), ref: 0045AF51
                                      • CharUpperBuffW.USER32(?,00000000), ref: 0045AF6E
                                      • _wcscmp.LIBCMT ref: 0045AF8C
                                      • _wcsstr.LIBCMT ref: 0045AF9D
                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 0045AFD5
                                      • _wcscmp.LIBCMT ref: 0045AFE5
                                      • GetWindowTextW.USER32(00000002,?,00000400), ref: 0045B00C
                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 0045B055
                                      • _wcscmp.LIBCMT ref: 0045B065
                                      • GetClassNameW.USER32(00000010,?,00000400), ref: 0045B08D
                                      • GetWindowRect.USER32(00000004,?), ref: 0045B0F6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                      • String ID: @$ThumbnailClass
                                      • API String ID: 1788623398-1539354611
                                      • Opcode ID: 32defac42e67ed4af38e3016ed4cafc8072bfd3831142d9b224e1415cd8dfe54
                                      • Instruction ID: 2113ca19c953e4d0fb0a3bed3b629d6a09082ecb25fab152276a3acc7fd757eb
                                      • Opcode Fuzzy Hash: 32defac42e67ed4af38e3016ed4cafc8072bfd3831142d9b224e1415cd8dfe54
                                      • Instruction Fuzzy Hash: BD81CF711082059BDB00DF11C881BAB77E8EF4075AF14856FFD859A192DB38DD4DCBAA
                                      APIs
                                      • _memset.LIBCMT ref: 0048A259
                                      • DestroyWindow.USER32(?,?), ref: 0048A2D3
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0048A34D
                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0048A36F
                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0048A382
                                      • DestroyWindow.USER32(00000000), ref: 0048A3A4
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0048A3DB
                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0048A3F4
                                      • GetDesktopWindow.USER32 ref: 0048A40D
                                      • GetWindowRect.USER32(00000000), ref: 0048A414
                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0048A42C
                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0048A444
                                        • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                      • String ID: 0$PY$tooltips_class32
                                      • API String ID: 1297703922-2132001753
                                      • Opcode ID: ad7f984ea1cd4845daa69472354c2a8f15b860bce95c98789d10b07fca09f9c0
                                      • Instruction ID: 021702ee8d535e162beb7c83f4b22bae82635ac61efe1e234d944cc96a30802f
                                      • Opcode Fuzzy Hash: ad7f984ea1cd4845daa69472354c2a8f15b860bce95c98789d10b07fca09f9c0
                                      • Instruction Fuzzy Hash: CE719270141204AFE721DF18CC49F6B77E5FB88704F04492EF985972A0D7B8E956CB6A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __wcsnicmp
                                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                      • API String ID: 1038674560-1810252412
                                      • Opcode ID: d6a4294c7cbcd71612e5813f8025521f4f0f9458b51b437296836ef19b395cd2
                                      • Instruction ID: cc55e2bc6580523fe6938d14c256d65c14dee3a36fa7a852f9c3cef8ae364549
                                      • Opcode Fuzzy Hash: d6a4294c7cbcd71612e5813f8025521f4f0f9458b51b437296836ef19b395cd2
                                      • Instruction Fuzzy Hash: 2C31A370A48209AADB01EA61DE43FEE7774AF14719F60052FB801711D2EB6D6F18C56E
                                      APIs
                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 00475013
                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0047501E
                                      • LoadCursorW.USER32(00000000,00007F03), ref: 00475029
                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 00475034
                                      • LoadCursorW.USER32(00000000,00007F01), ref: 0047503F
                                      • LoadCursorW.USER32(00000000,00007F81), ref: 0047504A
                                      • LoadCursorW.USER32(00000000,00007F88), ref: 00475055
                                      • LoadCursorW.USER32(00000000,00007F80), ref: 00475060
                                      • LoadCursorW.USER32(00000000,00007F86), ref: 0047506B
                                      • LoadCursorW.USER32(00000000,00007F83), ref: 00475076
                                      • LoadCursorW.USER32(00000000,00007F85), ref: 00475081
                                      • LoadCursorW.USER32(00000000,00007F82), ref: 0047508C
                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00475097
                                      • LoadCursorW.USER32(00000000,00007F04), ref: 004750A2
                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004750AD
                                      • LoadCursorW.USER32(00000000,00007F89), ref: 004750B8
                                      • GetCursorInfo.USER32(?), ref: 004750C8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Cursor$Load$Info
                                      • String ID:
                                      • API String ID: 2577412497-0
                                      • Opcode ID: fe88967af424c1f4c9ae994d1dca842c12f2ee5cef9159fe2d10a3b622c76547
                                      • Instruction ID: d5c7a2001707235dd9e126089dd3671015cbda4ea0a9ffae781a460d29ca5a6d
                                      • Opcode Fuzzy Hash: fe88967af424c1f4c9ae994d1dca842c12f2ee5cef9159fe2d10a3b622c76547
                                      • Instruction Fuzzy Hash: 7F3114B1D083196ADF109FB68C8999FBFE8FF04750F50453BA50DEB281DA7865048F95
                                      APIs
                                      • CharUpperBuffW.USER32(?,?), ref: 00484424
                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0048446F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: BuffCharMessageSendUpper
                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                      • API String ID: 3974292440-4258414348
                                      • Opcode ID: 7454a88992089b1e61816d2ecef48fe0011913299d18ebab8c945f6896199572
                                      • Instruction ID: 284482c989e2c3ea33895925bad2fd62e2b6eb619b8524f2c72ddc2562c3458e
                                      • Opcode Fuzzy Hash: 7454a88992089b1e61816d2ecef48fe0011913299d18ebab8c945f6896199572
                                      • Instruction Fuzzy Hash: BF917F712043119BCB04FF11C451A6EB7E1AF95358F44886EF8966B3A3DB38ED0ACB59
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0048C1FC
                                      • GetFocus.USER32 ref: 0048C20C
                                      • GetDlgCtrlID.USER32(00000000), ref: 0048C217
                                      • _memset.LIBCMT ref: 0048C342
                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0048C36D
                                      • GetMenuItemCount.USER32(?), ref: 0048C38D
                                      • GetMenuItemID.USER32(?,00000000), ref: 0048C3A0
                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0048C3D4
                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0048C41C
                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0048C454
                                      • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0048C489
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                      • String ID: 0$PY
                                      • API String ID: 1296962147-1394038836
                                      • Opcode ID: eb25d7feb90eea9fc33fad5b1b5a613e233e05f353baeab71dfd6a84308b64d5
                                      • Instruction ID: c475bcefc4ba02209658d373736a3052ec3262963195f5d7aee57ef1aaf8ece4
                                      • Opcode Fuzzy Hash: eb25d7feb90eea9fc33fad5b1b5a613e233e05f353baeab71dfd6a84308b64d5
                                      • Instruction Fuzzy Hash: 17818870608301AFD710EF24D894A7FBBE8EB88714F004D2EF99597291D778D945CBAA
                                      APIs
                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0048B8B4
                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,004891C2), ref: 0048B910
                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0048B949
                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0048B98C
                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0048B9C3
                                      • FreeLibrary.KERNEL32(?), ref: 0048B9CF
                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0048B9DF
                                      • DestroyIcon.USER32(?,?,?,?,?,004891C2), ref: 0048B9EE
                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0048BA0B
                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0048BA17
                                        • Part of subcall function 00422EFD: __wcsicmp_l.LIBCMT ref: 00422F86
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                      • String ID: .dll$.exe$.icl
                                      • API String ID: 1212759294-1154884017
                                      • Opcode ID: 2fc131844969b4b5c283f9404ec8a9d49153947123385b136b1911b68efed916
                                      • Instruction ID: 50163288b7a3e5e0cbad55d9f7afdff750af503695f4b02481751edd59ee4b0a
                                      • Opcode Fuzzy Hash: 2fc131844969b4b5c283f9404ec8a9d49153947123385b136b1911b68efed916
                                      • Instruction Fuzzy Hash: CC61F2B1900215BEEB14EF65DC41FBF7BA8FB08710F10491AF915D62C1DBB8A984DBA4
                                      APIs
                                        • Part of subcall function 00401B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00402036,?,00000000,?,?,?,?,004016CB,00000000,?), ref: 00401B9A
                                      • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 004020D3
                                      • KillTimer.USER32(-00000001,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0040216E
                                      • DestroyAcceleratorTable.USER32(00000000), ref: 0043BCA6
                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BCD7
                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BCEE
                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BD0A
                                      • DeleteObject.GDI32(00000000), ref: 0043BD1C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                      • String ID: PY
                                      • API String ID: 641708696-1007129125
                                      • Opcode ID: a58fb8ffa870c88b69f55e7673e679d32567276efed94a11c090087e2d438123
                                      • Instruction ID: edfb5b42e1aee2da2af7767ce8276f4fdeab99f29820ea46fc720bac3244b47a
                                      • Opcode Fuzzy Hash: a58fb8ffa870c88b69f55e7673e679d32567276efed94a11c090087e2d438123
                                      • Instruction Fuzzy Hash: B0617E34101B10DFD735AF14CA48B2A77F1FB44316F50943EE642AAAE0C7B8A891DB99
                                      APIs
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                      • CharLowerBuffW.USER32(?,?), ref: 0046A3CB
                                      • GetDriveTypeW.KERNEL32 ref: 0046A418
                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A460
                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A497
                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A4C5
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                      • API String ID: 2698844021-4113822522
                                      • Opcode ID: 2927e38023d12584f32808ee7aaef9abca88c6531967a08d820ca7fa44af3e97
                                      • Instruction ID: 3713139b98a23bb0435d921a878e050fdb512fde8566727adc807e41ed5eba46
                                      • Opcode Fuzzy Hash: 2927e38023d12584f32808ee7aaef9abca88c6531967a08d820ca7fa44af3e97
                                      • Instruction Fuzzy Hash: F7515EB15146049FC700EF11C88196BB7E8EF94718F10886EF89967292DB39ED0ACF5A
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0043E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0045F8DF
                                      • LoadStringW.USER32(00000000,?,0043E029,00000001), ref: 0045F8E8
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0043E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0045F90A
                                      • LoadStringW.USER32(00000000,?,0043E029,00000001), ref: 0045F90D
                                      • __swprintf.LIBCMT ref: 0045F95D
                                      • __swprintf.LIBCMT ref: 0045F96E
                                      • _wprintf.LIBCMT ref: 0045FA17
                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045FA2E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                      • API String ID: 984253442-2268648507
                                      • Opcode ID: ca98b86b056ff8db1d56ba646df4a743fd010ba5fdb65a0fe040f5bdb44afbb0
                                      • Instruction ID: b677be3246c54b3b75aebbff2f5f4dd64b3be6ce846d7ca24f480393c6b0c58e
                                      • Opcode Fuzzy Hash: ca98b86b056ff8db1d56ba646df4a743fd010ba5fdb65a0fe040f5bdb44afbb0
                                      • Instruction Fuzzy Hash: 92412072D04119AACF04FBE1DD46EEE7778AF14309F50047AB50576092EA396F09CB6A
                                      APIs
                                        • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                      • GetSysColor.USER32(0000000F), ref: 004021D3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ColorLongWindow
                                      • String ID: PY
                                      • API String ID: 259745315-1007129125
                                      • Opcode ID: 5cad2156861d5e09f0dcc7f7d8c2244f51dd7cb73db685edff50dea2b75b763d
                                      • Instruction ID: b625a7fc61febfd2c935065ad26fa2a4911c749eaed189314b0e0014d1ee1d2c
                                      • Opcode Fuzzy Hash: 5cad2156861d5e09f0dcc7f7d8c2244f51dd7cb73db685edff50dea2b75b763d
                                      • Instruction Fuzzy Hash: 0B41E531000100EFDB215F68DC8CBBA3B65EB46331F1442BAFE619A2E1C7758C86DB69
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00489207,?,?), ref: 0048BA56
                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00489207,?,?,00000000,?), ref: 0048BA6D
                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00489207,?,?,00000000,?), ref: 0048BA78
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00489207,?,?,00000000,?), ref: 0048BA85
                                      • GlobalLock.KERNEL32(00000000), ref: 0048BA8E
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00489207,?,?,00000000,?), ref: 0048BA9D
                                      • GlobalUnlock.KERNEL32(00000000), ref: 0048BAA6
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00489207,?,?,00000000,?), ref: 0048BAAD
                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00489207,?,?,00000000,?), ref: 0048BABE
                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00492CAC,?), ref: 0048BAD7
                                      • GlobalFree.KERNEL32(00000000), ref: 0048BAE7
                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 0048BB0B
                                      • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0048BB36
                                      • DeleteObject.GDI32(00000000), ref: 0048BB5E
                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0048BB74
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                      • String ID:
                                      • API String ID: 3840717409-0
                                      • Opcode ID: 2ef3c73d0ecf62ea383054c8459600fe69dcae0fa81eb6f10a909750517e530a
                                      • Instruction ID: 301271e247edaa1236bc569f15f02f45fdac263d88ac98a3d0f0bcda2d5a7a58
                                      • Opcode Fuzzy Hash: 2ef3c73d0ecf62ea383054c8459600fe69dcae0fa81eb6f10a909750517e530a
                                      • Instruction Fuzzy Hash: C4415775600208EFDB21AF65DC88EAFBBB8FB89711F104869F905D7260D734AD05CB64
                                      APIs
                                      • __wsplitpath.LIBCMT ref: 0046DA10
                                      • _wcscat.LIBCMT ref: 0046DA28
                                      • _wcscat.LIBCMT ref: 0046DA3A
                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0046DA4F
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0046DA63
                                      • GetFileAttributesW.KERNEL32(?), ref: 0046DA7B
                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 0046DA95
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0046DAA7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                      • String ID: *.*
                                      • API String ID: 34673085-438819550
                                      • Opcode ID: 503b66c03f50879254dcdcd04ea57c209e5ec2e95b6d9c47f645a81d204faafc
                                      • Instruction ID: 3a96bfa05d70ac0d448354448300b44f57ebebe42a7fb519914baabb83a09890
                                      • Opcode Fuzzy Hash: 503b66c03f50879254dcdcd04ea57c209e5ec2e95b6d9c47f645a81d204faafc
                                      • Instruction Fuzzy Hash: 128182B1E042419FCB24EF65C84496BB7E4AF89314F18882FF889D7351E638D949CB57
                                      APIs
                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00486FA5
                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00486FA8
                                      • GetWindowLongW.USER32(?,000000F0), ref: 00486FCC
                                      • _memset.LIBCMT ref: 00486FDD
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00486FEF
                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00487067
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$LongWindow_memset
                                      • String ID: PY
                                      • API String ID: 830647256-1007129125
                                      • Opcode ID: 4336d240a59bbb388c973f46f1178136a6457c7e14c292988be6c5ed4532a5ee
                                      • Instruction ID: 7132dcb9391edd1f4fca7d59f8acd98ed1f58d557d43f29f177e0b8d5bde9df6
                                      • Opcode Fuzzy Hash: 4336d240a59bbb388c973f46f1178136a6457c7e14c292988be6c5ed4532a5ee
                                      • Instruction Fuzzy Hash: 17618E75900208AFDB10EFA4CC85EEE77B8EB09700F20056AFA14A73A1C775AD51DB64
                                      APIs
                                      • GetDC.USER32(00000000), ref: 0047738F
                                      • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0047739B
                                      • CreateCompatibleDC.GDI32(?), ref: 004773A7
                                      • SelectObject.GDI32(00000000,?), ref: 004773B4
                                      • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00477408
                                      • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00477444
                                      • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00477468
                                      • SelectObject.GDI32(00000006,?), ref: 00477470
                                      • DeleteObject.GDI32(?), ref: 00477479
                                      • DeleteDC.GDI32(00000006), ref: 00477480
                                      • ReleaseDC.USER32(00000000,?), ref: 0047748B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                      • String ID: (
                                      • API String ID: 2598888154-3887548279
                                      • Opcode ID: 11b2c794cb0b8925ba4cfeefae9169d621ae3e21e55fb1fe28b256f0cb7566aa
                                      • Instruction ID: dfe8a3419fea5eebfe22a8fe4a62b6ec684acb784746aa6277c3acce6f7982dd
                                      • Opcode Fuzzy Hash: 11b2c794cb0b8925ba4cfeefae9169d621ae3e21e55fb1fe28b256f0cb7566aa
                                      • Instruction Fuzzy Hash: 5D515871904209EFCB14CFA8CC84EAFBBB9EF49310F14852EF959A7211D735A945CB54
                                      APIs
                                        • Part of subcall function 00420957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00406B0C,?,00008000), ref: 00420973
                                        • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00406BAD
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00406CFA
                                        • Part of subcall function 0040586D: _wcscpy.LIBCMT ref: 004058A5
                                        • Part of subcall function 0042363D: _iswctype.LIBCMT ref: 00423645
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                      • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                      • API String ID: 537147316-1018226102
                                      • Opcode ID: a57f0a42fb2896f9be1fd39652383dd74ff79174fe2a19fecd0930e710f7e602
                                      • Instruction ID: 136c1bde332718f4234bbb9892b60201bfb37e26dd96c6a9a3310cb901d73b7e
                                      • Opcode Fuzzy Hash: a57f0a42fb2896f9be1fd39652383dd74ff79174fe2a19fecd0930e710f7e602
                                      • Instruction Fuzzy Hash: 2C027D701083419FC714EF25C8419AFBBE5EF98318F54492FF486A72A2DB38D949CB5A
                                      APIs
                                      • _memset.LIBCMT ref: 00462D50
                                      • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00462DDD
                                      • GetMenuItemCount.USER32(004C5890), ref: 00462E66
                                      • DeleteMenu.USER32(004C5890,00000005,00000000,000000F5,?,?), ref: 00462EF6
                                      • DeleteMenu.USER32(004C5890,00000004,00000000), ref: 00462EFE
                                      • DeleteMenu.USER32(004C5890,00000006,00000000), ref: 00462F06
                                      • DeleteMenu.USER32(004C5890,00000003,00000000), ref: 00462F0E
                                      • GetMenuItemCount.USER32(004C5890), ref: 00462F16
                                      • SetMenuItemInfoW.USER32(004C5890,00000004,00000000,00000030), ref: 00462F4C
                                      • GetCursorPos.USER32(?), ref: 00462F56
                                      • SetForegroundWindow.USER32(00000000), ref: 00462F5F
                                      • TrackPopupMenuEx.USER32(004C5890,00000000,?,00000000,00000000,00000000), ref: 00462F72
                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00462F7E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                      • String ID:
                                      • API String ID: 3993528054-0
                                      • Opcode ID: 68d6ff921564c39c8709aecc737d134abe6a2587159ab4d14f70d8f79111516a
                                      • Instruction ID: dec7b0e441c84a99d0ab23afc077d39fee676e6f9a2472c44709d087c22ecc3a
                                      • Opcode Fuzzy Hash: 68d6ff921564c39c8709aecc737d134abe6a2587159ab4d14f70d8f79111516a
                                      • Instruction Fuzzy Hash: AB71F670601A05BBEB219F54DD49FAABF64FF04314F10022BF615AA2E1D7FA5C10DB5A
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 004788D7
                                      • CoInitialize.OLE32(00000000), ref: 00478904
                                      • CoUninitialize.OLE32 ref: 0047890E
                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00478A0E
                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00478B3B
                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00492C0C), ref: 00478B6F
                                      • CoGetObject.OLE32(?,00000000,00492C0C,?), ref: 00478B92
                                      • SetErrorMode.KERNEL32(00000000), ref: 00478BA5
                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00478C25
                                      • VariantClear.OLEAUT32(?), ref: 00478C35
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                      • String ID: ,,I
                                      • API String ID: 2395222682-4163367948
                                      • Opcode ID: 8200473e00b2e3250b004b454e0db4e1ddc75f411d4f81fe3161e106eba26c5c
                                      • Instruction ID: aabbb54c80bb5556d5779205c7c98f5c8569651e4766cb9ae3be61758569f7e0
                                      • Opcode Fuzzy Hash: 8200473e00b2e3250b004b454e0db4e1ddc75f411d4f81fe3161e106eba26c5c
                                      • Instruction Fuzzy Hash: 33C138B1604305AFC700DF25C88896BB7E9FF89348F00896EF9899B251DB75ED05CB56
                                      APIs
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                      • _memset.LIBCMT ref: 0045786B
                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004578A0
                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 004578BC
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 004578D8
                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00457902
                                      • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0045792A
                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00457935
                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0045793A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                      • API String ID: 1411258926-22481851
                                      • Opcode ID: f592d054e47dc44b696426060d9b6da8e7646b8dd9b488b38bc4d654e747ccbf
                                      • Instruction ID: bd842348e8c291230e2108f9814d7b32575dde29d3ae902d03d2cd9f0e66d559
                                      • Opcode Fuzzy Hash: f592d054e47dc44b696426060d9b6da8e7646b8dd9b488b38bc4d654e747ccbf
                                      • Instruction Fuzzy Hash: 3F41FB72C14129AADF11EBA5DC85DEEB778FF04314F40447AE905B22A1DB396D08CBA8
                                      APIs
                                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: BuffCharUpper
                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                      • API String ID: 3964851224-909552448
                                      • Opcode ID: e393542f17fd117502362e02ee987a71a6663cfa78e4210d491064ae360a9c81
                                      • Instruction ID: 987af29362f030b9785e67816bde092fa47ad23058dcaf1b7a905610e89cab94
                                      • Opcode Fuzzy Hash: e393542f17fd117502362e02ee987a71a6663cfa78e4210d491064ae360a9c81
                                      • Instruction Fuzzy Hash: 3C4183312142598BCF60FF11D891AEF3760AF21308F94882BFE5517292D77C9D1ACB69
                                      APIs
                                      • _memset.LIBCMT ref: 0048716A
                                      • CreateMenu.USER32 ref: 00487185
                                      • SetMenu.USER32(?,00000000), ref: 00487194
                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00487221
                                      • IsMenu.USER32(?), ref: 00487237
                                      • CreatePopupMenu.USER32 ref: 00487241
                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0048726E
                                      • DrawMenuBar.USER32 ref: 00487276
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                      • String ID: 0$F$PY
                                      • API String ID: 176399719-4106738315
                                      • Opcode ID: 8d361ed52167b8eab7a66d10bcbcea6876906ccdec482831028141534145e52f
                                      • Instruction ID: ef621a00a8965f8f9a50d7f8a7e1c0e3a51c02c5d80a3ac9dc969039337b3b35
                                      • Opcode Fuzzy Hash: 8d361ed52167b8eab7a66d10bcbcea6876906ccdec482831028141534145e52f
                                      • Instruction Fuzzy Hash: 2A419B74A01204EFDB10EF64D898E9E7BB5FF09300F240469F915A7361D735A910DF98
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0043E2A0,00000010,?,Bad directive syntax error,0048F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0045F7C2
                                      • LoadStringW.USER32(00000000,?,0043E2A0,00000010), ref: 0045F7C9
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                      • _wprintf.LIBCMT ref: 0045F7FC
                                      • __swprintf.LIBCMT ref: 0045F81E
                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0045F88D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                      • API String ID: 1506413516-4153970271
                                      • Opcode ID: 450e02f98ec563c19fb9e297c78b64fe48fd12ba04bb0a91b6f07c33999cccca
                                      • Instruction ID: b323f88afb297f8589dfe01482fd0210897c7bceeb753686804773940a61526b
                                      • Opcode Fuzzy Hash: 450e02f98ec563c19fb9e297c78b64fe48fd12ba04bb0a91b6f07c33999cccca
                                      • Instruction Fuzzy Hash: 33215071904219BBCF11EF91CC0AEEE7739BF14309F04087BB515750A2EA39AA18DB59
                                      APIs
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                        • Part of subcall function 00407924: _memmove.LIBCMT ref: 004079AD
                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00465330
                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00465346
                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00465357
                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00465369
                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0046537A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: SendString$_memmove
                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                      • API String ID: 2279737902-1007645807
                                      • Opcode ID: 207ab49c45a5d801b6b6f2b771c321b56be26780ede0ff3f901cc0477363415c
                                      • Instruction ID: 2e8e5f898991f968bbba2f693440f846553d5b5edaf37d24830f39f112612e90
                                      • Opcode Fuzzy Hash: 207ab49c45a5d801b6b6f2b771c321b56be26780ede0ff3f901cc0477363415c
                                      • Instruction Fuzzy Hash: CE119370D5015979D720B662CC49EFF7B7CEB91B48F10042F7801A21D1EDB81D45C6BA
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                      • String ID: 0.0.0.0
                                      • API String ID: 208665112-3771769585
                                      • Opcode ID: 0919b58da7cc5f40bdebd74c0183a587c6a80134b558d621886d7f10d265267e
                                      • Instruction ID: ae08325a14d93a890b1fa528d308863361f072a57d3f479d6846efdaae1a579c
                                      • Opcode Fuzzy Hash: 0919b58da7cc5f40bdebd74c0183a587c6a80134b558d621886d7f10d265267e
                                      • Instruction Fuzzy Hash: BD11F331600114AFDB10AB70AC46EDE77ACEB41716F5405BFF44592191FF7889858B5A
                                      APIs
                                      • timeGetTime.WINMM ref: 00464F7A
                                        • Part of subcall function 0042049F: timeGetTime.WINMM(?,75A8B400,00410E7B), ref: 004204A3
                                      • Sleep.KERNEL32(0000000A), ref: 00464FA6
                                      • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00464FCA
                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00464FEC
                                      • SetActiveWindow.USER32 ref: 0046500B
                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00465019
                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00465038
                                      • Sleep.KERNEL32(000000FA), ref: 00465043
                                      • IsWindow.USER32 ref: 0046504F
                                      • EndDialog.USER32(00000000), ref: 00465060
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                      • String ID: BUTTON
                                      • API String ID: 1194449130-3405671355
                                      • Opcode ID: 8774e4f041890dbc2a91042b0544c15fbc059514b46ccdf9cc1dd7305ce15ae1
                                      • Instruction ID: 17ca608856519cd1955488b4f204772d3e00e2da9bda675b1abbe090807247ff
                                      • Opcode Fuzzy Hash: 8774e4f041890dbc2a91042b0544c15fbc059514b46ccdf9cc1dd7305ce15ae1
                                      • Instruction Fuzzy Hash: A521A174200605BFEB505F60FC88F2A3BA9EB44749F25543EF102922B1EB758D549B6F
                                      APIs
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                      • CoInitialize.OLE32(00000000), ref: 0046D5EA
                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0046D67D
                                      • SHGetDesktopFolder.SHELL32(?), ref: 0046D691
                                      • CoCreateInstance.OLE32(00492D7C,00000000,00000001,004B8C1C,?), ref: 0046D6DD
                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0046D74C
                                      • CoTaskMemFree.OLE32(?,?), ref: 0046D7A4
                                      • _memset.LIBCMT ref: 0046D7E1
                                      • SHBrowseForFolderW.SHELL32(?), ref: 0046D81D
                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0046D840
                                      • CoTaskMemFree.OLE32(00000000), ref: 0046D847
                                      • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0046D87E
                                      • CoUninitialize.OLE32(00000001,00000000), ref: 0046D880
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                      • String ID:
                                      • API String ID: 1246142700-0
                                      • Opcode ID: 286ba29e49793143591129a8d0a4875663947f2824498d83936396cb892ce641
                                      • Instruction ID: f865a34610966cb3ccb6f29414af5a3955dc884533e4df89e7e1a7976a3b9bcc
                                      • Opcode Fuzzy Hash: 286ba29e49793143591129a8d0a4875663947f2824498d83936396cb892ce641
                                      • Instruction Fuzzy Hash: 39B11B75A00109AFDB04DFA5C888DAEBBB9FF48314F10846AF909EB261DB34ED45CB55
                                      APIs
                                      • GetDlgItem.USER32(?,00000001), ref: 0045C283
                                      • GetWindowRect.USER32(00000000,?), ref: 0045C295
                                      • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0045C2F3
                                      • GetDlgItem.USER32(?,00000002), ref: 0045C2FE
                                      • GetWindowRect.USER32(00000000,?), ref: 0045C310
                                      • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0045C364
                                      • GetDlgItem.USER32(?,000003E9), ref: 0045C372
                                      • GetWindowRect.USER32(00000000,?), ref: 0045C383
                                      • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0045C3C6
                                      • GetDlgItem.USER32(?,000003EA), ref: 0045C3D4
                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0045C3F1
                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0045C3FE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$ItemMoveRect$Invalidate
                                      • String ID:
                                      • API String ID: 3096461208-0
                                      • Opcode ID: ee900cb0418c209eff2971d5848f65fb009066793c70c2948a602d6ec38bc7ab
                                      • Instruction ID: 11649da17df5d0755d73b9da25d5b781727aa351e01af551b5c423be9c7c6dfa
                                      • Opcode Fuzzy Hash: ee900cb0418c209eff2971d5848f65fb009066793c70c2948a602d6ec38bc7ab
                                      • Instruction Fuzzy Hash: 62517071B00305AFDB08CFA9DD89AAEBBB6EB88311F14853DF915E7291D7709D448B14
                                      APIs
                                      • CharLowerBuffW.USER32(?,?,0048F910), ref: 0046A90B
                                      • GetDriveTypeW.KERNEL32(00000061,004B89A0,00000061), ref: 0046A9D5
                                      • _wcscpy.LIBCMT ref: 0046A9FF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: BuffCharDriveLowerType_wcscpy
                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                      • API String ID: 2820617543-1000479233
                                      • Opcode ID: c1927c0305229e70b74ca9918e3762630e65a1b327fd187c2e90d7d774524a11
                                      • Instruction ID: 63d5a068ad5a56aba220708db6a6aa365c702eef260e2cf9077a2f95fd26ae7a
                                      • Opcode Fuzzy Hash: c1927c0305229e70b74ca9918e3762630e65a1b327fd187c2e90d7d774524a11
                                      • Instruction Fuzzy Hash: 6751AE711183009BC700EF15C892AAFB7E5EF94308F544C2FF495672A2EB399D19CA5B
                                      APIs
                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 004886FF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: InvalidateRect
                                      • String ID: PY
                                      • API String ID: 634782764-1007129125
                                      • Opcode ID: 5241e15fe311c09e0b9a58403e24b3542cd81eb9c0fcbe79f3dbd29aa05aaa3b
                                      • Instruction ID: 67c69bdd2abc2e43d0d58bc2ecba6baab6695951e18c15bee5b3ec72a7eaee37
                                      • Opcode Fuzzy Hash: 5241e15fe311c09e0b9a58403e24b3542cd81eb9c0fcbe79f3dbd29aa05aaa3b
                                      • Instruction Fuzzy Hash: BE519530500244BEDB20BB298C89F5E7B64EB05724FA0492FF911E62E1DF79A990DB5D
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __i64tow__itow__swprintf
                                      • String ID: %.15g$0x%p$False$True
                                      • API String ID: 421087845-2263619337
                                      • Opcode ID: 7d3e971c850559a03fa6d8b8446b87b3b37e28723ef4b31fc63029cc17f40ec3
                                      • Instruction ID: 743c89ec1be8f3b6cfe40c528e2526a533573b02274d3a1687b28713588ebf87
                                      • Opcode Fuzzy Hash: 7d3e971c850559a03fa6d8b8446b87b3b37e28723ef4b31fc63029cc17f40ec3
                                      • Instruction Fuzzy Hash: AB41D772A10205AFDB24EF35D841A7673E8EF09304F20487FE549E6393EA3D9D068B19
                                      APIs
                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0048755E
                                      • CreateCompatibleDC.GDI32(00000000), ref: 00487565
                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00487578
                                      • SelectObject.GDI32(00000000,00000000), ref: 00487580
                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0048758B
                                      • DeleteDC.GDI32(00000000), ref: 00487594
                                      • GetWindowLongW.USER32(?,000000EC), ref: 0048759E
                                      • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 004875B2
                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 004875BE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                      • String ID: static
                                      • API String ID: 2559357485-2160076837
                                      • Opcode ID: 2462904ef93fc367447b653beb19009bbb9b8e29659318a1c617b8df96e81b81
                                      • Instruction ID: 1923f87f84a105141cc97cd4dfb73f9ea5de9f9edaf5dec82e4c1ac095da0f9d
                                      • Opcode Fuzzy Hash: 2462904ef93fc367447b653beb19009bbb9b8e29659318a1c617b8df96e81b81
                                      • Instruction Fuzzy Hash: FA316D72104214BBDF11AF64DC08FDF3BA9FF09364F210A29FA15A61A0D739D815DBA8
                                      APIs
                                      • _memset.LIBCMT ref: 00426E3E
                                        • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                      • __gmtime64_s.LIBCMT ref: 00426ED7
                                      • __gmtime64_s.LIBCMT ref: 00426F0D
                                      • __gmtime64_s.LIBCMT ref: 00426F2A
                                      • __allrem.LIBCMT ref: 00426F80
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00426F9C
                                      • __allrem.LIBCMT ref: 00426FB3
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00426FD1
                                      • __allrem.LIBCMT ref: 00426FE8
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00427006
                                      • __invoke_watson.LIBCMT ref: 00427077
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                      • String ID:
                                      • API String ID: 384356119-0
                                      • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                      • Instruction ID: cc18d51bddcb3bff235d9ba930da6ebb912618c2495e950f743dda1aeb2a8d13
                                      • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                      • Instruction Fuzzy Hash: F8710876B00726ABD714AF79EC41B5BB3A4AF04328F55412FF514D7281EB78ED048B98
                                      APIs
                                      • _memset.LIBCMT ref: 00462542
                                      • GetMenuItemInfoW.USER32(004C5890,000000FF,00000000,00000030), ref: 004625A3
                                      • SetMenuItemInfoW.USER32(004C5890,00000004,00000000,00000030), ref: 004625D9
                                      • Sleep.KERNEL32(000001F4), ref: 004625EB
                                      • GetMenuItemCount.USER32(?), ref: 0046262F
                                      • GetMenuItemID.USER32(?,00000000), ref: 0046264B
                                      • GetMenuItemID.USER32(?,-00000001), ref: 00462675
                                      • GetMenuItemID.USER32(?,?), ref: 004626BA
                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00462700
                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00462714
                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00462735
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                      • String ID:
                                      • API String ID: 4176008265-0
                                      • Opcode ID: b0f46b9daa1905a6cfa597ce9f08befe4fcaea4ae8b00d429bdca1168be675da
                                      • Instruction ID: d041e2a6511ad081bd824cff42eca7b157938f8ca15e77e0b80393dec237999e
                                      • Opcode Fuzzy Hash: b0f46b9daa1905a6cfa597ce9f08befe4fcaea4ae8b00d429bdca1168be675da
                                      • Instruction Fuzzy Hash: 3361B470900A49BFDB11CF64CE84DBF7BB8FB01345F14046AE842A7251E7B9AD05DB2A
                                      APIs
                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00456BBF
                                      • SafeArrayAllocData.OLEAUT32(?), ref: 00456C18
                                      • VariantInit.OLEAUT32(?), ref: 00456C2A
                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00456C4A
                                      • VariantCopy.OLEAUT32(?,?), ref: 00456C9D
                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00456CB1
                                      • VariantClear.OLEAUT32(?), ref: 00456CC6
                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00456CD3
                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00456CDC
                                      • VariantClear.OLEAUT32(?), ref: 00456CEE
                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00456CF9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                      • String ID:
                                      • API String ID: 2706829360-0
                                      • Opcode ID: f1379b8d06b3f903a5e910e956f09b0d2a9745292c14bd0cd64e072d7f41818e
                                      • Instruction ID: 21fd5a8c16b11a42553d074c3324144f158a868588d4a73b9a3ed32873cef97c
                                      • Opcode Fuzzy Hash: f1379b8d06b3f903a5e910e956f09b0d2a9745292c14bd0cd64e072d7f41818e
                                      • Instruction Fuzzy Hash: F1418231A001199FCF00DFA9D8449AEBBB9EF18315F01847EE955E7362CB34A949CF94
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                      • GetSystemMetrics.USER32(0000000F), ref: 0048D47C
                                      • GetSystemMetrics.USER32(0000000F), ref: 0048D49C
                                      • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0048D6D7
                                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0048D6F5
                                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0048D716
                                      • ShowWindow.USER32(00000003,00000000), ref: 0048D735
                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0048D75A
                                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 0048D77D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                      • String ID: PY
                                      • API String ID: 1211466189-1007129125
                                      • Opcode ID: 0203702f286659d10d4278849ff5e5afca9b212512cb7b0e40afbf88da2cb955
                                      • Instruction ID: 2f618d94a1d43a989375790be64f9a6bb81cc316bd664b93e4dd4f842dd9a18d
                                      • Opcode Fuzzy Hash: 0203702f286659d10d4278849ff5e5afca9b212512cb7b0e40afbf88da2cb955
                                      • Instruction Fuzzy Hash: 2EB1AE71901219EFDF14EF68C9857AE7BB1BF04701F08847AEC48AB295E738A950CB54
                                      APIs
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                      • CoInitialize.OLE32 ref: 00478403
                                      • CoUninitialize.OLE32 ref: 0047840E
                                      • CoCreateInstance.OLE32(?,00000000,00000017,00492BEC,?), ref: 0047846E
                                      • IIDFromString.OLE32(?,?), ref: 004784E1
                                      • VariantInit.OLEAUT32(?), ref: 0047857B
                                      • VariantClear.OLEAUT32(?), ref: 004785DC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                      • API String ID: 834269672-1287834457
                                      • Opcode ID: c04c75621ce49cc5f6b0995f70e74a0e3f94a869c5641639a45c403aad8c8130
                                      • Instruction ID: cb75df2b24e16c1c2e0b5d8d850f15e0fc33cba1d2aa6ec0deb68a9cf625d14d
                                      • Opcode Fuzzy Hash: c04c75621ce49cc5f6b0995f70e74a0e3f94a869c5641639a45c403aad8c8130
                                      • Instruction Fuzzy Hash: AA61C170648312AFC710DF14C848B9FB7E8AF44744F00881EF9899B291DB78ED48CB9A
                                      APIs
                                      • WSAStartup.WSOCK32(00000101,?), ref: 00475793
                                      • inet_addr.WSOCK32(?,?,?), ref: 004757D8
                                      • gethostbyname.WSOCK32(?), ref: 004757E4
                                      • IcmpCreateFile.IPHLPAPI ref: 004757F2
                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00475862
                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00475878
                                      • IcmpCloseHandle.IPHLPAPI(00000000), ref: 004758ED
                                      • WSACleanup.WSOCK32 ref: 004758F3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                      • String ID: Ping
                                      • API String ID: 1028309954-2246546115
                                      • Opcode ID: 141106721b3570dbf7d0db60caddfb3fd016a48d0f0cffaf2c0540719f188cb5
                                      • Instruction ID: e00705f4e0379358c1930da5d1710ca1d0dba9501fb2cabd0d468b8ffa352f64
                                      • Opcode Fuzzy Hash: 141106721b3570dbf7d0db60caddfb3fd016a48d0f0cffaf2c0540719f188cb5
                                      • Instruction Fuzzy Hash: 08519F716006009FD710AF25DC45B6A77E4EF48714F05892EF95AEB3A1DB78EC14CB4A
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0046B4D0
                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0046B546
                                      • GetLastError.KERNEL32 ref: 0046B550
                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 0046B5BD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Error$Mode$DiskFreeLastSpace
                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                      • API String ID: 4194297153-14809454
                                      • Opcode ID: 3fd9f1365020a68346069df63e8209364b1517ed66d9291c43418ee30fffd948
                                      • Instruction ID: 3fb85926d1a8df40b98e85eadc692d0a6e2328ff5e483d9ffe01cb822ebdbf3c
                                      • Opcode Fuzzy Hash: 3fd9f1365020a68346069df63e8209364b1517ed66d9291c43418ee30fffd948
                                      • Instruction Fuzzy Hash: 29318675A00205AFCB00EB68C845AEE77B4FF45318F10416BF506D7291EB799E86CB9A
                                      APIs
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                        • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                      • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00459014
                                      • GetDlgCtrlID.USER32 ref: 0045901F
                                      • GetParent.USER32 ref: 0045903B
                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 0045903E
                                      • GetDlgCtrlID.USER32(?), ref: 00459047
                                      • GetParent.USER32(?), ref: 00459063
                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00459066
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 1536045017-1403004172
                                      • Opcode ID: f7dbb9e0cd2336217e3fd5a0b544770407f3cd858691e7dc5f6bdc3723beb9d8
                                      • Instruction ID: 6714b25adca5f569a88cfbaafbe7bd2dd1ba81f724cd7e2599907f028ed7346a
                                      • Opcode Fuzzy Hash: f7dbb9e0cd2336217e3fd5a0b544770407f3cd858691e7dc5f6bdc3723beb9d8
                                      • Instruction Fuzzy Hash: D021D870A00108BFDF04ABA1CC85EFEB774EF45310F10062AF911672E2DB795819DB28
                                      APIs
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                        • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                      • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 004590FD
                                      • GetDlgCtrlID.USER32 ref: 00459108
                                      • GetParent.USER32 ref: 00459124
                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00459127
                                      • GetDlgCtrlID.USER32(?), ref: 00459130
                                      • GetParent.USER32(?), ref: 0045914C
                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 0045914F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 1536045017-1403004172
                                      • Opcode ID: 300943c23f83093837d5509e824250a0cd4ef981be9b1c909c6a3e8be0f9f5a9
                                      • Instruction ID: 4d8cd3b83cca1d69534b37f7086261ba2dc9307f4c099413b547fbd15d3c7d68
                                      • Opcode Fuzzy Hash: 300943c23f83093837d5509e824250a0cd4ef981be9b1c909c6a3e8be0f9f5a9
                                      • Instruction Fuzzy Hash: AA21B674A00108BFDF01ABA5CC85EFEBB74EF44301F50452BB911A72A2DB795819DB29
                                      APIs
                                      • GetParent.USER32 ref: 0045916F
                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00459184
                                      • _wcscmp.LIBCMT ref: 00459196
                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00459211
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameParentSend_wcscmp
                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                      • API String ID: 1704125052-3381328864
                                      • Opcode ID: ea2da3042022fb33e5a84bdcfd4780e66fcf499551f9b63f672fb9db9d77b33f
                                      • Instruction ID: f102ea4107ca07b1db40aa5d7e68bb0b9a0f71bc8f584d68d6a8224326f4a83e
                                      • Opcode Fuzzy Hash: ea2da3042022fb33e5a84bdcfd4780e66fcf499551f9b63f672fb9db9d77b33f
                                      • Instruction Fuzzy Hash: 3111E776248317F9FA112624EC06DAB379CAB15721F30046BFD00E40D2FEA95C56666C
                                      APIs
                                      • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00467A6C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ArraySafeVartype
                                      • String ID:
                                      • API String ID: 1725837607-0
                                      • Opcode ID: 46552a337c17888fd74ab77ef3dd11a8456c20f9349623715d4c8de646e41f3e
                                      • Instruction ID: f345ea7412457e7e347d510fb85f3071452751bcee82d372445be7a605543e95
                                      • Opcode Fuzzy Hash: 46552a337c17888fd74ab77ef3dd11a8456c20f9349623715d4c8de646e41f3e
                                      • Instruction Fuzzy Hash: 4DB1A071A042199FDB00DFA5C884BBEB7F4FF09729F20442BE501E7251E738A945CB9A
                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 004611F0
                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00460268,?,00000001), ref: 00461204
                                      • GetWindowThreadProcessId.USER32(00000000), ref: 0046120B
                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00460268,?,00000001), ref: 0046121A
                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0046122C
                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00460268,?,00000001), ref: 00461245
                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00460268,?,00000001), ref: 00461257
                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00460268,?,00000001), ref: 0046129C
                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00460268,?,00000001), ref: 004612B1
                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00460268,?,00000001), ref: 004612BC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                      • String ID:
                                      • API String ID: 2156557900-0
                                      • Opcode ID: 2caf1bd63dccf00636a063d85e3956ee9e2a291adaf0d7952c1a55c89920e2b2
                                      • Instruction ID: 1e48a1bdefc3aaf7905b324a82868e76ea33fb60fcd143e126220ea2d996acdd
                                      • Opcode Fuzzy Hash: 2caf1bd63dccf00636a063d85e3956ee9e2a291adaf0d7952c1a55c89920e2b2
                                      • Instruction Fuzzy Hash: 2B31D275600208BFDB109F54EC98F6A37A9EF54315F1582BEFA00E62B0E7789D448B5E
                                      APIs
                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0040FAA6
                                      • OleUninitialize.OLE32(?,00000000), ref: 0040FB45
                                      • UnregisterHotKey.USER32(?), ref: 0040FC9C
                                      • DestroyWindow.USER32(?), ref: 004445D6
                                      • FreeLibrary.KERNEL32(?), ref: 0044463B
                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00444668
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                      • String ID: close all
                                      • API String ID: 469580280-3243417748
                                      • Opcode ID: 4e53837ddb9d94398bc3a0666fc617cdbe641506d3b575595ec33a05839d907f
                                      • Instruction ID: 59e8764fe62611fd964d550ecae672a7644857393bcc4fdd7d18f89e9d4be380
                                      • Opcode Fuzzy Hash: 4e53837ddb9d94398bc3a0666fc617cdbe641506d3b575595ec33a05839d907f
                                      • Instruction Fuzzy Hash: B3A19070301112CFEB28EF15C595B6AF364BF45704F5142BEE80AAB692DB38AC16CF59
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Variant$ClearInit$_memset
                                      • String ID: ,,I$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                      • API String ID: 2862541840-2080382077
                                      • Opcode ID: 4876e0fe4e6e65ed2aee25e8811e5c19d6b5f5c946948c970bae7899105c18ce
                                      • Instruction ID: ae80b45066e4f78fbd037e562a23a34cf658a5e22d7790f01f39a3ab0041c2b1
                                      • Opcode Fuzzy Hash: 4876e0fe4e6e65ed2aee25e8811e5c19d6b5f5c946948c970bae7899105c18ce
                                      • Instruction Fuzzy Hash: 62919E30A00205ABDF20DFA1C848FEFB7B8EF49714F10855EE909AB281D7789D05CBA4
                                      APIs
                                      • EnumChildWindows.USER32(?,0045A439), ref: 0045A377
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ChildEnumWindows
                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                      • API String ID: 3555792229-1603158881
                                      • Opcode ID: 3424a5092b241d7dc1d9361be960e2c1b2aee4163f416f688512b31513faff7b
                                      • Instruction ID: 7454df241f77d0b93e78cd2df6a08ba454d4c5e8e9c0a671585cc9aba64ec447
                                      • Opcode Fuzzy Hash: 3424a5092b241d7dc1d9361be960e2c1b2aee4163f416f688512b31513faff7b
                                      • Instruction Fuzzy Hash: BA91BB70600505AADB08DF61C452BEEF774BF04305F54822FEC59A7242DB3969ADCB99
                                      APIs
                                      • IsWindow.USER32(00EA5950), ref: 0048B3EB
                                      • IsWindowEnabled.USER32(00EA5950), ref: 0048B3F7
                                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0048B4DB
                                      • SendMessageW.USER32(00EA5950,000000B0,?,?), ref: 0048B512
                                      • IsDlgButtonChecked.USER32(?,?), ref: 0048B54F
                                      • GetWindowLongW.USER32(00EA5950,000000EC), ref: 0048B571
                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0048B589
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                      • String ID: PY
                                      • API String ID: 4072528602-1007129125
                                      • Opcode ID: 042a07b2c0a1a8318345eeafec4ec433e999501975a103611c12e9322136f237
                                      • Instruction ID: 3cfba568ea5790526d5b286793119b4d477072028a14d6832b16bbf893ccb4d1
                                      • Opcode Fuzzy Hash: 042a07b2c0a1a8318345eeafec4ec433e999501975a103611c12e9322136f237
                                      • Instruction Fuzzy Hash: 9B71BF34601604EFDB21AF54CC95FBF7BA9EF09700F14486EE941973A2C739A891DB98
                                      APIs
                                      • SetWindowLongW.USER32(?,000000EB), ref: 00402EAE
                                        • Part of subcall function 00401DB3: GetClientRect.USER32(?,?), ref: 00401DDC
                                        • Part of subcall function 00401DB3: GetWindowRect.USER32(?,?), ref: 00401E1D
                                        • Part of subcall function 00401DB3: ScreenToClient.USER32(?,?), ref: 00401E45
                                      • GetDC.USER32 ref: 0043CD32
                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0043CD45
                                      • SelectObject.GDI32(00000000,00000000), ref: 0043CD53
                                      • SelectObject.GDI32(00000000,00000000), ref: 0043CD68
                                      • ReleaseDC.USER32(?,00000000), ref: 0043CD70
                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0043CDFB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                      • String ID: U
                                      • API String ID: 4009187628-3372436214
                                      • Opcode ID: 3cdb49cb97ee06b786ec44539fc98b371f27cf3cd913876941f0ba4c68568fc2
                                      • Instruction ID: a06c30b2c7428a2a0e02ce49fef1101dc5652c1e0a779c9989b3b0b616dc9c80
                                      • Opcode Fuzzy Hash: 3cdb49cb97ee06b786ec44539fc98b371f27cf3cd913876941f0ba4c68568fc2
                                      • Instruction Fuzzy Hash: 8A71CB31400205DFCF219F64C884AAB3BB5FF48324F14567BFD55AA2A6C7389881DBA9
                                      APIs
                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00471A50
                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00471A7C
                                      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00471ABE
                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00471AD3
                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00471AE0
                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00471B10
                                      • InternetCloseHandle.WININET(00000000), ref: 00471B57
                                        • Part of subcall function 00472483: GetLastError.KERNEL32(?,?,00471817,00000000,00000000,00000001), ref: 00472498
                                        • Part of subcall function 00472483: SetEvent.KERNEL32(?,?,00471817,00000000,00000000,00000001), ref: 004724AD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                      • String ID:
                                      • API String ID: 2603140658-3916222277
                                      • Opcode ID: aa01275037a38f963506193fea1796638b124aeb3c83487e21ea42de32fb35b9
                                      • Instruction ID: b1cd9579bf79affc09905b3c3103fca49caeefe103209f13a3a81289339633ec
                                      • Opcode Fuzzy Hash: aa01275037a38f963506193fea1796638b124aeb3c83487e21ea42de32fb35b9
                                      • Instruction Fuzzy Hash: 224162B1501218BFEB118F54CC85FFF776CEB08354F00812BFA0996251E7789E449BA8
                                      APIs
                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 004862EC
                                      • GetWindowLongW.USER32(00EA5950,000000F0), ref: 0048631F
                                      • GetWindowLongW.USER32(00EA5950,000000F0), ref: 00486354
                                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00486386
                                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 004863B0
                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 004863C1
                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004863DB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: LongWindow$MessageSend
                                      • String ID: PY
                                      • API String ID: 2178440468-1007129125
                                      • Opcode ID: b6c63574b2784a6fe8e125d212b22f8229395cc3faf42e06ca4ca63f68dab27c
                                      • Instruction ID: de0077e50bd3e6fac1d65856e76e1ec94ed34838b8122e9b1a950ed70c11c10c
                                      • Opcode Fuzzy Hash: b6c63574b2784a6fe8e125d212b22f8229395cc3faf42e06ca4ca63f68dab27c
                                      • Instruction Fuzzy Hash: 2B3125306001509FDB61EF18EC84F6E37E1FB4A714F1A05B9F9009F2B1CB75A8849B59
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0048F910), ref: 00478D28
                                      • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0048F910), ref: 00478D5C
                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00478ED6
                                      • SysFreeString.OLEAUT32(?), ref: 00478F00
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                      • String ID:
                                      • API String ID: 560350794-0
                                      • Opcode ID: e599abc5ccc1fcc2afa0811a74523479773a4e2d78cc03c258ebc6d435cce25a
                                      • Instruction ID: 5de9ffb64ca5e15a2b50b30bc9937a924b2564530b5861c8322637ebb6f06415
                                      • Opcode Fuzzy Hash: e599abc5ccc1fcc2afa0811a74523479773a4e2d78cc03c258ebc6d435cce25a
                                      • Instruction Fuzzy Hash: A4F12871A00109AFCB14DF94C888EEEB7B9FF49314F10846AF909AB251DB35AE46CB55
                                      APIs
                                      • _memset.LIBCMT ref: 0047F6B5
                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0047F848
                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0047F86C
                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0047F8AC
                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0047F8CE
                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0047FA4A
                                      • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0047FA7C
                                      • CloseHandle.KERNEL32(?), ref: 0047FAAB
                                      • CloseHandle.KERNEL32(?), ref: 0047FB22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                      • String ID:
                                      • API String ID: 4090791747-0
                                      • Opcode ID: 7eba5db998cae62faca8dc05d2f4743551981602ff13b8ed4a06b68f0d2db733
                                      • Instruction ID: 06b6fb47819207378a011b81351d7d70f99dbcb89b467e7706fbe8a6ff9703be
                                      • Opcode Fuzzy Hash: 7eba5db998cae62faca8dc05d2f4743551981602ff13b8ed4a06b68f0d2db733
                                      • Instruction Fuzzy Hash: D8E194716042009FC714EF25C451BAA7BE1BF85314F14856EF8999B3A2DB38EC49CB5A
                                      APIs
                                        • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00463697,?), ref: 0046468B
                                        • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00463697,?), ref: 004646A4
                                        • Part of subcall function 00464A31: GetFileAttributesW.KERNEL32(?,0046370B), ref: 00464A32
                                      • lstrcmpiW.KERNEL32(?,?), ref: 00464D40
                                      • _wcscmp.LIBCMT ref: 00464D5A
                                      • MoveFileW.KERNEL32(?,?), ref: 00464D75
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                      • String ID:
                                      • API String ID: 793581249-0
                                      • Opcode ID: 69db39cd24fefc1ab41e26915ed08df5f736078cdca567a67bce97dfb19b71fb
                                      • Instruction ID: 3e0d64ecfe06201b2d7f4e4ce82b19db3d94e317acadfd9fd6841a38a6d3c077
                                      • Opcode Fuzzy Hash: 69db39cd24fefc1ab41e26915ed08df5f736078cdca567a67bce97dfb19b71fb
                                      • Instruction Fuzzy Hash: 1D5164B25083459BCB24EFA1D8819DF73ECAF84354F40092FB289D3151EE79A589C76B
                                      APIs
                                      • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0043C2F7
                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0043C319
                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0043C331
                                      • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0043C34F
                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0043C370
                                      • DestroyIcon.USER32(00000000), ref: 0043C37F
                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0043C39C
                                      • DestroyIcon.USER32(?), ref: 0043C3AB
                                        • Part of subcall function 0048A4AF: DeleteObject.GDI32(00000000), ref: 0048A4E8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                      • String ID:
                                      • API String ID: 2819616528-0
                                      • Opcode ID: 93206783a0c362c76b7f182cd01ce1cb26c22cf748498950b2a5b33d88ea5600
                                      • Instruction ID: 8b5e312d24aa0fc7293d55633b028b71e285ae3fa30838bdc618f7a4141ee9b3
                                      • Opcode Fuzzy Hash: 93206783a0c362c76b7f182cd01ce1cb26c22cf748498950b2a5b33d88ea5600
                                      • Instruction Fuzzy Hash: 9D516A74A00205AFDB20DF65CD85FAF3BB5EB58310F10452EF902A72D0D7B4A991DB68
                                      APIs
                                        • Part of subcall function 0045A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0045A84C
                                        • Part of subcall function 0045A82C: GetCurrentThreadId.KERNEL32 ref: 0045A853
                                        • Part of subcall function 0045A82C: AttachThreadInput.USER32(00000000,?,00459683,?,00000001), ref: 0045A85A
                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 0045968E
                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 004596AB
                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 004596AE
                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 004596B7
                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 004596D5
                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 004596D8
                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 004596E1
                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 004596F8
                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 004596FB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                      • String ID:
                                      • API String ID: 2014098862-0
                                      • Opcode ID: 97659e6d0eeaf490ac976d3d5fe311f7ccd298156506907ffd454ad2a564656a
                                      • Instruction ID: 1862abde6b5ba1d27f2b77b23e96e8fddf5d6721de8ccd0207d4cd72f070cce3
                                      • Opcode Fuzzy Hash: 97659e6d0eeaf490ac976d3d5fe311f7ccd298156506907ffd454ad2a564656a
                                      • Instruction Fuzzy Hash: F011E571910618BEF6106F61DC49F6E3B1DDB4C755F100939F644AB0A1CAF25C15DBA8
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0045853C,00000B00,?,?), ref: 0045892A
                                      • HeapAlloc.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 00458931
                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0045853C,00000B00,?,?), ref: 00458946
                                      • GetCurrentProcess.KERNEL32(?,00000000,?,0045853C,00000B00,?,?), ref: 0045894E
                                      • DuplicateHandle.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 00458951
                                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0045853C,00000B00,?,?), ref: 00458961
                                      • GetCurrentProcess.KERNEL32(0045853C,00000000,?,0045853C,00000B00,?,?), ref: 00458969
                                      • DuplicateHandle.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 0045896C
                                      • CreateThread.KERNEL32(00000000,00000000,00458992,00000000,00000000,00000000), ref: 00458986
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                      • String ID:
                                      • API String ID: 1957940570-0
                                      • Opcode ID: 3e7611f068968c6c6daa1a3146ff6b5b84d59536ecce8ca695804ebc6f6fd54c
                                      • Instruction ID: 349ed70c1d76ccaf0bdfd0abb61d7988567b7a63eab8a905bd57cb3f4c4245c0
                                      • Opcode Fuzzy Hash: 3e7611f068968c6c6daa1a3146ff6b5b84d59536ecce8ca695804ebc6f6fd54c
                                      • Instruction Fuzzy Hash: 4801BBB5240308FFE710ABA5DC8DF6B7BACEB89711F508825FA05DB1A1CA759C14CB24
                                      APIs
                                        • Part of subcall function 0045710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?,?,00457455), ref: 00457127
                                        • Part of subcall function 0045710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457142
                                        • Part of subcall function 0045710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457150
                                        • Part of subcall function 0045710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?), ref: 00457160
                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00479806
                                      • _memset.LIBCMT ref: 00479813
                                      • _memset.LIBCMT ref: 00479956
                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00479982
                                      • CoTaskMemFree.OLE32(?), ref: 0047998D
                                      Strings
                                      • NULL Pointer assignment, xrefs: 004799DB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                      • String ID: NULL Pointer assignment
                                      • API String ID: 1300414916-2785691316
                                      • Opcode ID: 0f298616936bd44a31cea0abb6980e4c2cd64e8d8fc05cb6474878b66e55f7eb
                                      • Instruction ID: 344d97a8cecc5579365d94fc52d7d4a9bdae2fe77cb17e56d270d326fab8ac0d
                                      • Opcode Fuzzy Hash: 0f298616936bd44a31cea0abb6980e4c2cd64e8d8fc05cb6474878b66e55f7eb
                                      • Instruction Fuzzy Hash: BD915CB1D00218EBDB10DFA5DC81EDEBBB9EF08314F10806AF519A7291EB755A44CFA5
                                      APIs
                                        • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                      • _memset.LIBCMT ref: 00462B87
                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00462BB6
                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00462C69
                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00462C97
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ItemMenu$Info$Default_memset_wcscpy
                                      • String ID: 0$xY$xY
                                      • API String ID: 4152858687-780711826
                                      • Opcode ID: 88d1651fe659c5ffc28a156b59688edeefc6fa2aad9374a914d35e2ef2c68b40
                                      • Instruction ID: 8d65d54c91bb2834d650baaa5c58db0a2d3f708132dab7008ae6ceb83fe6ffca
                                      • Opcode Fuzzy Hash: 88d1651fe659c5ffc28a156b59688edeefc6fa2aad9374a914d35e2ef2c68b40
                                      • Instruction Fuzzy Hash: BF51DD71208B01AED7249E28DA44A6F77E8EF44314F040A2FF880D7291EBB8DC44875B
                                      APIs
                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00486E24
                                      • SendMessageW.USER32(?,00001036,00000000,?), ref: 00486E38
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00486E52
                                      • _wcscat.LIBCMT ref: 00486EAD
                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00486EC4
                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00486EF2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window_wcscat
                                      • String ID: SysListView32
                                      • API String ID: 307300125-78025650
                                      • Opcode ID: 16f1706c89c53c521989aa15edd3457245b1a700a2ad8cceaac67dbb77529257
                                      • Instruction ID: cb01a20e413fb831c79b84d4e1a22deaf7a16da1e784ee9815b65cba95e2bd2f
                                      • Opcode Fuzzy Hash: 16f1706c89c53c521989aa15edd3457245b1a700a2ad8cceaac67dbb77529257
                                      • Instruction Fuzzy Hash: 6341A370A00308ABDB21AF64CC85BEF77F8EF08354F11082BF544A7291D6799D858B68
                                      APIs
                                        • Part of subcall function 00463C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00463C7A
                                        • Part of subcall function 00463C55: Process32FirstW.KERNEL32(00000000,?), ref: 00463C88
                                        • Part of subcall function 00463C55: CloseHandle.KERNEL32(00000000), ref: 00463D52
                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0047E9A4
                                      • GetLastError.KERNEL32 ref: 0047E9B7
                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0047E9E6
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 0047EA63
                                      • GetLastError.KERNEL32(00000000), ref: 0047EA6E
                                      • CloseHandle.KERNEL32(00000000), ref: 0047EAA3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                      • String ID: SeDebugPrivilege
                                      • API String ID: 2533919879-2896544425
                                      • Opcode ID: 1fbe102fe1978df8388a2962b1b00d0cd5216d5acde680508b8c4a8fc22a507b
                                      • Instruction ID: ee7027a858fb35c2998370541a0cb7821fbd3e1ab4d9769570fd7f32c35e06b7
                                      • Opcode Fuzzy Hash: 1fbe102fe1978df8388a2962b1b00d0cd5216d5acde680508b8c4a8fc22a507b
                                      • Instruction Fuzzy Hash: E1419D712002009FDB10EF25DC95BAEB7A5AF44318F04856EF9069B3C2DB78AC09CB99
                                      APIs
                                      • _memset.LIBCMT ref: 004872AA
                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00487351
                                      • IsMenu.USER32(?), ref: 00487369
                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004873B1
                                      • DrawMenuBar.USER32 ref: 004873C4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Menu$Item$DrawInfoInsert_memset
                                      • String ID: 0$PY
                                      • API String ID: 3866635326-1394038836
                                      • Opcode ID: 0ee1f44b2a5140251d286675eb963f933f852416e711f3c94e98620d4ff88054
                                      • Instruction ID: fcd3fc1e0e94e91f8146e9bbeff2772ee04bbaba0065c2a20de26dc7b403efd4
                                      • Opcode Fuzzy Hash: 0ee1f44b2a5140251d286675eb963f933f852416e711f3c94e98620d4ff88054
                                      • Instruction Fuzzy Hash: AA411675A04208AFDB20EF50D894A9EBBB4FB04350F24882AFD15A7360D734ED64EB65
                                      APIs
                                      • LoadIconW.USER32(00000000,00007F03), ref: 00463033
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: IconLoad
                                      • String ID: blank$info$question$stop$warning
                                      • API String ID: 2457776203-404129466
                                      • Opcode ID: 55f9dc3ea46c5c896c834eceb9773494ed516fdc9e05eb433b65141dcb2bff31
                                      • Instruction ID: 1734436af2ca56e59899cd3bdf017f39c547290e8d4403808a282f24c331c6a5
                                      • Opcode Fuzzy Hash: 55f9dc3ea46c5c896c834eceb9773494ed516fdc9e05eb433b65141dcb2bff31
                                      • Instruction Fuzzy Hash: F211F631348386BAE7249E55DC42DAF679C9F15365B20002FF90066281FAFC5E4956AE
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00464312
                                      • LoadStringW.USER32(00000000), ref: 00464319
                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0046432F
                                      • LoadStringW.USER32(00000000), ref: 00464336
                                      • _wprintf.LIBCMT ref: 0046435C
                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0046437A
                                      Strings
                                      • %s (%d) : ==> %s: %s %s, xrefs: 00464357
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: HandleLoadModuleString$Message_wprintf
                                      • String ID: %s (%d) : ==> %s: %s %s
                                      • API String ID: 3648134473-3128320259
                                      • Opcode ID: 965032fae8988b6724a64616dd310853d65f609a359c49a1a2d3266552516382
                                      • Instruction ID: 8e316eae760c98dab52acacd6546c6ae495e9062239688ff7a3f09ebd5f77a5e
                                      • Opcode Fuzzy Hash: 965032fae8988b6724a64616dd310853d65f609a359c49a1a2d3266552516382
                                      • Instruction Fuzzy Hash: CB0167F2900208BFD751AB90DD89EFB776CEB08301F5009B6BB45E2151FA785E894B79
                                      APIs
                                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 00402ACF
                                      • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00402B17
                                      • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 0043C21A
                                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 0043C286
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ShowWindow
                                      • String ID:
                                      • API String ID: 1268545403-0
                                      • Opcode ID: 912d1812e5682d89296a234249483df54f7708f405cc446b7cd1fe75e9989235
                                      • Instruction ID: 9bc26204a44dec3219c5fdbddb2daa96843464872a345c1f9b74dd9d2987fb79
                                      • Opcode Fuzzy Hash: 912d1812e5682d89296a234249483df54f7708f405cc446b7cd1fe75e9989235
                                      • Instruction Fuzzy Hash: 514111307046809ADF755B298ECCB6F7791AB45304F14887FE047B26E0CABDA846DB2D
                                      APIs
                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 004670DD
                                        • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                        • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00467114
                                      • EnterCriticalSection.KERNEL32(?), ref: 00467130
                                      • _memmove.LIBCMT ref: 0046717E
                                      • _memmove.LIBCMT ref: 0046719B
                                      • LeaveCriticalSection.KERNEL32(?), ref: 004671AA
                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 004671BF
                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 004671DE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                      • String ID:
                                      • API String ID: 256516436-0
                                      • Opcode ID: 933e8544da0faf56450ac39255a9b8e006b5e598949e7359b898ec289b8d78a0
                                      • Instruction ID: 188a4d0b29229593a2b146342a062b1bd5409cf6fda6c026f11dbcde1a99e618
                                      • Opcode Fuzzy Hash: 933e8544da0faf56450ac39255a9b8e006b5e598949e7359b898ec289b8d78a0
                                      • Instruction Fuzzy Hash: F131A131A00215EBCF00DFA5DC85AAFB7B8EF45714F1441BAF9049B246EB349E14CBA9
                                      APIs
                                      • DeleteObject.GDI32(00000000), ref: 004861EB
                                      • GetDC.USER32(00000000), ref: 004861F3
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004861FE
                                      • ReleaseDC.USER32(00000000,00000000), ref: 0048620A
                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00486246
                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00486257
                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0048902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00486291
                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 004862B1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                      • String ID:
                                      • API String ID: 3864802216-0
                                      • Opcode ID: cf317ad195164d60a9274800805a8c3d798bcd83c3ff523b59fa5e1fadae3bb4
                                      • Instruction ID: f4278305449edce2f76c410d332ec57268d6ee35a6a277c822a0a6189647fcfb
                                      • Opcode Fuzzy Hash: cf317ad195164d60a9274800805a8c3d798bcd83c3ff523b59fa5e1fadae3bb4
                                      • Instruction Fuzzy Hash: 46317172101210BFEB115F50DC4AFEB3BADEF49755F0540A9FE08AA291D6759C41CB68
                                      APIs
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                        • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                      • _wcstok.LIBCMT ref: 0046EC94
                                      • _wcscpy.LIBCMT ref: 0046ED23
                                      • _memset.LIBCMT ref: 0046ED56
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                      • String ID: X
                                      • API String ID: 774024439-3081909835
                                      • Opcode ID: 086f3227ed7a0652a5ee54b3e0c8eaf617236abc9363ec1de22059c745d3fe8b
                                      • Instruction ID: da02439699827519884de0a837ef4d7055a253f99ddb834d536b4edba3b8eab3
                                      • Opcode Fuzzy Hash: 086f3227ed7a0652a5ee54b3e0c8eaf617236abc9363ec1de22059c745d3fe8b
                                      • Instruction Fuzzy Hash: E1C161756083019FD714EF25D841A5AB7E4FF85318F10492EF899A72A2EB38EC45CB4B
                                      APIs
                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00476C00
                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00476C21
                                      • WSAGetLastError.WSOCK32(00000000), ref: 00476C34
                                      • htons.WSOCK32(?,?,?,00000000,?), ref: 00476CEA
                                      • inet_ntoa.WSOCK32(?), ref: 00476CA7
                                        • Part of subcall function 0045A7E9: _strlen.LIBCMT ref: 0045A7F3
                                        • Part of subcall function 0045A7E9: _memmove.LIBCMT ref: 0045A815
                                      • _strlen.LIBCMT ref: 00476D44
                                      • _memmove.LIBCMT ref: 00476DAD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                      • String ID:
                                      • API String ID: 3619996494-0
                                      • Opcode ID: 17166ba6e21f55bfc68e18c4997ccc5b6dc8ae642e6189286e7640febd973511
                                      • Instruction ID: ed0775ecea4f9d6c11d03e52ad69743ddbee2f845c96f8b55ead14f2c665c5c3
                                      • Opcode Fuzzy Hash: 17166ba6e21f55bfc68e18c4997ccc5b6dc8ae642e6189286e7640febd973511
                                      • Instruction Fuzzy Hash: 3081E971204700AFC710EB25CC81EABB7A9EF84718F10892EF559A72D2DB78ED05CB59
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5023a88ac2a4e028a815ef4d4db6f605c18ba5c71fdc3231c60cda9a6e4bf417
                                      • Instruction ID: a887e684d243743618d1057532b585a7ad503945d0d011121e70032f0d2e3d72
                                      • Opcode Fuzzy Hash: 5023a88ac2a4e028a815ef4d4db6f605c18ba5c71fdc3231c60cda9a6e4bf417
                                      • Instruction Fuzzy Hash: 85715F30900109EFDB04DF95CC89EBF7B75FF85314F14816AF915AA2A1C738AA51CBA9
                                      APIs
                                      • _memset.LIBCMT ref: 0047F448
                                      • _memset.LIBCMT ref: 0047F511
                                      • ShellExecuteExW.SHELL32(?), ref: 0047F556
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                        • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                      • GetProcessId.KERNEL32(00000000), ref: 0047F5CD
                                      • CloseHandle.KERNEL32(00000000), ref: 0047F5FC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                      • String ID: @
                                      • API String ID: 3522835683-2766056989
                                      • Opcode ID: 6349c247148fa3755348316afb80860035a4644173d3526eddd6884f02b25ce6
                                      • Instruction ID: 5c1dd39b7f321ddcc7bcc10d078eb251a602d9f768a890d439a18523313ae713
                                      • Opcode Fuzzy Hash: 6349c247148fa3755348316afb80860035a4644173d3526eddd6884f02b25ce6
                                      • Instruction Fuzzy Hash: 3B61B1B1A006189FCB04EF55C48099EB7F5FF48314F14846EE819BB392CB38AD45CB88
                                      APIs
                                      • GetParent.USER32(?), ref: 00460F8C
                                      • GetKeyboardState.USER32(?), ref: 00460FA1
                                      • SetKeyboardState.USER32(?), ref: 00461002
                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00461030
                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 0046104F
                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00461095
                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 004610B8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessagePost$KeyboardState$Parent
                                      • String ID:
                                      • API String ID: 87235514-0
                                      • Opcode ID: f9d591f81d686d4ab57c3a6e12a7387580c65fa7c1b8952d65f3ab419e893261
                                      • Instruction ID: d8e1dc28bdc088eb6cbc7413f3b60f262c6bc769533ec748a7a92d83500406ea
                                      • Opcode Fuzzy Hash: f9d591f81d686d4ab57c3a6e12a7387580c65fa7c1b8952d65f3ab419e893261
                                      • Instruction Fuzzy Hash: 5F51D1A05046D53DFB3642348C15BBBBEA95B06304F0C898EE1D4959E3E2DDDCC8D75A
                                      APIs
                                      • GetParent.USER32(00000000), ref: 00460DA5
                                      • GetKeyboardState.USER32(?), ref: 00460DBA
                                      • SetKeyboardState.USER32(?), ref: 00460E1B
                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00460E47
                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00460E64
                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00460EA8
                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00460EC9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessagePost$KeyboardState$Parent
                                      • String ID:
                                      • API String ID: 87235514-0
                                      • Opcode ID: f49cedba9ac32d54de8a0d60295adc9efc4f295a5ca7e66696c334580efe5f7b
                                      • Instruction ID: 69172e86244207f9b898dfa665998bef84c2b13c00b7e8d8db4e4b2c62b94f0a
                                      • Opcode Fuzzy Hash: f49cedba9ac32d54de8a0d60295adc9efc4f295a5ca7e66696c334580efe5f7b
                                      • Instruction Fuzzy Hash: 035136A05447D53DFB368334CC41B7B7FA95B06300F08898EE1D4569C2E39AAC88D35A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _wcsncpy$LocalTime
                                      • String ID:
                                      • API String ID: 2945705084-0
                                      • Opcode ID: 07e0947fe95a8180eaf0aa6e348e8d9897622cda980e67335bb2af8a3bf9752e
                                      • Instruction ID: 7a6b7d837badcf90248cfae842bd011e2e93fbf2a36f5ea1b26b70f3dca78a8a
                                      • Opcode Fuzzy Hash: 07e0947fe95a8180eaf0aa6e348e8d9897622cda980e67335bb2af8a3bf9752e
                                      • Instruction Fuzzy Hash: 5541B565D1022476CB11EBB59846ACFB7B8AF05311F90485BF508E3221FA78E285C7AE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PY
                                      • API String ID: 0-1007129125
                                      • Opcode ID: 22afa8660c4250821daf86cd4b3c3329a23997c60e7bd91151dab5187926c109
                                      • Instruction ID: 1d009f8157befd3e54c409f5ed609bf9f47d87f5e0fd5ad8ffda0b3aa488663e
                                      • Opcode Fuzzy Hash: 22afa8660c4250821daf86cd4b3c3329a23997c60e7bd91151dab5187926c109
                                      • Instruction Fuzzy Hash: A1419435904114ABE710FF24CC4CFAEBBA4EB09310F144A67E815A73E1C7B8AD65D75A
                                      APIs
                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0045D5D4
                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0045D60A
                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0045D61B
                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0045D69D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                      • String ID: ,,I$DllGetClassObject
                                      • API String ID: 753597075-1683996018
                                      • Opcode ID: 33bd84876332b2fdda090ed26e6294b9c181052f8b99c0919512b630bc0f7b16
                                      • Instruction ID: 3f0141d9bf832a65cf1f2fff52dd88c9064c6a7eaa25d9247cf5eee920db5d90
                                      • Opcode Fuzzy Hash: 33bd84876332b2fdda090ed26e6294b9c181052f8b99c0919512b630bc0f7b16
                                      • Instruction Fuzzy Hash: 1B41A4B1900204EFDF24DF14C884A9A7BA9EF44315F1581AEEC09DF206D7B4DD49CBA8
                                      APIs
                                        • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00463697,?), ref: 0046468B
                                        • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00463697,?), ref: 004646A4
                                      • lstrcmpiW.KERNEL32(?,?), ref: 004636B7
                                      • _wcscmp.LIBCMT ref: 004636D3
                                      • MoveFileW.KERNEL32(?,?), ref: 004636EB
                                      • _wcscat.LIBCMT ref: 00463733
                                      • SHFileOperationW.SHELL32(?), ref: 0046379F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                      • String ID: \*.*
                                      • API String ID: 1377345388-1173974218
                                      • Opcode ID: c8831e677e0fd2a24290fb6a2dd415d07c0f6ac375416727c908cd90a901df56
                                      • Instruction ID: 4e874dc4fae4897927e7b4621483e23afab501f30efb2571b7469179fc3cc0d5
                                      • Opcode Fuzzy Hash: c8831e677e0fd2a24290fb6a2dd415d07c0f6ac375416727c908cd90a901df56
                                      • Instruction Fuzzy Hash: 1A418FB1508344AEC752EF65D4419DFB7E8AF88345F40082FB48AC3261FA38D689C75B
                                      APIs
                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00480FD4
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00480FFE
                                      • FreeLibrary.KERNEL32(00000000), ref: 004810B5
                                        • Part of subcall function 00480FA5: RegCloseKey.ADVAPI32(?), ref: 0048101B
                                        • Part of subcall function 00480FA5: FreeLibrary.KERNEL32(?), ref: 0048106D
                                        • Part of subcall function 00480FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00481090
                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00481058
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: EnumFreeLibrary$CloseDeleteOpen
                                      • String ID:
                                      • API String ID: 395352322-0
                                      • Opcode ID: b5131dabd4a2a67cadfd2e986b415e323ff756628087c751aedefec5cbf298fe
                                      • Instruction ID: 3e22e70b6f2616eb7250a30d7d8a48524582d6e50c9a57dc89dcd50e66651605
                                      • Opcode Fuzzy Hash: b5131dabd4a2a67cadfd2e986b415e323ff756628087c751aedefec5cbf298fe
                                      • Instruction Fuzzy Hash: E2311D71900109BFDB15AF90DC89EFFB7BCEF09300F10096BE501E2251D6745E8A9BA9
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0045DB2E
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0045DB54
                                      • SysAllocString.OLEAUT32(00000000), ref: 0045DB57
                                      • SysAllocString.OLEAUT32(?), ref: 0045DB75
                                      • SysFreeString.OLEAUT32(?), ref: 0045DB7E
                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 0045DBA3
                                      • SysAllocString.OLEAUT32(?), ref: 0045DBB1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                      • String ID:
                                      • API String ID: 3761583154-0
                                      • Opcode ID: 5e247d0ee9443074e0accc512f657e67b74a851fefac2852b93e1f1bb69cb148
                                      • Instruction ID: abba643cc655395c5b15892f4ebb9e4dd6d565416170ba1db368170dc4b56c19
                                      • Opcode Fuzzy Hash: 5e247d0ee9443074e0accc512f657e67b74a851fefac2852b93e1f1bb69cb148
                                      • Instruction Fuzzy Hash: E221A636A00219AFDF10DFA8DC84CBB73ADEF08360B11853AFD14DB251D674AD498768
                                      APIs
                                        • Part of subcall function 00477D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00477DB6
                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 004761C6
                                      • WSAGetLastError.WSOCK32(00000000), ref: 004761D5
                                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0047620E
                                      • connect.WSOCK32(00000000,?,00000010), ref: 00476217
                                      • WSAGetLastError.WSOCK32 ref: 00476221
                                      • closesocket.WSOCK32(00000000), ref: 0047624A
                                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00476263
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                      • String ID:
                                      • API String ID: 910771015-0
                                      • Opcode ID: 2c772d8cd10b281ebb58c123377a2f6f77deb8af44f3e8561ff8297571aede33
                                      • Instruction ID: 9a8db824e4f103e753759010288aef610dd859574b1bdde890bb221953e34ba6
                                      • Opcode Fuzzy Hash: 2c772d8cd10b281ebb58c123377a2f6f77deb8af44f3e8561ff8297571aede33
                                      • Instruction Fuzzy Hash: E131C671600104ABDF10BF64CC85BBE77ADEB45714F05846EFD09A7292DB78AC088B65
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __wcsnicmp
                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                      • API String ID: 1038674560-2734436370
                                      • Opcode ID: b36e4969ec9ecff79f491ffa0df4073264c86a9b19393e8d01422ce4d938a266
                                      • Instruction ID: 032906fc094d91378a6d64986483b761754d261e1b02b5d61cc05f8db2f6dc85
                                      • Opcode Fuzzy Hash: b36e4969ec9ecff79f491ffa0df4073264c86a9b19393e8d01422ce4d938a266
                                      • Instruction Fuzzy Hash: E621487220412166D620AA35AC02FA773D8AF59305B90443BFC4286192EB9C9D4EC29F
                                      APIs
                                        • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                        • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                        • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00487632
                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0048763F
                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0048764A
                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00487659
                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00487665
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$CreateObjectStockWindow
                                      • String ID: Msctls_Progress32
                                      • API String ID: 1025951953-3636473452
                                      • Opcode ID: 89b1357e1ee64075d60cbe96e93ddb663670d2e9d7f59c86534f55b80d263953
                                      • Instruction ID: 4837c572468b061b20148283283cd62aa6e96b5405c17b40ad05b898919227a4
                                      • Opcode Fuzzy Hash: 89b1357e1ee64075d60cbe96e93ddb663670d2e9d7f59c86534f55b80d263953
                                      • Instruction Fuzzy Hash: B711D3B1110119BFEF109F64CC85EEB7F5DEF083A8F114115BA04A21A0D776AC21DBA8
                                      APIs
                                      • __init_pointers.LIBCMT ref: 00429AE6
                                        • Part of subcall function 00423187: EncodePointer.KERNEL32(00000000), ref: 0042318A
                                        • Part of subcall function 00423187: __initp_misc_winsig.LIBCMT ref: 004231A5
                                        • Part of subcall function 00423187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00429EA0
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00429EB4
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00429EC7
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00429EDA
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00429EED
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00429F00
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00429F13
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00429F26
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00429F39
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00429F4C
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00429F5F
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00429F72
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00429F85
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00429F98
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00429FAB
                                        • Part of subcall function 00423187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00429FBE
                                      • __mtinitlocks.LIBCMT ref: 00429AEB
                                      • __mtterm.LIBCMT ref: 00429AF4
                                        • Part of subcall function 00429B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00429AF9,00427CD0,004BA0B8,00000014), ref: 00429C56
                                        • Part of subcall function 00429B5C: _free.LIBCMT ref: 00429C5D
                                        • Part of subcall function 00429B5C: DeleteCriticalSection.KERNEL32(02L,?,?,00429AF9,00427CD0,004BA0B8,00000014), ref: 00429C7F
                                      • __calloc_crt.LIBCMT ref: 00429B19
                                      • __initptd.LIBCMT ref: 00429B3B
                                      • GetCurrentThreadId.KERNEL32 ref: 00429B42
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                      • String ID:
                                      • API String ID: 3567560977-0
                                      • Opcode ID: 077d5c0f99fda34c06fd1b26cca46798951cce19c7061b0ffca82948e383fe55
                                      • Instruction ID: 56715bf0a8fa608ffc4459179789e5a7e9751e092d0c8873507a45c98cd9865b
                                      • Opcode Fuzzy Hash: 077d5c0f99fda34c06fd1b26cca46798951cce19c7061b0ffca82948e383fe55
                                      • Instruction Fuzzy Hash: 4AF0C2323193311AE6647A767C0368B2A90AF02778FA00A2FF050C52D2EF689C41416C
                                      APIs
                                      • _memset.LIBCMT ref: 0048B644
                                      • _memset.LIBCMT ref: 0048B653
                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,004C6F20,004C6F64), ref: 0048B682
                                      • CloseHandle.KERNEL32 ref: 0048B694
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memset$CloseCreateHandleProcess
                                      • String ID: oL$doL
                                      • API String ID: 3277943733-3421622115
                                      • Opcode ID: f6592324f54b6d11ff0072cf87150bc2a8f8a0fa5e3a8a7e269d397b8f6a706e
                                      • Instruction ID: 7a1fecbce043cfc874fe0d77b44da30ff063324afa3e4e90fef9887594455fd0
                                      • Opcode Fuzzy Hash: f6592324f54b6d11ff0072cf87150bc2a8f8a0fa5e3a8a7e269d397b8f6a706e
                                      • Instruction Fuzzy Hash: 20F05EB26403107AE2502761BC06FBB3A9CEB08395F41843ABE08E5192D7799C00C7AC
                                      APIs
                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00423F85), ref: 00424085
                                      • GetProcAddress.KERNEL32(00000000), ref: 0042408C
                                      • EncodePointer.KERNEL32(00000000), ref: 00424097
                                      • DecodePointer.KERNEL32(00423F85), ref: 004240B2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                      • String ID: RoUninitialize$combase.dll
                                      • API String ID: 3489934621-2819208100
                                      • Opcode ID: a073a7a123edb79e47074a0cfae65335df484428d24780242fe31235a0946bf9
                                      • Instruction ID: 3c20c996fd7074992a56bc66f3091c9a5c2557e351e9bc0918c4c0f6e68dcf68
                                      • Opcode Fuzzy Hash: a073a7a123edb79e47074a0cfae65335df484428d24780242fe31235a0946bf9
                                      • Instruction Fuzzy Hash: DBE09270681200AFEA90AF62ED0DB8A3AA5B704743F14893AF501E11A0CFBA46489B1C
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove$__itow__swprintf
                                      • String ID:
                                      • API String ID: 3253778849-0
                                      • Opcode ID: 96d792e38c76c4facbdde67addef648add14df66bc1d221183d54a23a2e9edca
                                      • Instruction ID: 21da70feb02ff46742cf7b1a596b1e1f747712b30ca55ffc0ed3d6fa2aea8e56
                                      • Opcode Fuzzy Hash: 96d792e38c76c4facbdde67addef648add14df66bc1d221183d54a23a2e9edca
                                      • Instruction Fuzzy Hash: 6261707160025A9BCF01EF61DC81AFE37A5AF05308F45452EF8556B293EB38AD05CB5A
                                      APIs
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                        • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004802BD
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004802FD
                                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00480320
                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00480349
                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0048038C
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00480399
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                      • String ID:
                                      • API String ID: 4046560759-0
                                      • Opcode ID: ddf5201c64ea10f2c1768571e921f1367ab59bd34b0cec2ee98e07bda51b5413
                                      • Instruction ID: d871ff08e979a7a46cd08627f86c845b9cb8169993b1d7d4ad27b4e2648fe78e
                                      • Opcode Fuzzy Hash: ddf5201c64ea10f2c1768571e921f1367ab59bd34b0cec2ee98e07bda51b5413
                                      • Instruction Fuzzy Hash: 68515C71118204AFC710EF65C885E6FBBE8FF85318F04492EF945972A2DB35E909CB56
                                      APIs
                                      • GetMenu.USER32(?), ref: 004857FB
                                      • GetMenuItemCount.USER32(00000000), ref: 00485832
                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0048585A
                                      • GetMenuItemID.USER32(?,?), ref: 004858C9
                                      • GetSubMenu.USER32(?,?), ref: 004858D7
                                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 00485928
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Menu$Item$CountMessagePostString
                                      • String ID:
                                      • API String ID: 650687236-0
                                      • Opcode ID: 8876020403372019a0af9ae861b3bc7ad778482198591b16bd6b68ae7b26a355
                                      • Instruction ID: f019c79df8c938943ad8434395c060b2cb7e18679ec399e957168710705cd923
                                      • Opcode Fuzzy Hash: 8876020403372019a0af9ae861b3bc7ad778482198591b16bd6b68ae7b26a355
                                      • Instruction Fuzzy Hash: 72514C75E00615AFCF11EF65C845AAEBBB4EF48314F10446AE801BB352DB78AE418B99
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 0045EF06
                                      • VariantClear.OLEAUT32(00000013), ref: 0045EF78
                                      • VariantClear.OLEAUT32(00000000), ref: 0045EFD3
                                      • _memmove.LIBCMT ref: 0045EFFD
                                      • VariantClear.OLEAUT32(?), ref: 0045F04A
                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0045F078
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Variant$Clear$ChangeInitType_memmove
                                      • String ID:
                                      • API String ID: 1101466143-0
                                      • Opcode ID: 3a696c756d5f9f21b3064a47137a411a2eda9f735d8382ec367d4cfec0c8664e
                                      • Instruction ID: 3df6c570488be2a998a5abfaea7cf2d50daf9fdb1352742cca5bf42246c3e2d0
                                      • Opcode Fuzzy Hash: 3a696c756d5f9f21b3064a47137a411a2eda9f735d8382ec367d4cfec0c8664e
                                      • Instruction Fuzzy Hash: 04517D75A00209EFCB14CF58C884AAAB7B8FF4C314B15856AED49DB342E334E915CF94
                                      APIs
                                      • _memset.LIBCMT ref: 00462258
                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004622A3
                                      • IsMenu.USER32(00000000), ref: 004622C3
                                      • CreatePopupMenu.USER32 ref: 004622F7
                                      • GetMenuItemCount.USER32(000000FF), ref: 00462355
                                      • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00462386
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                      • String ID:
                                      • API String ID: 3311875123-0
                                      • Opcode ID: cf97df88117ddcc5f0fa513269a15dde7708b163d82bf74e49b6c8debfa24165
                                      • Instruction ID: 667f6c59849a63ea2ae133147cac6ec600f1389f3bfda063d60b04a3024e98c7
                                      • Opcode Fuzzy Hash: cf97df88117ddcc5f0fa513269a15dde7708b163d82bf74e49b6c8debfa24165
                                      • Instruction Fuzzy Hash: 0F51A370500649FBDF21CF64CA44B9EBBF5BF05318F10456AE81197390E3B88985CB5B
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                      • BeginPaint.USER32(?,?,?,?,?,?), ref: 0040179A
                                      • GetWindowRect.USER32(?,?), ref: 004017FE
                                      • ScreenToClient.USER32(?,?), ref: 0040181B
                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0040182C
                                      • EndPaint.USER32(?,?), ref: 00401876
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                      • String ID:
                                      • API String ID: 1827037458-0
                                      • Opcode ID: 5bb5fca218803a0cd3ba9ce61964d7422eee093c1a83fae8820ab44ef570ca98
                                      • Instruction ID: 802354e609c34c5ad38a523f12b28351d49e30531d5e0f2791b792dab913329b
                                      • Opcode Fuzzy Hash: 5bb5fca218803a0cd3ba9ce61964d7422eee093c1a83fae8820ab44ef570ca98
                                      • Instruction Fuzzy Hash: AF418E31100700AFD710EF25C884FAA7BE8EB49724F044A3EFA94962F1C734A945DB6A
                                      APIs
                                      • ShowWindow.USER32(004C57B0,00000000,00EA5950,?,?,004C57B0,?,0048B5A8,?,?), ref: 0048B712
                                      • EnableWindow.USER32(00000000,00000000), ref: 0048B736
                                      • ShowWindow.USER32(004C57B0,00000000,00EA5950,?,?,004C57B0,?,0048B5A8,?,?), ref: 0048B796
                                      • ShowWindow.USER32(00000000,00000004,?,0048B5A8,?,?), ref: 0048B7A8
                                      • EnableWindow.USER32(00000000,00000001), ref: 0048B7CC
                                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0048B7EF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$Show$Enable$MessageSend
                                      • String ID:
                                      • API String ID: 642888154-0
                                      • Opcode ID: 7ca0fe6c9807323bcc0ac8ff00a913c3fb6576fd02a22b3a16232a66ac7b93cd
                                      • Instruction ID: 1d3b34d551e73e97491640bec01ce8c12bc83bc2c135b759935fb039f22faf4f
                                      • Opcode Fuzzy Hash: 7ca0fe6c9807323bcc0ac8ff00a913c3fb6576fd02a22b3a16232a66ac7b93cd
                                      • Instruction Fuzzy Hash: 1941A834600340AFDB21DF28C499B9A7BE0FF49310F5845BAF9488F762C735A856CB94
                                      APIs
                                      • GetForegroundWindow.USER32(?,?,?,?,?,?,00474E41,?,?,00000000,00000001), ref: 004770AC
                                        • Part of subcall function 004739A0: GetWindowRect.USER32(?,?), ref: 004739B3
                                      • GetDesktopWindow.USER32 ref: 004770D6
                                      • GetWindowRect.USER32(00000000), ref: 004770DD
                                      • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0047710F
                                        • Part of subcall function 00465244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004652BC
                                      • GetCursorPos.USER32(?), ref: 0047713B
                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00477199
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                      • String ID:
                                      • API String ID: 4137160315-0
                                      • Opcode ID: 3cdeb131284200fba8ef2e28f13c3857e1f37640968ff1f5e935f4a9860c8469
                                      • Instruction ID: 96178dbc809958a90b6454061f905f6e8cc6bb80431ab620535fad6e804f8cbf
                                      • Opcode Fuzzy Hash: 3cdeb131284200fba8ef2e28f13c3857e1f37640968ff1f5e935f4a9860c8469
                                      • Instruction Fuzzy Hash: 2131D472605305ABD720DF14D849B9FB7A9FF88314F40092EF58997291D734EA09CB9A
                                      APIs
                                        • Part of subcall function 004580A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004580C0
                                        • Part of subcall function 004580A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004580CA
                                        • Part of subcall function 004580A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004580D9
                                        • Part of subcall function 004580A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004580E0
                                        • Part of subcall function 004580A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004580F6
                                      • GetLengthSid.ADVAPI32(?,00000000,0045842F), ref: 004588CA
                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004588D6
                                      • HeapAlloc.KERNEL32(00000000), ref: 004588DD
                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 004588F6
                                      • GetProcessHeap.KERNEL32(00000000,00000000,0045842F), ref: 0045890A
                                      • HeapFree.KERNEL32(00000000), ref: 00458911
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                      • String ID:
                                      • API String ID: 3008561057-0
                                      • Opcode ID: 899df585734c4cf6e549910b9baf9cc1d52bbabddfc3f51843167315329ebb0f
                                      • Instruction ID: 7059436e0a451666cc74b436c7695f43cca8d294219cfb63d8684b6348989bdb
                                      • Opcode Fuzzy Hash: 899df585734c4cf6e549910b9baf9cc1d52bbabddfc3f51843167315329ebb0f
                                      • Instruction Fuzzy Hash: 8E11AF71501609FFDB109FA4DC09BBFB7A8EB45316F10442EE845A7211CF3AAD18DB69
                                      APIs
                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 004585E2
                                      • OpenProcessToken.ADVAPI32(00000000), ref: 004585E9
                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 004585F8
                                      • CloseHandle.KERNEL32(00000004), ref: 00458603
                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00458632
                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00458646
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                      • String ID:
                                      • API String ID: 1413079979-0
                                      • Opcode ID: 594d4e30fb024ea406b8e6751db59f03e6ebc423b2dce8d7814a5cb8bfdeea6b
                                      • Instruction ID: 159165bab53b04d3cbba9e0d8ed23f629fb96fbb8b96a1f823f3c86320dce82d
                                      • Opcode Fuzzy Hash: 594d4e30fb024ea406b8e6751db59f03e6ebc423b2dce8d7814a5cb8bfdeea6b
                                      • Instruction Fuzzy Hash: 7111597250120DBBDF018FA4DD49BEF7BA9EF08305F144069FE04A2161CB769E69EB64
                                      APIs
                                      • GetDC.USER32(00000000), ref: 0045B7B5
                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 0045B7C6
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0045B7CD
                                      • ReleaseDC.USER32(00000000,00000000), ref: 0045B7D5
                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0045B7EC
                                      • MulDiv.KERNEL32(000009EC,?,?), ref: 0045B7FE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CapsDevice$Release
                                      • String ID:
                                      • API String ID: 1035833867-0
                                      • Opcode ID: e8a4a266755e065bcf82882bab04b7313908cea5161a3f7747e2bdf77f2db466
                                      • Instruction ID: ebab011a078b8c66a555392ea924b50fda774449f62ca66a232c327e230173f3
                                      • Opcode Fuzzy Hash: e8a4a266755e065bcf82882bab04b7313908cea5161a3f7747e2bdf77f2db466
                                      • Instruction Fuzzy Hash: ED018475E00209BBEF109BE69C49A5EBFB8EB48711F00407AFE04A7291D6309C14CF94
                                      APIs
                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00420193
                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 0042019B
                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004201A6
                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004201B1
                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 004201B9
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004201C1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Virtual
                                      • String ID:
                                      • API String ID: 4278518827-0
                                      • Opcode ID: 8005da6f0a239fe7bb2d9a35262dc9c54b025e1879980d73ce2b9003a515eafd
                                      • Instruction ID: 92342a6601e26d0a7fde7352a7d9a4d166513956845c1039e3d7dfd742296845
                                      • Opcode Fuzzy Hash: 8005da6f0a239fe7bb2d9a35262dc9c54b025e1879980d73ce2b9003a515eafd
                                      • Instruction Fuzzy Hash: BC016CB09017597DE3008F5A8C85B56FFA8FF19354F00411FA15C87941C7F5A868CBE5
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 004653F9
                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0046540F
                                      • GetWindowThreadProcessId.USER32(?,?), ref: 0046541E
                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046542D
                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00465437
                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046543E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                      • String ID:
                                      • API String ID: 839392675-0
                                      • Opcode ID: 0a014705f4b9eef04d7cbb572d47effba07f9213880d12d67749b825beda7cb3
                                      • Instruction ID: 8521796c5e9ebcca20b77e734ec20d152baa00e403791343a5e797bd2ed800e1
                                      • Opcode Fuzzy Hash: 0a014705f4b9eef04d7cbb572d47effba07f9213880d12d67749b825beda7cb3
                                      • Instruction Fuzzy Hash: 7EF06231240558BBD3215B929C0DEAF7A7CEFC6B11F00057DF904D1050EBA41A0587B9
                                      APIs
                                      • InterlockedExchange.KERNEL32(?,?), ref: 00467243
                                      • EnterCriticalSection.KERNEL32(?,?,00410EE4,?,?), ref: 00467254
                                      • TerminateThread.KERNEL32(00000000,000001F6,?,00410EE4,?,?), ref: 00467261
                                      • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00410EE4,?,?), ref: 0046726E
                                        • Part of subcall function 00466C35: CloseHandle.KERNEL32(00000000,?,0046727B,?,00410EE4,?,?), ref: 00466C3F
                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00467281
                                      • LeaveCriticalSection.KERNEL32(?,?,00410EE4,?,?), ref: 00467288
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                      • String ID:
                                      • API String ID: 3495660284-0
                                      • Opcode ID: 007701f69a9d5ed9de85b122c5e4605bf6e21b132c868c5f449004ca5f003f85
                                      • Instruction ID: 24fb6cd7f7b8029ee4f25158e92bed301f8e8da2948c51d11c28ada49318010c
                                      • Opcode Fuzzy Hash: 007701f69a9d5ed9de85b122c5e4605bf6e21b132c868c5f449004ca5f003f85
                                      • Instruction Fuzzy Hash: DDF08236540A12EBD7111B64ED4C9DF7739FF45702B1009BAF503A10A0DB7F5819CB59
                                      APIs
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0045899D
                                      • UnloadUserProfile.USERENV(?,?), ref: 004589A9
                                      • CloseHandle.KERNEL32(?), ref: 004589B2
                                      • CloseHandle.KERNEL32(?), ref: 004589BA
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 004589C3
                                      • HeapFree.KERNEL32(00000000), ref: 004589CA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                      • String ID:
                                      • API String ID: 146765662-0
                                      • Opcode ID: fc20ddc87a5fd273a18fa8ef1565cbc608650ceaa5a7efc3272966d010428556
                                      • Instruction ID: 8deadb4208ce055a946e280c670b0e99f3db2db319c6731f307d9ea981cf4585
                                      • Opcode Fuzzy Hash: fc20ddc87a5fd273a18fa8ef1565cbc608650ceaa5a7efc3272966d010428556
                                      • Instruction Fuzzy Hash: 94E0C236004401FBDA011FE1EC0C90ABB69FB89322B108A38F219C1074CB32A828DB58
                                      APIs
                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00492C7C,?), ref: 004576EA
                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00492C7C,?), ref: 00457702
                                      • CLSIDFromProgID.OLE32(?,?,00000000,0048FB80,000000FF,?,00000000,00000800,00000000,?,00492C7C,?), ref: 00457727
                                      • _memcmp.LIBCMT ref: 00457748
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FromProg$FreeTask_memcmp
                                      • String ID: ,,I
                                      • API String ID: 314563124-4163367948
                                      • Opcode ID: 04d48fabddc30e44e2ce533b88feecd1e4532b995461b6561d08de29eb5e0f16
                                      • Instruction ID: be765e1d57b8148d1cf66b3d68047348fb9be163096bbb02cdfcec4a4c199039
                                      • Opcode Fuzzy Hash: 04d48fabddc30e44e2ce533b88feecd1e4532b995461b6561d08de29eb5e0f16
                                      • Instruction Fuzzy Hash: 08815D71A00109EFCB00DFA4D984EEEB7B9FF89315F204469F505AB251DB75AE0ACB64
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 00478613
                                      • CharUpperBuffW.USER32(?,?), ref: 00478722
                                      • VariantClear.OLEAUT32(?), ref: 0047889A
                                        • Part of subcall function 00467562: VariantInit.OLEAUT32(00000000), ref: 004675A2
                                        • Part of subcall function 00467562: VariantCopy.OLEAUT32(00000000,?), ref: 004675AB
                                        • Part of subcall function 00467562: VariantClear.OLEAUT32(00000000), ref: 004675B7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Variant$ClearInit$BuffCharCopyUpper
                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                      • API String ID: 4237274167-1221869570
                                      • Opcode ID: 60ce486f072776c9bf384b5dfde06db443bdff60c6039e3dde6b763e026765e4
                                      • Instruction ID: 60eff2204552638baa50968c5b1ec12482493ff8819337d84e8636a8f0030324
                                      • Opcode Fuzzy Hash: 60ce486f072776c9bf384b5dfde06db443bdff60c6039e3dde6b763e026765e4
                                      • Instruction Fuzzy Hash: E1916D756043019FC710EF25C48499BB7E4EF89718F14896EF88A9B3A2DB34ED06CB56
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove$_free
                                      • String ID: 3cA$_A
                                      • API String ID: 2620147621-3480954128
                                      • Opcode ID: 13c1fb36f9d89b3a840eba6d94fc2535b200872d142a9fdd9dcd402100a5399b
                                      • Instruction ID: 850dd104c1974142ce8a52b298ec70faaced32133f8a19a743ede36878807482
                                      • Opcode Fuzzy Hash: 13c1fb36f9d89b3a840eba6d94fc2535b200872d142a9fdd9dcd402100a5399b
                                      • Instruction Fuzzy Hash: C7518C716043418FDB24CF29C840BABBBE1FF85304F49482EE98987351DB39E941CB4A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memset$_memmove
                                      • String ID: 3cA$ERCP
                                      • API String ID: 2532777613-1471582817
                                      • Opcode ID: f26897e622874a94d3a5be45ebb38ce857f1f7ed6e3ab2c2ed74d649e7167b68
                                      • Instruction ID: eaf8e981165fb7e982de03985e75bf568e49202a02b644e32a28802e4b47c64a
                                      • Opcode Fuzzy Hash: f26897e622874a94d3a5be45ebb38ce857f1f7ed6e3ab2c2ed74d649e7167b68
                                      • Instruction Fuzzy Hash: 02518C71A00709DBDB24DF65C9817EBB7F4AF04304F2085AFE94A86241E778EA858B59
                                      APIs
                                      • GetWindowRect.USER32(00EAE9C0,?), ref: 00489863
                                      • ScreenToClient.USER32(00000002,00000002), ref: 00489896
                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00489903
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$ClientMoveRectScreen
                                      • String ID: PY
                                      • API String ID: 3880355969-1007129125
                                      • Opcode ID: 64022f8d4441c5f1557efdd9fcc3a986e2e7d97cfab57cf70d5a2593d4a8891b
                                      • Instruction ID: e3f881a7cdcc43810cee46c2a40b043201eea1d37e41385612dd6f56ef4f9ac2
                                      • Opcode Fuzzy Hash: 64022f8d4441c5f1557efdd9fcc3a986e2e7d97cfab57cf70d5a2593d4a8891b
                                      • Instruction Fuzzy Hash: 6B513E74A00609AFCB10EF54C884ABE7BB5FF45360F14866EF855AB3A0D734AD91CB94
                                      APIs
                                      • _memset.LIBCMT ref: 004627C0
                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 004627DC
                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00462822
                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,004C5890,00000000), ref: 0046286B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Menu$Delete$InfoItem_memset
                                      • String ID: 0
                                      • API String ID: 1173514356-4108050209
                                      • Opcode ID: 0b59e6d123104e8f486f51701735be17c722a032adafe4466648fbe3018c70b5
                                      • Instruction ID: 6162d5963bf1ca612739d8e457cf9df7481532cfa70a9704744149088ee17d1e
                                      • Opcode Fuzzy Hash: 0b59e6d123104e8f486f51701735be17c722a032adafe4466648fbe3018c70b5
                                      • Instruction Fuzzy Hash: F141AE70604701AFD720EF29CD44B1BBBE4AF84314F044A2EF96597391E7B8A905CB6B
                                      APIs
                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004888DE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: InvalidateRect
                                      • String ID: PY
                                      • API String ID: 634782764-1007129125
                                      • Opcode ID: dfc2a81b006da7d210676277332af1fb5d08ccb7ab45ec99ede0666f4995ae78
                                      • Instruction ID: 90478ffdb7761b137305382920b909693c76b6b3f52a4c92a5928a084f4746aa
                                      • Opcode Fuzzy Hash: dfc2a81b006da7d210676277332af1fb5d08ccb7ab45ec99ede0666f4995ae78
                                      • Instruction Fuzzy Hash: FA31E574600109AEEB20BA18CC45FBE77A4FB09310FD4492FF911E62A1CB78A9409B5F
                                      APIs
                                      • ClientToScreen.USER32(?,?), ref: 0048AB60
                                      • GetWindowRect.USER32(?,?), ref: 0048ABD6
                                      • PtInRect.USER32(?,?,0048C014), ref: 0048ABE6
                                      • MessageBeep.USER32(00000000), ref: 0048AC57
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Rect$BeepClientMessageScreenWindow
                                      • String ID: PY
                                      • API String ID: 1352109105-1007129125
                                      • Opcode ID: b992c4d65db1967464bf88d38174ccb0aa2b8d75632d23dd7873dfcfb3d19eff
                                      • Instruction ID: 50dfaebed92d8c5328ac5b6136a8f20cc44f4ea80b7df437f97558f7e7d7bb38
                                      • Opcode Fuzzy Hash: b992c4d65db1967464bf88d38174ccb0aa2b8d75632d23dd7873dfcfb3d19eff
                                      • Instruction Fuzzy Hash: BA419130600118DFEB11EF58D884A6E7BF5FB48300F1888BBE9149B361D7B4E861CB5A
                                      APIs
                                      • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0047D7C5
                                        • Part of subcall function 0040784B: _memmove.LIBCMT ref: 00407899
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: BuffCharLower_memmove
                                      • String ID: cdecl$none$stdcall$winapi
                                      • API String ID: 3425801089-567219261
                                      • Opcode ID: 7bd5474349c6d5684da60b573beb20246a1e8f9962508912b361c523c329036e
                                      • Instruction ID: 0be9701992b4b91cd2e68042300235638f00ad80fed84879f118ea648425d64e
                                      • Opcode Fuzzy Hash: 7bd5474349c6d5684da60b573beb20246a1e8f9962508912b361c523c329036e
                                      • Instruction Fuzzy Hash: 783191719142159BCF00EF55CC919EEB3B4FF14324B108A2BE839A76D2DB39AD05CB95
                                      APIs
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                        • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00458F14
                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00458F27
                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00458F57
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$_memmove$ClassName
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 365058703-1403004172
                                      • Opcode ID: 56fc3c3b2224dcb09bd7a28840653735a62405e38c0c2ee57728a35fe6d16057
                                      • Instruction ID: 808fcc3072a567dbeea6ba3b2dea5d83030b8b2133ef71414da725dc7de09f99
                                      • Opcode Fuzzy Hash: 56fc3c3b2224dcb09bd7a28840653735a62405e38c0c2ee57728a35fe6d16057
                                      • Instruction Fuzzy Hash: 1021F572A00108BEDB14ABA19C45DFF7769DF05324B10462FF825B72E2DE3D180E9A28
                                      APIs
                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0047184C
                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00471872
                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 004718A2
                                      • InternetCloseHandle.WININET(00000000), ref: 004718E9
                                        • Part of subcall function 00472483: GetLastError.KERNEL32(?,?,00471817,00000000,00000000,00000001), ref: 00472498
                                        • Part of subcall function 00472483: SetEvent.KERNEL32(?,?,00471817,00000000,00000000,00000001), ref: 004724AD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                      • String ID:
                                      • API String ID: 3113390036-3916222277
                                      • Opcode ID: 6e03d3876d11c1f4078e21f2429e25c28f700f0be32576d9d2588f00842c0ae0
                                      • Instruction ID: 9f195ba99928d8c49214c982579914efbee4b11eb605a7749f470a37591c6317
                                      • Opcode Fuzzy Hash: 6e03d3876d11c1f4078e21f2429e25c28f700f0be32576d9d2588f00842c0ae0
                                      • Instruction Fuzzy Hash: 1021B3B15002087FE711AF65DC85EFF77EDEB48748F10812FF44992250DA688D0957AA
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                      • GetCursorPos.USER32(?), ref: 0048C4D2
                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0043B9AB,?,?,?,?,?), ref: 0048C4E7
                                      • GetCursorPos.USER32(?), ref: 0048C534
                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0043B9AB,?,?,?), ref: 0048C56E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                      • String ID: PY
                                      • API String ID: 2864067406-1007129125
                                      • Opcode ID: ed407fc5adade9e044dcdfb3e4ad95031fc54384becaa1c012354b070678970c
                                      • Instruction ID: 2973952025af683afbaf652597196eb0b77ee17814688135882e4792ee887bd6
                                      • Opcode Fuzzy Hash: ed407fc5adade9e044dcdfb3e4ad95031fc54384becaa1c012354b070678970c
                                      • Instruction Fuzzy Hash: CE319335500028FFCF159F58C898EAF7BB5EB09310F44486AF9059B361C735AD50DBA8
                                      APIs
                                        • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                        • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                        • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00486461
                                      • LoadLibraryW.KERNEL32(?), ref: 00486468
                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0048647D
                                      • DestroyWindow.USER32(?), ref: 00486485
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                      • String ID: SysAnimate32
                                      • API String ID: 4146253029-1011021900
                                      • Opcode ID: b969d8637368705cbd5fc3c3416812969f869cc3827cfeeeab454fcba1ebf117
                                      • Instruction ID: 96a79e02294e314170444e54cb88eb83d8519b29eeb49143b64c907e724dd28e
                                      • Opcode Fuzzy Hash: b969d8637368705cbd5fc3c3416812969f869cc3827cfeeeab454fcba1ebf117
                                      • Instruction Fuzzy Hash: 2C219571110205BFEF506F64DC40EBF37ADEF54724F114A2AF91492190D739DC41A768
                                      APIs
                                      • GetStdHandle.KERNEL32(0000000C), ref: 00466DBC
                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00466DEF
                                      • GetStdHandle.KERNEL32(0000000C), ref: 00466E01
                                      • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00466E3B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CreateHandle$FilePipe
                                      • String ID: nul
                                      • API String ID: 4209266947-2873401336
                                      • Opcode ID: f98635b68cd5b0ab1880de70f3850fd061f65506a9295ae7d453fc561602cffb
                                      • Instruction ID: cca2de9678abd998f0cd8c5114a45f7ff5fc269ace22cdb61a343b4aec1dc2fa
                                      • Opcode Fuzzy Hash: f98635b68cd5b0ab1880de70f3850fd061f65506a9295ae7d453fc561602cffb
                                      • Instruction Fuzzy Hash: 8B219274600209ABDB209F29DC05A9A77F8EF44720F214A2FFCA0D73D0EB759955CB5A
                                      APIs
                                      • GetStdHandle.KERNEL32(000000F6), ref: 00466E89
                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00466EBB
                                      • GetStdHandle.KERNEL32(000000F6), ref: 00466ECC
                                      • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00466F06
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CreateHandle$FilePipe
                                      • String ID: nul
                                      • API String ID: 4209266947-2873401336
                                      • Opcode ID: f710eb54d58d972596414a75e1bad7db44e4d7afab8e48cef3b5ff9c2d25cc6d
                                      • Instruction ID: 3a9fffd2e99ff55030e4788a991c608e9c08d8bb738c80722c17144d2858802a
                                      • Opcode Fuzzy Hash: f710eb54d58d972596414a75e1bad7db44e4d7afab8e48cef3b5ff9c2d25cc6d
                                      • Instruction Fuzzy Hash: 7B21C7795003059BDB209F69CC04A9B77A8EF44724F210B1EFCA0D33D0E7759851C75A
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 0046AC54
                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0046ACA8
                                      • __swprintf.LIBCMT ref: 0046ACC1
                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000,0048F910), ref: 0046ACFF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorMode$InformationVolume__swprintf
                                      • String ID: %lu
                                      • API String ID: 3164766367-685833217
                                      • Opcode ID: 34d3cb49ee2cec726991ce26fe11517897d14be92ffad4d2a31d686bdc893e88
                                      • Instruction ID: 026ba00fef41ead7d753cb67677e2cef5533d5e87c35db631ff5a0b10e4673a5
                                      • Opcode Fuzzy Hash: 34d3cb49ee2cec726991ce26fe11517897d14be92ffad4d2a31d686bdc893e88
                                      • Instruction Fuzzy Hash: FE217470600109AFCB10EF65C945DAE77B8EF49318B10447EF905AB252DA35EE55CB25
                                      APIs
                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 0046115F
                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 00461184
                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 0046118E
                                      • Sleep.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 004611C1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CounterPerformanceQuerySleep
                                      • String ID: @F
                                      • API String ID: 2875609808-2781531706
                                      • Opcode ID: fb156e6c77600c7f304348c8d1eac85c626a95be7b30d4d71b6c442a0f0d2560
                                      • Instruction ID: bb6757969e877831e55d7075b4886ee1e071d58b2ed1133263d880316bc49dff
                                      • Opcode Fuzzy Hash: fb156e6c77600c7f304348c8d1eac85c626a95be7b30d4d71b6c442a0f0d2560
                                      • Instruction Fuzzy Hash: B5113071D0051DD7CF00DFA5D9486EEBB78FF0E711F04446ADA41B2250DB789954CB9A
                                      APIs
                                      • CharUpperBuffW.USER32(?,?), ref: 00461B19
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: BuffCharUpper
                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                      • API String ID: 3964851224-769500911
                                      • Opcode ID: ddf9bd4ea2c933ea10ae3f2d66facce2b6f03bdba89e18f9656f9a543cb93bfe
                                      • Instruction ID: af2dfc59a03385b6ff20d34341c085ea3c8da270568938ae896690ac606468ae
                                      • Opcode Fuzzy Hash: ddf9bd4ea2c933ea10ae3f2d66facce2b6f03bdba89e18f9656f9a543cb93bfe
                                      • Instruction Fuzzy Hash: D4115E30A001189FCF00EF55D8919EEB7B4FF25708B94846ED815A72A2EB366D06CB99
                                      APIs
                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047EC07
                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047EC37
                                      • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0047ED6A
                                      • CloseHandle.KERNEL32(?), ref: 0047EDEB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                      • String ID:
                                      • API String ID: 2364364464-0
                                      • Opcode ID: 0682de77952afe081ab9211739b9fa55dc0894d1ffd7185653a5878fd6647099
                                      • Instruction ID: fffec5fe55f17e3d6af6322d033c5a61601868e7b6c72126a0bd4eac84abd099
                                      • Opcode Fuzzy Hash: 0682de77952afe081ab9211739b9fa55dc0894d1ffd7185653a5878fd6647099
                                      • Instruction Fuzzy Hash: F38191B16007009FD720EF29C846F6AB7E5AF48714F04C96EF999AB3D2D674AC44CB49
                                      APIs
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                        • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004800FD
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0048013C
                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00480183
                                      • RegCloseKey.ADVAPI32(?,?), ref: 004801AF
                                      • RegCloseKey.ADVAPI32(00000000), ref: 004801BC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                      • String ID:
                                      • API String ID: 3440857362-0
                                      • Opcode ID: eb3d65cebd95743b25b3d8b2f383d2a3dc5d99c3845973315673a0c90115c286
                                      • Instruction ID: 88ea7daa6ea56d794f8f44f15d5cebce8ee28ea1eb3ac59e56a3faba9080710b
                                      • Opcode Fuzzy Hash: eb3d65cebd95743b25b3d8b2f383d2a3dc5d99c3845973315673a0c90115c286
                                      • Instruction Fuzzy Hash: 00517E71214204AFC704EF54C885E6FB7E8FF84318F40492EF595972A2DB39E909CB56
                                      APIs
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                      • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0047D927
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 0047D9AA
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0047D9C6
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 0047DA07
                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0047DA21
                                        • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                        • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                      • String ID:
                                      • API String ID: 327935632-0
                                      • Opcode ID: 8e5387776496b3f8f1a2017f9503373e90fab46b37fef918bb034ee9df80b407
                                      • Instruction ID: 2e87ffb2dc156b6f817890f7ff3d29c7ed6bd27adfaf25e4966d104b6097512d
                                      • Opcode Fuzzy Hash: 8e5387776496b3f8f1a2017f9503373e90fab46b37fef918bb034ee9df80b407
                                      • Instruction Fuzzy Hash: C6512A75A00205DFCB00EFA9C4849AEB7B4FF09324B14C06AE959AB352D739AD45CF59
                                      APIs
                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0046E61F
                                      • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0046E648
                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0046E687
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0046E6AC
                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0046E6B4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                      • String ID:
                                      • API String ID: 1389676194-0
                                      • Opcode ID: 2453bedcbfeb2c197ef1d1a9c40e551b64fbe16a02dad5a09541050465900976
                                      • Instruction ID: 91bc9b0f2d422c2787d2346e32f4aa496c052f5f6ad9ddd010e4038a96899c27
                                      • Opcode Fuzzy Hash: 2453bedcbfeb2c197ef1d1a9c40e551b64fbe16a02dad5a09541050465900976
                                      • Instruction Fuzzy Hash: 21514D75A00105DFCB01EF65C981AAEBBF5EF09314F1480AAE809AB3A2DB35ED11CF55
                                      APIs
                                      • GetCursorPos.USER32(?), ref: 00402357
                                      • ScreenToClient.USER32(004C57B0,?), ref: 00402374
                                      • GetAsyncKeyState.USER32(00000001), ref: 00402399
                                      • GetAsyncKeyState.USER32(00000002), ref: 004023A7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AsyncState$ClientCursorScreen
                                      • String ID:
                                      • API String ID: 4210589936-0
                                      • Opcode ID: 5e57ec4fa362a0614b756f6f42b5b02f4a1dd37b82db46a5665e1b84f14a6b21
                                      • Instruction ID: 839f7de4dd1eaa7d0d5dffd0863558e2d4fc2f6d206a63eef28a724dc464cb27
                                      • Opcode Fuzzy Hash: 5e57ec4fa362a0614b756f6f42b5b02f4a1dd37b82db46a5665e1b84f14a6b21
                                      • Instruction Fuzzy Hash: EB416135504115FBCF199FA9C848AEEBB74FB09364F20432BE825A22D0C7789D54DB95
                                      APIs
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004563E7
                                      • TranslateAcceleratorW.USER32(?,?,?), ref: 00456433
                                      • TranslateMessage.USER32(?), ref: 0045645C
                                      • DispatchMessageW.USER32(?), ref: 00456466
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00456475
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Message$PeekTranslate$AcceleratorDispatch
                                      • String ID:
                                      • API String ID: 2108273632-0
                                      • Opcode ID: a7c8caa960d18c36081a52289de371ede53fdfa9d0291adbc1963a0764221605
                                      • Instruction ID: 5e30e11b4a1e50e6093782a7c3f18569847dc725279de51faeef3c0bd44cbf51
                                      • Opcode Fuzzy Hash: a7c8caa960d18c36081a52289de371ede53fdfa9d0291adbc1963a0764221605
                                      • Instruction Fuzzy Hash: 0A31A731500646AFDB648F74CC44FAB7BA8AB02306F95017AEC11C3262E729A4CDDB5D
                                      APIs
                                      • GetWindowRect.USER32(?,?), ref: 00458A30
                                      • PostMessageW.USER32(?,00000201,00000001), ref: 00458ADA
                                      • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00458AE2
                                      • PostMessageW.USER32(?,00000202,00000000), ref: 00458AF0
                                      • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00458AF8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessagePostSleep$RectWindow
                                      • String ID:
                                      • API String ID: 3382505437-0
                                      • Opcode ID: 0ca9fd056ca19cb6c90bb9abdc103f32fbac461099b2f563c45de53987908b56
                                      • Instruction ID: 80642b6b9bd3aba6b5d9fb31be4e412888bcfd4668c130c4b2f9d35bc39c9ded
                                      • Opcode Fuzzy Hash: 0ca9fd056ca19cb6c90bb9abdc103f32fbac461099b2f563c45de53987908b56
                                      • Instruction Fuzzy Hash: 9831DF71500219EBDF14CFA8D94CA9E3BB5EB04316F10862EF924E72D2CBB49D18CB94
                                      APIs
                                      • IsWindowVisible.USER32(?), ref: 0045B204
                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0045B221
                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0045B259
                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0045B27F
                                      • _wcsstr.LIBCMT ref: 0045B289
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                      • String ID:
                                      • API String ID: 3902887630-0
                                      • Opcode ID: dc6bb87e0f2054fbca9fbaefc34bdcafd12e3ca129bc4abbadc152c462a24a40
                                      • Instruction ID: 2c7352b259513f6215f8baf2ea9b1e154aa1926be373c141b5dda8785e83a564
                                      • Opcode Fuzzy Hash: dc6bb87e0f2054fbca9fbaefc34bdcafd12e3ca129bc4abbadc152c462a24a40
                                      • Instruction Fuzzy Hash: DF2103312042007BEB155B75AC09A7F7B98DB49711F10417EFC04DA262EF699C4597A8
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                      • GetWindowLongW.USER32(?,000000F0), ref: 0048B192
                                      • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0048B1B7
                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0048B1CF
                                      • GetSystemMetrics.USER32(00000004), ref: 0048B1F8
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00470E90,00000000), ref: 0048B216
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$Long$MetricsSystem
                                      • String ID:
                                      • API String ID: 2294984445-0
                                      • Opcode ID: 34ad65126fbd0b204b60e6f6fa90dd02b6f3b86ef25a4089bec8c1af36d17f68
                                      • Instruction ID: a9241cd50f58f28df48e309b6b0d701528321bfcfd0e0dab973ca591f656860e
                                      • Opcode Fuzzy Hash: 34ad65126fbd0b204b60e6f6fa90dd02b6f3b86ef25a4089bec8c1af36d17f68
                                      • Instruction Fuzzy Hash: D6218071910651AFCB10AF389C18A6F3BA4FB15361F144F3ABD32D72E0E73498618B98
                                      APIs
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00459320
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00459352
                                      • __itow.LIBCMT ref: 0045936A
                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00459392
                                      • __itow.LIBCMT ref: 004593A3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$__itow$_memmove
                                      • String ID:
                                      • API String ID: 2983881199-0
                                      • Opcode ID: 84fe632702548fb1505fa491271f0483b598e009c5f2d7716c087cfb082072c1
                                      • Instruction ID: 968ba8743040f36d453ad30986a6980fa4fc6e9bba4f502b0ab074d445a6e810
                                      • Opcode Fuzzy Hash: 84fe632702548fb1505fa491271f0483b598e009c5f2d7716c087cfb082072c1
                                      • Instruction Fuzzy Hash: 0821F831B00204FBDB10AA618C85EAE3BA8EF4C715F14403AFD04E72C2D6B89D49979A
                                      APIs
                                      • IsWindow.USER32(00000000), ref: 00475A6E
                                      • GetForegroundWindow.USER32 ref: 00475A85
                                      • GetDC.USER32(00000000), ref: 00475AC1
                                      • GetPixel.GDI32(00000000,?,00000003), ref: 00475ACD
                                      • ReleaseDC.USER32(00000000,00000003), ref: 00475B08
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$ForegroundPixelRelease
                                      • String ID:
                                      • API String ID: 4156661090-0
                                      • Opcode ID: edf996e463ee5f9d04d52dc8d637bf3fadcba554f1e06d52b73ce542917b45eb
                                      • Instruction ID: 994e0b6e1fcd6e195a73360d71973740683ca92f646318d89dcc793d3657a82a
                                      • Opcode Fuzzy Hash: edf996e463ee5f9d04d52dc8d637bf3fadcba554f1e06d52b73ce542917b45eb
                                      • Instruction Fuzzy Hash: 24219275A00104AFDB10EF65DC84A9EBBE5EF48310F14C57EF84997352DA74AC05CB54
                                      APIs
                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0040134D
                                      • SelectObject.GDI32(?,00000000), ref: 0040135C
                                      • BeginPath.GDI32(?), ref: 00401373
                                      • SelectObject.GDI32(?,00000000), ref: 0040139C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ObjectSelect$BeginCreatePath
                                      • String ID:
                                      • API String ID: 3225163088-0
                                      • Opcode ID: 98e764f69c7e765b554d132fb0eb6f4f9a20b5118db88517485c95fa533f3fbb
                                      • Instruction ID: 345c33b4cc72e80acb91194012c3a0486190d93d7afc841094e42ad70741f55b
                                      • Opcode Fuzzy Hash: 98e764f69c7e765b554d132fb0eb6f4f9a20b5118db88517485c95fa533f3fbb
                                      • Instruction Fuzzy Hash: 74215130800604DFEB10AF15DC04B6E7BA8FB00351F54463BF810A61F0D778A8A5DFA9
                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 00464ABA
                                      • __beginthreadex.LIBCMT ref: 00464AD8
                                      • MessageBoxW.USER32(?,?,?,?), ref: 00464AED
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00464B03
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00464B0A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                      • String ID:
                                      • API String ID: 3824534824-0
                                      • Opcode ID: 6202b558f3b2a9591e93c05a74b6ac6320d8986f7eb6685660a047ad8363ccb0
                                      • Instruction ID: dad7fb5640a7fc086676ad258fed45b246edcd9838203791acb142923f9e7505
                                      • Opcode Fuzzy Hash: 6202b558f3b2a9591e93c05a74b6ac6320d8986f7eb6685660a047ad8363ccb0
                                      • Instruction Fuzzy Hash: AC110876904214BBCB009FA8EC08E9F7FACEB85320F14427AF815D3350E679DD448BA9
                                      APIs
                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0045821E
                                      • GetLastError.KERNEL32(?,00457CE2,?,?,?), ref: 00458228
                                      • GetProcessHeap.KERNEL32(00000008,?,?,00457CE2,?,?,?), ref: 00458237
                                      • HeapAlloc.KERNEL32(00000000,?,00457CE2,?,?,?), ref: 0045823E
                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00458255
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                      • String ID:
                                      • API String ID: 842720411-0
                                      • Opcode ID: cfd5187f71e7f5cd8bdbe136946f039270b76956d2ef1bbe7b4a41513b9fedde
                                      • Instruction ID: ea2086197a74160409fd2b37e3cc6aadebf9925ef2750944b4d42ea2a50fea98
                                      • Opcode Fuzzy Hash: cfd5187f71e7f5cd8bdbe136946f039270b76956d2ef1bbe7b4a41513b9fedde
                                      • Instruction Fuzzy Hash: 5F012471200604AF9B204FA6DC88D6B7FACEF8A755B50097EF809D2220DE318C18CA64
                                      APIs
                                      • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?,?,00457455), ref: 00457127
                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457142
                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457150
                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?), ref: 00457160
                                      • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 0045716C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                      • String ID:
                                      • API String ID: 3897988419-0
                                      • Opcode ID: 053515c948ca66986ad112422e3531eaba7e5432baa58b7069d320ef88250593
                                      • Instruction ID: e33d562c89cd7b32e1c2ea0ad0b2255dbd3c00d864d4e8b233389f959c6fe991
                                      • Opcode Fuzzy Hash: 053515c948ca66986ad112422e3531eaba7e5432baa58b7069d320ef88250593
                                      • Instruction Fuzzy Hash: 9F01DF72600604BBCB105F68EC44BAE7BADEF44792F100079FD04D2321DB35DD088BA4
                                      APIs
                                      • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00465260
                                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0046526E
                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00465276
                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00465280
                                      • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004652BC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                      • String ID:
                                      • API String ID: 2833360925-0
                                      • Opcode ID: f570a565f6e5a323919ec457eb30d6746b1d20e306601747cbf76f1b2f538e79
                                      • Instruction ID: 4ceb344e541e682f07f906f107c4893f4acd0a9012da7968cf5d6b0cf31b4d70
                                      • Opcode Fuzzy Hash: f570a565f6e5a323919ec457eb30d6746b1d20e306601747cbf76f1b2f538e79
                                      • Instruction Fuzzy Hash: 89015B71D01A19DBCF00DFE4DC585EEBB78FB09711F4004AAE941F2240DB3459548BAA
                                      APIs
                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00458121
                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0045812B
                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0045813A
                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00458141
                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00458157
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                      • String ID:
                                      • API String ID: 44706859-0
                                      • Opcode ID: 9a4f6c5eb7810c0e88419f6a8d5d9273e391a222e84c7421f05042c8608bd2e6
                                      • Instruction ID: c07733b115f7f4265118d5d6f8c893d5168d9180ec19ac620c451b64c6eb697f
                                      • Opcode Fuzzy Hash: 9a4f6c5eb7810c0e88419f6a8d5d9273e391a222e84c7421f05042c8608bd2e6
                                      • Instruction Fuzzy Hash: 71F0AF70200704AFEB110FA5EC88E6B3BACEF4A755B10043EF945D2250DF649C09DB64
                                      APIs
                                      • GetDlgItem.USER32(?,000003E9), ref: 0045C1F7
                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 0045C20E
                                      • MessageBeep.USER32(00000000), ref: 0045C226
                                      • KillTimer.USER32(?,0000040A), ref: 0045C242
                                      • EndDialog.USER32(?,00000001), ref: 0045C25C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                      • String ID:
                                      • API String ID: 3741023627-0
                                      • Opcode ID: 4cc83a5054ee70337c3131b30a14a5b24bd9acd8f200e045765572ac389ab5c6
                                      • Instruction ID: 1cbdf9da880a683b58ffeaf16326a4f2222d3a7c74a558aa9ab436c5b6b9af77
                                      • Opcode Fuzzy Hash: 4cc83a5054ee70337c3131b30a14a5b24bd9acd8f200e045765572ac389ab5c6
                                      • Instruction Fuzzy Hash: DF0167309047049BEB205B54DD8EB9A7778BB00706F000ABEB942A15E1DBF8699DDB59
                                      APIs
                                      • EndPath.GDI32(?), ref: 004013BF
                                      • StrokeAndFillPath.GDI32(?,?,0043B888,00000000,?), ref: 004013DB
                                      • SelectObject.GDI32(?,00000000), ref: 004013EE
                                      • DeleteObject.GDI32 ref: 00401401
                                      • StrokePath.GDI32(?), ref: 0040141C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                      • String ID:
                                      • API String ID: 2625713937-0
                                      • Opcode ID: 7e87ad70334dd9126f87667927215bd62c7307a5dd53875d48cb893158f8455a
                                      • Instruction ID: 52848d70ea624aaff4fbf1a8dc35ad1b05fe5f58837c3e038025b123c59b5ab6
                                      • Opcode Fuzzy Hash: 7e87ad70334dd9126f87667927215bd62c7307a5dd53875d48cb893158f8455a
                                      • Instruction Fuzzy Hash: E9F01930000A08EFDB516F26EC4CB5D3BA4A741326F188639E829981F1CB3459A9DF28
                                      APIs
                                        • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                        • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                        • Part of subcall function 00407A51: _memmove.LIBCMT ref: 00407AAB
                                      • __swprintf.LIBCMT ref: 00412ECD
                                      Strings
                                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00412D66
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                      • API String ID: 1943609520-557222456
                                      • Opcode ID: c4ec07105fde21932254e1da0da7bbd5d0472dc1ea5bd19ce6ea2077edd8549f
                                      • Instruction ID: 5fa1cbf72f49bdff47ddac1708762697048697bfe45d30711dc422f43ccdaf03
                                      • Opcode Fuzzy Hash: c4ec07105fde21932254e1da0da7bbd5d0472dc1ea5bd19ce6ea2077edd8549f
                                      • Instruction Fuzzy Hash: AF91AD716083119FD714EF25D985CAFB7A8EF85314F00482FF441AB2A2DA78ED85CB5A
                                      APIs
                                        • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                      • CoInitialize.OLE32(00000000), ref: 0046B9BB
                                      • CoCreateInstance.OLE32(00492D6C,00000000,00000001,00492BDC,?), ref: 0046B9D4
                                      • CoUninitialize.OLE32 ref: 0046B9F1
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                      • String ID: .lnk
                                      • API String ID: 2126378814-24824748
                                      • Opcode ID: f7a30ab1dd2ca80e792bba49e71a6443f1178a26574886c7a29868adfc2a5d66
                                      • Instruction ID: 954a6617656c640983dbf77e3dd998129c04dcf005f5de696e9701dcbcf68386
                                      • Opcode Fuzzy Hash: f7a30ab1dd2ca80e792bba49e71a6443f1178a26574886c7a29868adfc2a5d66
                                      • Instruction Fuzzy Hash: 6DA154756042019FCB00EF15C484D1ABBE5FF89318F14895EF8999B3A2DB35EC85CB96
                                      APIs
                                      • OleSetContainedObject.OLE32(?,00000001), ref: 0045B4BE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ContainedObject
                                      • String ID: AutoIt3GUI$Container$%I
                                      • API String ID: 3565006973-4251005282
                                      • Opcode ID: b0ef9ef2592e363b8beabdfb88cbb6824cc0f8258bc98d745d804ae61dd96c16
                                      • Instruction ID: 7009c248d49ee490af6c5c3a89f60ad5612698b65dddc7868321d046ba5149c9
                                      • Opcode Fuzzy Hash: b0ef9ef2592e363b8beabdfb88cbb6824cc0f8258bc98d745d804ae61dd96c16
                                      • Instruction Fuzzy Hash: E6915B70200605AFDB14DF64C884B6ABBE5FF49705F20856EED46CB392EB74E845CBA4
                                      APIs
                                      • __startOneArgErrorHandling.LIBCMT ref: 004250AD
                                        • Part of subcall function 004300F0: __87except.LIBCMT ref: 0043012B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorHandling__87except__start
                                      • String ID: pow
                                      • API String ID: 2905807303-2276729525
                                      • Opcode ID: 4113f970b40e4ddfad9eaf005de12111c539308e3198b2e3fd8f87d65f62cc15
                                      • Instruction ID: 06df28618b400316a62ebb5dd7aba5b0962afb7cd5aceff72fbc56c90cb9ae17
                                      • Opcode Fuzzy Hash: 4113f970b40e4ddfad9eaf005de12111c539308e3198b2e3fd8f87d65f62cc15
                                      • Instruction Fuzzy Hash: 20518B20B0C50186DB217B24ED2137F2B909B44700F608AABE4D5863AADE3D8DD4DB8E
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _memmove
                                      • String ID: 3cA$_A
                                      • API String ID: 4104443479-3480954128
                                      • Opcode ID: 470fd055cd62c062cad60ef6c87f64deccec5063348adfb3c377f09d63a70252
                                      • Instruction ID: c37b5588275ae9a3f9bfbb083816e01235b481b2fd059d6d91eac45173b7304a
                                      • Opcode Fuzzy Hash: 470fd055cd62c062cad60ef6c87f64deccec5063348adfb3c377f09d63a70252
                                      • Instruction Fuzzy Hash: 24516B70E006199FDB64CF68C880AAEBBB1FF44304F14852EE85AD7350EB39A995CB55
                                      APIs
                                        • Part of subcall function 004614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00459296,?,?,00000034,00000800,?,00000034), ref: 004614E6
                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0045983F
                                        • Part of subcall function 00461487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 004614B1
                                        • Part of subcall function 004613DE: GetWindowThreadProcessId.USER32(?,?), ref: 00461409
                                        • Part of subcall function 004613DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0045925A,00000034,?,?,00001004,00000000,00000000), ref: 00461419
                                        • Part of subcall function 004613DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0045925A,00000034,?,?,00001004,00000000,00000000), ref: 0046142F
                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004598AC
                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004598F9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                      • String ID: @
                                      • API String ID: 4150878124-2766056989
                                      • Opcode ID: 25131a85ebe6ddc6b48413ca47e37c1e8c65e46d0e1ba382f06cbd4a7eab333c
                                      • Instruction ID: 83720f96416bb9890d74edf788c2ecf3a7fc11859df44560b8e2e1ee8df86db8
                                      • Opcode Fuzzy Hash: 25131a85ebe6ddc6b48413ca47e37c1e8c65e46d0e1ba382f06cbd4a7eab333c
                                      • Instruction Fuzzy Hash: 8E41627690021CBFDB10DFA5CC41EDEBBB8EB05300F14415AF945B7251DA746E89CBA5
                                      APIs
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0048F910,00000000,?,?,?,?), ref: 004879DF
                                      • GetWindowLongW.USER32 ref: 004879FC
                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00487A0C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$Long
                                      • String ID: SysTreeView32
                                      • API String ID: 847901565-1698111956
                                      • Opcode ID: c2cb38d0ba203aaf0824fb46eb773359df0f33fa209fb6769eb1bd51d6a01582
                                      • Instruction ID: fcb44d89e5371bc2138989b019639c6b34adeb660a6a60e8862dd05b2c6f6b74
                                      • Opcode Fuzzy Hash: c2cb38d0ba203aaf0824fb46eb773359df0f33fa209fb6769eb1bd51d6a01582
                                      • Instruction Fuzzy Hash: 7431F271204206ABDB119F34CC55BEF77A8FB04324F204B2AF875A22E0D738EC518758
                                      APIs
                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00487B61
                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00487B76
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: '$PY
                                      • API String ID: 3850602802-4050582132
                                      • Opcode ID: 145c2602ecfc880be9160f22ab10d528c13dd2be0925f493fbace8acb5298da5
                                      • Instruction ID: 2b11cb9b6b8a30acf8cd6c98f3d8d1a12271bbff968c22292d45c16f9f2a21f9
                                      • Opcode Fuzzy Hash: 145c2602ecfc880be9160f22ab10d528c13dd2be0925f493fbace8acb5298da5
                                      • Instruction Fuzzy Hash: 41412874A052099FDB14DF68C890BEEBBB5FB08304F20056AE904AB391D774A951DFA4
                                      APIs
                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00487461
                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00487475
                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00487499
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window
                                      • String ID: SysMonthCal32
                                      • API String ID: 2326795674-1439706946
                                      • Opcode ID: 61045321ac7bf12d5b8baadd1c1317b301de72fcd6e86f1e347c12b9b39caacc
                                      • Instruction ID: a782af31bde95408328e4f00c38aa01da76ea549d3e2a3982252f7da8ca2871c
                                      • Opcode Fuzzy Hash: 61045321ac7bf12d5b8baadd1c1317b301de72fcd6e86f1e347c12b9b39caacc
                                      • Instruction Fuzzy Hash: CD21D032100218BBDF11DFA4CC42FEE3B69EB48724F210615FE156B190DA79EC918BA4
                                      APIs
                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00486D3B
                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00486D4B
                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00486D70
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$MoveWindow
                                      • String ID: Listbox
                                      • API String ID: 3315199576-2633736733
                                      • Opcode ID: 751df69c11bbdcf7b5361d053624c448979b1fb0f20ab75c9448d7b30a168b5b
                                      • Instruction ID: 4c3adc306d008ae433eb9b24af907097c824bc429f4b76309dac7fd9fc57b361
                                      • Opcode Fuzzy Hash: 751df69c11bbdcf7b5361d053624c448979b1fb0f20ab75c9448d7b30a168b5b
                                      • Instruction Fuzzy Hash: 0B21F232600118BFEF129F54CC45FAF3BBAEF89750F028529F940AB2A0C675AC5197A4
                                      APIs
                                      • __snwprintf.LIBCMT ref: 00473A66
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __snwprintf_memmove
                                      • String ID: , $$AUTOITCALLVARIABLE%d$%I
                                      • API String ID: 3506404897-3751216540
                                      • Opcode ID: 6cc03e317f5675f65ed60d1ab97184a0a664bbd528dae795ed0934f10558b714
                                      • Instruction ID: 67a8496c9faa10d830991f6dea88ae160e004db0d1f45ac87fd3582d40b7d8ea
                                      • Opcode Fuzzy Hash: 6cc03e317f5675f65ed60d1ab97184a0a664bbd528dae795ed0934f10558b714
                                      • Instruction Fuzzy Hash: 98218170A00219AACF10EF65CC82AEE77B9AF44704F50446EE449B7182DB3CEA45DB6D
                                      APIs
                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00487772
                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00487787
                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00487794
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: msctls_trackbar32
                                      • API String ID: 3850602802-1010561917
                                      • Opcode ID: 1c29657f45557683d1b312c07fddb74740427be331155a373290d3506167769a
                                      • Instruction ID: f92afa797eeb34fec66cc861e9e49cfc52a42a3b8dc3c72e421b2ad803853977
                                      • Opcode Fuzzy Hash: 1c29657f45557683d1b312c07fddb74740427be331155a373290d3506167769a
                                      • Instruction Fuzzy Hash: 78112732204208BEEF106F61CC01FDF7768EF88B54F21052EFA41A21A0C275F851CB24
                                      APIs
                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00403C14,004C52F8,?,?,?), ref: 0041096E
                                        • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                      • _wcscat.LIBCMT ref: 00444CB7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FullNamePath_memmove_wcscat
                                      • String ID: p.$SL
                                      • API String ID: 257928180-1058558880
                                      • Opcode ID: 51d74b1989755c53183aee132601f2e45a628d82cf1f90107cdd3f9f5a0d9d06
                                      • Instruction ID: 43824745660c3988bd5ee8fabd2b32f2c8f8042702d18c831ff1fab54f9b3e1b
                                      • Opcode Fuzzy Hash: 51d74b1989755c53183aee132601f2e45a628d82cf1f90107cdd3f9f5a0d9d06
                                      • Instruction Fuzzy Hash: ED118274A15208AACB40EB648945FDD77B8AF08354B0044ABB948E7291EAB8B6C4471D
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __calloc_crt
                                      • String ID: K$@BL
                                      • API String ID: 3494438863-2209178351
                                      • Opcode ID: fc675e1694061d9c38afe518b907dae0cef97e15bff182515fce2e9d9647b47a
                                      • Instruction ID: ecd99e2cd8c25bd978de89897c730db32a1f4afae71c84053b65a056749c41d4
                                      • Opcode Fuzzy Hash: fc675e1694061d9c38afe518b907dae0cef97e15bff182515fce2e9d9647b47a
                                      • Instruction Fuzzy Hash: 13F0A4713056318BE7A48F15BC51E9A6BD4EB40334F91006BE504CE280EB38B8818A9C
                                      APIs
                                      • GetForegroundWindow.USER32(?,004C57B0,0048D809,000000FC,?,00000000,00000000,?,?,?,0043B969,?,?,?,?,?), ref: 0048ACD1
                                      • GetFocus.USER32 ref: 0048ACD9
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                        • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                      • SendMessageW.USER32(00EAE9C0,000000B0,000001BC,000001C0), ref: 0048AD4B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$Long$FocusForegroundMessageSend
                                      • String ID: PY
                                      • API String ID: 3601265619-1007129125
                                      • Opcode ID: 6eb4b47955d0beabee85a7fead2e78efab2990697cd5ad70c114e568899c4910
                                      • Instruction ID: d57903bc6dbc16aadff8c78f105386adfd3d16c9a59b1ca89f0fb7e577f5ac80
                                      • Opcode Fuzzy Hash: 6eb4b47955d0beabee85a7fead2e78efab2990697cd5ad70c114e568899c4910
                                      • Instruction Fuzzy Hash: 6301D2302005008FD720AB28D888E6A37E6EB89324F180A7EF415C73B0DB75AC56CB58
                                      APIs
                                      • __lock.LIBCMT ref: 00429B94
                                        • Part of subcall function 00429C0B: __mtinitlocknum.LIBCMT ref: 00429C1D
                                        • Part of subcall function 00429C0B: EnterCriticalSection.KERNEL32(00000000,?,00429A7C,0000000D), ref: 00429C36
                                      • __updatetlocinfoEx_nolock.LIBCMT ref: 00429BA4
                                        • Part of subcall function 00429100: ___addlocaleref.LIBCMT ref: 0042911C
                                        • Part of subcall function 00429100: ___removelocaleref.LIBCMT ref: 00429127
                                        • Part of subcall function 00429100: ___freetlocinfo.LIBCMT ref: 0042913B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                      • String ID: 8K$8K
                                      • API String ID: 547918592-1592964153
                                      • Opcode ID: d41c92ecd1d7e74e0adb9f475a826e210c9bd16fdcadbad4fdccb8f20f9f3334
                                      • Instruction ID: 8b56a6972abf5b03a90719b03b1493c8f73a09bac4b06a75c0cd44bebfa85f20
                                      • Opcode Fuzzy Hash: d41c92ecd1d7e74e0adb9f475a826e210c9bd16fdcadbad4fdccb8f20f9f3334
                                      • Instruction Fuzzy Hash: 35E08671B47320AAE614F7A7B9037DD26506B40B25FA0025FF055550C1CE7C2940852F
                                      APIs
                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00404BD0,?,00404DEF,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404C11
                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00404C23
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                      • API String ID: 2574300362-3689287502
                                      • Opcode ID: 405154c16e2ccef9ecdbf58c32324ea843781b108d72a9dad8986559099558a3
                                      • Instruction ID: 336b7b4d781913fc81d88f89c4603830af099844575e0fd289a57b9d24372fc6
                                      • Opcode Fuzzy Hash: 405154c16e2ccef9ecdbf58c32324ea843781b108d72a9dad8986559099558a3
                                      • Instruction Fuzzy Hash: 21D08C70500712CFD7206F70D90830BB6D5AF08352B118C3E9481D2690E6B8D8808728
                                      APIs
                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00404B83,?), ref: 00404C44
                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00404C56
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                      • API String ID: 2574300362-1355242751
                                      • Opcode ID: ede2280b6c29169b17772aa7acd9e81a2ae4f3a09695aed7be4b1fdaf97be5ce
                                      • Instruction ID: 94e8dd0119df68c591ce1b6916bf7291aa534648892bae55459e1f5a441e7c38
                                      • Opcode Fuzzy Hash: ede2280b6c29169b17772aa7acd9e81a2ae4f3a09695aed7be4b1fdaf97be5ce
                                      • Instruction Fuzzy Hash: 05D0C270500713CFD7206F31C80830A72D4AF00351B218C3F9591D62A8E678D8C0C728
                                      APIs
                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00481039), ref: 00480DF5
                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00480E07
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                      • API String ID: 2574300362-4033151799
                                      • Opcode ID: fae212b9462cf56759409cc1f58fb8eb23c0b65c0082e346e03b2c3ad688c6db
                                      • Instruction ID: d6bbf1028a7b4fc64c7871010167997e003500dc78b62918f38a53d73d50c6ba
                                      • Opcode Fuzzy Hash: fae212b9462cf56759409cc1f58fb8eb23c0b65c0082e346e03b2c3ad688c6db
                                      • Instruction Fuzzy Hash: ACD08231560322DFC320AF70C80838B72E4AF04342F208C3E9582C2250E6B8D8948B28
                                      APIs
                                      • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00478CF4,?,0048F910), ref: 004790EE
                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00479100
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AddressLibraryLoadProc
                                      • String ID: GetModuleHandleExW$kernel32.dll
                                      • API String ID: 2574300362-199464113
                                      • Opcode ID: f050257f1e698f793cf4ceeb70369fd3548485a42f655611e5c8aa441dfab454
                                      • Instruction ID: 12f83e0466186043ebac617d8a25d984f844cdccf99b41ce397239b1d45cf92f
                                      • Opcode Fuzzy Hash: f050257f1e698f793cf4ceeb70369fd3548485a42f655611e5c8aa441dfab454
                                      • Instruction Fuzzy Hash: E6D0EC34510723DFD7209B35D81C64A76D4AF05751B51CC3E9485D6650E678D894C754
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: LocalTime__swprintf
                                      • String ID: %.3d$WIN_XPe
                                      • API String ID: 2070861257-2409531811
                                      • Opcode ID: 4c24db5f6d1ae0e835b3c0d7d74f6f6d97c26fe48fb6e8bef9c505129785ad3d
                                      • Instruction ID: f51e3ac8fae6d8955d529539db48231027d4147bdd6b48c6978ef66e561906ab
                                      • Opcode Fuzzy Hash: 4c24db5f6d1ae0e835b3c0d7d74f6f6d97c26fe48fb6e8bef9c505129785ad3d
                                      • Instruction Fuzzy Hash: D2D01271844118FAD7109B9098898F9737CA708301F600563B512A2050E23E9BD6E62E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b67f0641d69e682f3dbeb5e9524b3f3136514ebd375aeb5d2f23f0fb20905a0f
                                      • Instruction ID: 13cbbea2f029a5b6ef5998baa1d0dcecb81b6aaeffd6b1af622dda72ce090ed1
                                      • Opcode Fuzzy Hash: b67f0641d69e682f3dbeb5e9524b3f3136514ebd375aeb5d2f23f0fb20905a0f
                                      • Instruction Fuzzy Hash: B9C19C74A04216EFCB14CFA4D884AAEBBB5FF48311B1085A9EC05DB352D734ED85DB94
                                      APIs
                                      • CharLowerBuffW.USER32(?,?), ref: 0047E0BE
                                      • CharLowerBuffW.USER32(?,?), ref: 0047E101
                                        • Part of subcall function 0047D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0047D7C5
                                      • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0047E301
                                      • _memmove.LIBCMT ref: 0047E314
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: BuffCharLower$AllocVirtual_memmove
                                      • String ID:
                                      • API String ID: 3659485706-0
                                      • Opcode ID: 4666806964c635f19c1969d0a4374cb9ba4f4ed8044ee1c53630fc65b13bfbc0
                                      • Instruction ID: 42d1ff19b42d4dd855f78dbf13e3d8c427035282adcdd002c13888698d5010eb
                                      • Opcode Fuzzy Hash: 4666806964c635f19c1969d0a4374cb9ba4f4ed8044ee1c53630fc65b13bfbc0
                                      • Instruction Fuzzy Hash: 91C16A71604301DFC714DF29C48096ABBE4FF89318F148AAEF8999B352D734E946CB86
                                      APIs
                                      • CoInitialize.OLE32(00000000), ref: 004780C3
                                      • CoUninitialize.OLE32 ref: 004780CE
                                        • Part of subcall function 0045D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0045D5D4
                                      • VariantInit.OLEAUT32(?), ref: 004780D9
                                      • VariantClear.OLEAUT32(?), ref: 004783AA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                      • String ID:
                                      • API String ID: 780911581-0
                                      • Opcode ID: 0f625460e1d8066da09c67e41f27514c9fba90c2366d23154bb5826f9ef884b6
                                      • Instruction ID: 8f3373c4a7a5232ad993fe33ba140746eecbff111afdbebb2f840ccc5d4b94f2
                                      • Opcode Fuzzy Hash: 0f625460e1d8066da09c67e41f27514c9fba90c2366d23154bb5826f9ef884b6
                                      • Instruction Fuzzy Hash: 2CA17C756047019FCB10EF15C485B6AB7E4BF89758F04845EF999AB3A2CB38EC05CB4A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Variant$AllocClearCopyInitString
                                      • String ID:
                                      • API String ID: 2808897238-0
                                      • Opcode ID: 3951a686a7a2f69813b3b575af8aab3e2566b7f16af04516fafab6f46b926ab0
                                      • Instruction ID: e8b204b61dde8909cc9ebe033208aa5324eaf332f6d31eb9d5c273134af525d6
                                      • Opcode Fuzzy Hash: 3951a686a7a2f69813b3b575af8aab3e2566b7f16af04516fafab6f46b926ab0
                                      • Instruction Fuzzy Hash: 9551C5747003019BDB20AF66D49162AB3E5AF45315F61C82FE986EB293DA38DC49870D
                                      APIs
                                      • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00459AD2
                                      • __itow.LIBCMT ref: 00459B03
                                        • Part of subcall function 00459D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00459DBE
                                      • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00459B6C
                                      • __itow.LIBCMT ref: 00459BC3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend$__itow
                                      • String ID:
                                      • API String ID: 3379773720-0
                                      • Opcode ID: 761745edda6faf9fa79a06f405b24e6c4121e754452c928cd48a186b62ba80fa
                                      • Instruction ID: c0bae62156c8c15d2afb648dec85a43b0e833cdc1d7df77e8a8dc6203b00a11c
                                      • Opcode Fuzzy Hash: 761745edda6faf9fa79a06f405b24e6c4121e754452c928cd48a186b62ba80fa
                                      • Instruction Fuzzy Hash: 4741A770A00208ABEF11DF55D845BEE7BB9EF44719F00006EFD0567292DB78AD49CB6A
                                      APIs
                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 004769D1
                                      • WSAGetLastError.WSOCK32(00000000), ref: 004769E1
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00476A45
                                      • WSAGetLastError.WSOCK32(00000000), ref: 00476A51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ErrorLast$__itow__swprintfsocket
                                      • String ID:
                                      • API String ID: 2214342067-0
                                      • Opcode ID: 5f9ca6de3472ca1f7af679026d0f929c5a37830e5e67d00f46ee422ea10bce61
                                      • Instruction ID: c17afa0f8bd668a9c60690327d1e2da2a99666ddae487d2dea1163d2ceff8f1e
                                      • Opcode Fuzzy Hash: 5f9ca6de3472ca1f7af679026d0f929c5a37830e5e67d00f46ee422ea10bce61
                                      • Instruction Fuzzy Hash: A241C175740200AFEB50BF25CC86F6A37A49F05B18F04C56EFA59AB3C3DA789D008B59
                                      APIs
                                      • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0048F910), ref: 004764A7
                                      • _strlen.LIBCMT ref: 004764D9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _strlen
                                      • String ID:
                                      • API String ID: 4218353326-0
                                      • Opcode ID: 0735306cd6c365301d922e03e3a6f7bbbc6fe0ad785d4a3bd3a8fd54906be9aa
                                      • Instruction ID: ea6fe9a4da80eb7d3c3fcd9d99711482a179dafd9654a2bb84a00921c454041b
                                      • Opcode Fuzzy Hash: 0735306cd6c365301d922e03e3a6f7bbbc6fe0ad785d4a3bd3a8fd54906be9aa
                                      • Instruction Fuzzy Hash: F341B971600104ABCB14EB65EC85EEEB7AAAF44314F51C16FF919A72D3DB38AD04CB58
                                      APIs
                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0046B89E
                                      • GetLastError.KERNEL32(?,00000000), ref: 0046B8C4
                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0046B8E9
                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0046B915
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                      • String ID:
                                      • API String ID: 3321077145-0
                                      • Opcode ID: 8c509dae0351cb0f1ead8c0d9691e3f66f8983daa8a4ab2c48e0df630e8b2899
                                      • Instruction ID: 5b86d2e11fb278bd4ab993ead48be06bf9d9dcf949e57147c6f090c5708de813
                                      • Opcode Fuzzy Hash: 8c509dae0351cb0f1ead8c0d9691e3f66f8983daa8a4ab2c48e0df630e8b2899
                                      • Instruction Fuzzy Hash: C441097A600610DFCB11EF15C444A59BBE1EF49314F05C0AAEC4AAB3A2DB38FD45CB99
                                      APIs
                                      • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00460B27
                                      • SetKeyboardState.USER32(00000080,?,00000001), ref: 00460B43
                                      • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00460BA9
                                      • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00460BFB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: KeyboardState$InputMessagePostSend
                                      • String ID:
                                      • API String ID: 432972143-0
                                      • Opcode ID: ad743076a504700ecfcd0b291c1b9b7b7440be96a9dfed4adad831221a9f942d
                                      • Instruction ID: 03210f4579a9838ef25ae451a3721c68a31d2690f75eb3d3b5678938ddfb0b3b
                                      • Opcode Fuzzy Hash: ad743076a504700ecfcd0b291c1b9b7b7440be96a9dfed4adad831221a9f942d
                                      • Instruction Fuzzy Hash: 65315970D402086EFB308AA98C05BFFBBA5AB45718F08826BE491512D2E37DA945975F
                                      APIs
                                      • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00460C66
                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00460C82
                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 00460CE1
                                      • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00460D33
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: KeyboardState$InputMessagePostSend
                                      • String ID:
                                      • API String ID: 432972143-0
                                      • Opcode ID: db42d93e8e195687caca85855f7745e2d87a2e1a1f23b639b912e2236a781201
                                      • Instruction ID: af81f782b9f2afb763cf5164547ef1363043bc47ca8f91e08b3a13bd089ac861
                                      • Opcode Fuzzy Hash: db42d93e8e195687caca85855f7745e2d87a2e1a1f23b639b912e2236a781201
                                      • Instruction Fuzzy Hash: 963135309402086EFF388B658804BBFBB66EB45310F04472FE481622D1E33D9949D75B
                                      APIs
                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004361FB
                                      • __isleadbyte_l.LIBCMT ref: 00436229
                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00436257
                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0043628D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                      • String ID:
                                      • API String ID: 3058430110-0
                                      • Opcode ID: a60c1041aab017ddab1c5084f57e160f63eb243bd769fe5892fd9e0978686beb
                                      • Instruction ID: a268d3a3e6e94a3a382490fbdf87b59e774afa85b5b6ffc4d13239602402ad5c
                                      • Opcode Fuzzy Hash: a60c1041aab017ddab1c5084f57e160f63eb243bd769fe5892fd9e0978686beb
                                      • Instruction Fuzzy Hash: 8831E230600246BFDF219F65CC48B6B7BB9BF4A310F17906AE82487291DB34D850D754
                                      APIs
                                      • GetForegroundWindow.USER32 ref: 00484F02
                                        • Part of subcall function 00463641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0046365B
                                        • Part of subcall function 00463641: GetCurrentThreadId.KERNEL32 ref: 00463662
                                        • Part of subcall function 00463641: AttachThreadInput.USER32(00000000,?,00465005), ref: 00463669
                                      • GetCaretPos.USER32(?), ref: 00484F13
                                      • ClientToScreen.USER32(00000000,?), ref: 00484F4E
                                      • GetForegroundWindow.USER32 ref: 00484F54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                      • String ID:
                                      • API String ID: 2759813231-0
                                      • Opcode ID: 66b1f3ac083da855331d928d4446481d114f1a3fb54dcb21d0b34bab5917c058
                                      • Instruction ID: 1d2def75fb9c8d520c96e6582531674793c8a8545b0fc50cd96dbe06c6996e1e
                                      • Opcode Fuzzy Hash: 66b1f3ac083da855331d928d4446481d114f1a3fb54dcb21d0b34bab5917c058
                                      • Instruction Fuzzy Hash: 38314FB2D00108AFCB00EFA6C8819EFB7F9EF84304F00446EE515E7242EA759E058BA5
                                      APIs
                                        • Part of subcall function 0045810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00458121
                                        • Part of subcall function 0045810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0045812B
                                        • Part of subcall function 0045810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0045813A
                                        • Part of subcall function 0045810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00458141
                                        • Part of subcall function 0045810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00458157
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 004586A3
                                      • _memcmp.LIBCMT ref: 004586C6
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004586FC
                                      • HeapFree.KERNEL32(00000000), ref: 00458703
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                      • String ID:
                                      • API String ID: 1592001646-0
                                      • Opcode ID: 2c5cbc444dc25df1d3482cf24a588846e82523edbc0970691195306e100f3dfe
                                      • Instruction ID: 730e04a0c9a28b219d77ec22e6a84493cb1498a8cd35620125a6bebab32f77ad
                                      • Opcode Fuzzy Hash: 2c5cbc444dc25df1d3482cf24a588846e82523edbc0970691195306e100f3dfe
                                      • Instruction Fuzzy Hash: E4215A71E01109EBDB10DFA4C989BAEB7B8EF45306F15405EE844AB242DB34AE09CB58
                                      APIs
                                      • __setmode.LIBCMT ref: 004209AE
                                        • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                        • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                      • _fprintf.LIBCMT ref: 004209E5
                                      • OutputDebugStringW.KERNEL32(?), ref: 00455DBB
                                        • Part of subcall function 00424AAA: _flsall.LIBCMT ref: 00424AC3
                                      • __setmode.LIBCMT ref: 00420A1A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                      • String ID:
                                      • API String ID: 521402451-0
                                      • Opcode ID: f57b360070f95caf794d5bbc9f69cdf3d154969ad305127439a794a852e1f7f3
                                      • Instruction ID: 506474fa098cb1490a8c63a0929ef03edd2b6c88ff5c0dc42923ee6bdce5b67a
                                      • Opcode Fuzzy Hash: f57b360070f95caf794d5bbc9f69cdf3d154969ad305127439a794a852e1f7f3
                                      • Instruction Fuzzy Hash: E31126727041146FDB04B2A5BC469BE77A8DF81318FA0416FF105632C3EE3C5946879D
                                      APIs
                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004717A3
                                        • Part of subcall function 0047182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0047184C
                                        • Part of subcall function 0047182D: InternetCloseHandle.WININET(00000000), ref: 004718E9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Internet$CloseConnectHandleOpen
                                      • String ID:
                                      • API String ID: 1463438336-0
                                      • Opcode ID: 0d77803af34525429c563aa5a91095bc3ad4b0cccef2d99c89baa2dfe7cd75a8
                                      • Instruction ID: 71b6e4b1fe2b952a6419c9952bf0f018ffc457c15b1f1ac8131077084853f328
                                      • Opcode Fuzzy Hash: 0d77803af34525429c563aa5a91095bc3ad4b0cccef2d99c89baa2dfe7cd75a8
                                      • Instruction Fuzzy Hash: 1121C235200601BFEB169F648C01FFBBBA9FF48710F10842FF91996660D775D815A7A9
                                      APIs
                                      • GetFileAttributesW.KERNEL32(?,0048FAC0), ref: 00463A64
                                      • GetLastError.KERNEL32 ref: 00463A73
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00463A82
                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0048FAC0), ref: 00463ADF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                      • String ID:
                                      • API String ID: 2267087916-0
                                      • Opcode ID: 2683f90cffcee273da933c5596c04da79fbe056fd24a16443bdc845c507bb14f
                                      • Instruction ID: 327c7b43b7f0ba2f7e77ca50885f5bcbcfcb82b154d1d82e999d8874673cc0dc
                                      • Opcode Fuzzy Hash: 2683f90cffcee273da933c5596c04da79fbe056fd24a16443bdc845c507bb14f
                                      • Instruction Fuzzy Hash: C921B1705082018FC700EF68C88186FBBE4EE55369F144A2FF499C72E1E7359A0ADB4B
                                      APIs
                                      • _free.LIBCMT ref: 00435101
                                        • Part of subcall function 0042571C: __FF_MSGBANNER.LIBCMT ref: 00425733
                                        • Part of subcall function 0042571C: __NMSG_WRITE.LIBCMT ref: 0042573A
                                        • Part of subcall function 0042571C: RtlAllocateHeap.NTDLL(00E90000,00000000,00000001,00000000,?,?,?,00420DD3,?), ref: 0042575F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: AllocateHeap_free
                                      • String ID:
                                      • API String ID: 614378929-0
                                      • Opcode ID: e60795e1e50f542a82753ad3c5ba5f3e3c59a4eb8eb16c00dd89e828180a4845
                                      • Instruction ID: 565aca9384bc55ec46628ce6f4316e74187f5c3bb682111b66b5609c454c8c26
                                      • Opcode Fuzzy Hash: e60795e1e50f542a82753ad3c5ba5f3e3c59a4eb8eb16c00dd89e828180a4845
                                      • Instruction Fuzzy Hash: D411E072E01A21AECF313FB1BC05B5E3B989B183A5F50593FF9049A250DE3C89418B9C
                                      APIs
                                      • _memset.LIBCMT ref: 004044CF
                                        • Part of subcall function 0040407C: _memset.LIBCMT ref: 004040FC
                                        • Part of subcall function 0040407C: _wcscpy.LIBCMT ref: 00404150
                                        • Part of subcall function 0040407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00404160
                                      • KillTimer.USER32(?,00000001,?,?), ref: 00404524
                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00404533
                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0043D4B9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                      • String ID:
                                      • API String ID: 1378193009-0
                                      • Opcode ID: 8233c1c53fe49e8a502b553c2e8f55af8437e20015ea4a24a99bc4102d4ad802
                                      • Instruction ID: dcb2c65cf3c1a774e1d203f737fabc32089307ed9affa8f53aec521d9447171b
                                      • Opcode Fuzzy Hash: 8233c1c53fe49e8a502b553c2e8f55af8437e20015ea4a24a99bc4102d4ad802
                                      • Instruction Fuzzy Hash: 6F21FBB0904754AFE7328B249C45BEBBBEC9B55318F0404AFE79A56281C3782984CB49
                                      APIs
                                        • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                        • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                      • gethostbyname.WSOCK32(?,?,?), ref: 00476399
                                      • WSAGetLastError.WSOCK32(00000000), ref: 004763A4
                                      • _memmove.LIBCMT ref: 004763D1
                                      • inet_ntoa.WSOCK32(?), ref: 004763DC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                      • String ID:
                                      • API String ID: 1504782959-0
                                      • Opcode ID: b3c26ea8f50ef63a11f8cd57dea858f33b687c6f581215677125ae755104d2ff
                                      • Instruction ID: c304d0e6e06ed5b692ae79d4b0fe9c52f6c8e6d6f1456e813eafe14ad56adccd
                                      • Opcode Fuzzy Hash: b3c26ea8f50ef63a11f8cd57dea858f33b687c6f581215677125ae755104d2ff
                                      • Instruction Fuzzy Hash: F2114F71600109AFCB00FBA5D946CEE77B9EF04314B54847AF505B72A2DB389E14CB69
                                      APIs
                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00458B61
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458B73
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458B89
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458BA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: ca17c677d33199d8ade5de32726d6ec6320cad89c97852bedaa9fe676a546a7f
                                      • Instruction ID: 6d6e4feeaee75d02a1ec4dd614e497ad2765f264ac6e3ed00c825e9843e5ba14
                                      • Opcode Fuzzy Hash: ca17c677d33199d8ade5de32726d6ec6320cad89c97852bedaa9fe676a546a7f
                                      • Instruction Fuzzy Hash: 56113A79900218BFDB10DB95C884EAEBB78EB48710F2041A6E900B7250DA716E15DB94
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                      • DefDlgProcW.USER32(?,00000020,?), ref: 004012D8
                                      • GetClientRect.USER32(?,?), ref: 0043B5FB
                                      • GetCursorPos.USER32(?), ref: 0043B605
                                      • ScreenToClient.USER32(?,?), ref: 0043B610
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Client$CursorLongProcRectScreenWindow
                                      • String ID:
                                      • API String ID: 4127811313-0
                                      • Opcode ID: e89a7c32ee376f1e5d0348a97a3418fe62ed5464cf3f8610352dda152c0d0452
                                      • Instruction ID: ee9d34d9398b5f91fab5137b757b2ab9dbcc007e8162b1c14587a54292e2d527
                                      • Opcode Fuzzy Hash: e89a7c32ee376f1e5d0348a97a3418fe62ed5464cf3f8610352dda152c0d0452
                                      • Instruction Fuzzy Hash: 39112B39510059FBCB00EF99D8899AE77B8FB05300F4008AAF901F7291D734BA569BA9
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0045D84D
                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0045D864
                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0045D879
                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0045D897
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Type$Register$FileLoadModuleNameUser
                                      • String ID:
                                      • API String ID: 1352324309-0
                                      • Opcode ID: f854c2ae4ddfb44975126c45fe272911be12f4fa913ee62eb5c826514f2548e5
                                      • Instruction ID: 3b05f8a101c890c8fbc83375acaac98503a8deaba450bce75694a4266b83033e
                                      • Opcode Fuzzy Hash: f854c2ae4ddfb44975126c45fe272911be12f4fa913ee62eb5c826514f2548e5
                                      • Instruction Fuzzy Hash: 48115E75A05304DBE330AF50EC08F97BBBCEF00B01F10896EA926D6151D7B4E94D9BA5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                      • String ID:
                                      • API String ID: 3016257755-0
                                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                      • Instruction ID: 3d94be51af7e819a6a5def82be0e086b27bd99855e7e965629bee2c507946819
                                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                      • Instruction Fuzzy Hash: 78014EB244414ABBCF2A5E84CC41CEE3F72BB1C354F599416FA9858131D23AD9B1AB85
                                      APIs
                                      • GetWindowRect.USER32(?,?), ref: 0048B2E4
                                      • ScreenToClient.USER32(?,?), ref: 0048B2FC
                                      • ScreenToClient.USER32(?,?), ref: 0048B320
                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048B33B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ClientRectScreen$InvalidateWindow
                                      • String ID:
                                      • API String ID: 357397906-0
                                      • Opcode ID: e8173e98fc73e507b6a04d2f7e54522757b65c9b70d93ac78b94b59699abf8f9
                                      • Instruction ID: e0f35f64d62337ec24ef524e52db7040af9c6cc02db1932b8591958b9ea84988
                                      • Opcode Fuzzy Hash: e8173e98fc73e507b6a04d2f7e54522757b65c9b70d93ac78b94b59699abf8f9
                                      • Instruction Fuzzy Hash: B9117775D00209EFDB01DF99C444AEEBBF5FF18310F104566E914E3220D735AA558F94
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?), ref: 00466BE6
                                        • Part of subcall function 004676C4: _memset.LIBCMT ref: 004676F9
                                      • _memmove.LIBCMT ref: 00466C09
                                      • _memset.LIBCMT ref: 00466C16
                                      • LeaveCriticalSection.KERNEL32(?), ref: 00466C26
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CriticalSection_memset$EnterLeave_memmove
                                      • String ID:
                                      • API String ID: 48991266-0
                                      • Opcode ID: edf19e1ede3b3e611382947217f22c9f8674c26c836af00265cbaa5f5bcd5e3d
                                      • Instruction ID: 06c116e41b1fbc97defe022da98efa456519ca017efd3746de7cd937a477406a
                                      • Opcode Fuzzy Hash: edf19e1ede3b3e611382947217f22c9f8674c26c836af00265cbaa5f5bcd5e3d
                                      • Instruction Fuzzy Hash: ACF0547A200110BBCF016F56EC85A8ABF29EF45325F4480A9FE085E227D775E811CBB9
                                      APIs
                                      • GetSysColor.USER32(00000008), ref: 00402231
                                      • SetTextColor.GDI32(?,000000FF), ref: 0040223B
                                      • SetBkMode.GDI32(?,00000001), ref: 00402250
                                      • GetStockObject.GDI32(00000005), ref: 00402258
                                      • GetWindowDC.USER32(?,00000000), ref: 0043BE83
                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0043BE90
                                      • GetPixel.GDI32(00000000,?,00000000), ref: 0043BEA9
                                      • GetPixel.GDI32(00000000,00000000,?), ref: 0043BEC2
                                      • GetPixel.GDI32(00000000,?,?), ref: 0043BEE2
                                      • ReleaseDC.USER32(?,00000000), ref: 0043BEED
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                      • String ID:
                                      • API String ID: 1946975507-0
                                      • Opcode ID: 1c24b0d26c008fe2912d49eeb423ba9ae618f885d5077ddc5dea034ec8dbd8ce
                                      • Instruction ID: 54194c7dea5641a5760446fc0b471bd43188e270dcc7ade6c1867ff591c8ccba
                                      • Opcode Fuzzy Hash: 1c24b0d26c008fe2912d49eeb423ba9ae618f885d5077ddc5dea034ec8dbd8ce
                                      • Instruction Fuzzy Hash: 8FE03932104244EADB215FA8EC4D7D93B10EB05332F10837AFB69980E187B54994DB16
                                      APIs
                                      • GetCurrentThread.KERNEL32 ref: 0045871B
                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,004582E6), ref: 00458722
                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,004582E6), ref: 0045872F
                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,004582E6), ref: 00458736
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CurrentOpenProcessThreadToken
                                      • String ID:
                                      • API String ID: 3974789173-0
                                      • Opcode ID: c13fcb7cbc4fcf9024c8800305f1294cb96d5ee06e78be5c1b908a636c14961a
                                      • Instruction ID: 27e516f12521b82670cd12e73380cd235ac9fe5f10b87aab6d4880cb8d6f589a
                                      • Opcode Fuzzy Hash: c13fcb7cbc4fcf9024c8800305f1294cb96d5ee06e78be5c1b908a636c14961a
                                      • Instruction Fuzzy Hash: 69E086366113119FD7205FB45D0CB5B3BACEF55792F244C3CB645D9051DA388449C754
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: %I
                                      • API String ID: 0-63094095
                                      • Opcode ID: 12a55f50a175f6035143f5cccb5f7d0de1c6292b1dcd589a94c2dc8d5e510b75
                                      • Instruction ID: fc9b66e0bafda5900f64632d1c19c64e360ede111f7e08ffc6918f9b7723571d
                                      • Opcode Fuzzy Hash: 12a55f50a175f6035143f5cccb5f7d0de1c6292b1dcd589a94c2dc8d5e510b75
                                      • Instruction Fuzzy Hash: F7B19D759001099ACF24EF95C8819EEB7B5EF44314F11403BE942B72D1DB3C9AA6CB9E
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __itow_s
                                      • String ID: xbL$xbL
                                      • API String ID: 3653519197-3351732020
                                      • Opcode ID: 0a5b9bf065401be702e2392f786adacc3879a0ec43e6dea87f384b5d44b503ef
                                      • Instruction ID: dfe480003ad9fd5cab9b7df9ebde8448aad3da8901d64dd9d19fd2ed475b7079
                                      • Opcode Fuzzy Hash: 0a5b9bf065401be702e2392f786adacc3879a0ec43e6dea87f384b5d44b503ef
                                      • Instruction Fuzzy Hash: DFB16E70A00105EFCB14DF55C890EEAB7B9EF58344F14C46AF949AB291EB38E941CB99
                                      APIs
                                        • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                        • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                        • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                      • __wcsnicmp.LIBCMT ref: 0046B02D
                                      • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0046B0F6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                      • String ID: LPT
                                      • API String ID: 3222508074-1350329615
                                      • Opcode ID: 2fad9f8248d96d883e87a625a7967d2388416e0194ab04b9425aff81e98ec75e
                                      • Instruction ID: 83c5630e61c03cc96fa61f6b78faa4233f6e1162f12f5b466cba6b991e1c6364
                                      • Opcode Fuzzy Hash: 2fad9f8248d96d883e87a625a7967d2388416e0194ab04b9425aff81e98ec75e
                                      • Instruction Fuzzy Hash: EF617475A00215AFCB14DF54C851EEEB7B4EF09350F10806AF916EB391E738AE85CB99
                                      APIs
                                      • Sleep.KERNEL32(00000000), ref: 00412968
                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00412981
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: GlobalMemorySleepStatus
                                      • String ID: @
                                      • API String ID: 2783356886-2766056989
                                      • Opcode ID: cf15a7ea090bffc9490279112080cc94ce2022ef9ba38fcf57aa55417a2360bc
                                      • Instruction ID: a5a81f9d260a569e77baff687d6fe7a0f73e349ca0d117409dcb6840122a66be
                                      • Opcode Fuzzy Hash: cf15a7ea090bffc9490279112080cc94ce2022ef9ba38fcf57aa55417a2360bc
                                      • Instruction Fuzzy Hash: CB5159B24187449BD320EF15D885BAFBBE8FB85344F41886DF2D8911A1DB74892CCB5A
                                      APIs
                                        • Part of subcall function 00404F0B: __fread_nolock.LIBCMT ref: 00404F29
                                      • _wcscmp.LIBCMT ref: 00469824
                                      • _wcscmp.LIBCMT ref: 00469837
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: _wcscmp$__fread_nolock
                                      • String ID: FILE
                                      • API String ID: 4029003684-3121273764
                                      • Opcode ID: 61b9d9cc128ec34272c66af4fd2f1fdd343520f55c014a8993afaf0baf9333d9
                                      • Instruction ID: cde52b3ca8712c625de002da450250744642bb9d8a04c3b997614ed6dba67ccd
                                      • Opcode Fuzzy Hash: 61b9d9cc128ec34272c66af4fd2f1fdd343520f55c014a8993afaf0baf9333d9
                                      • Instruction Fuzzy Hash: 8C41A771A0021ABADF20AAA5CC45FEF77BDDF85714F00047EB604B7181DA79AD058B69
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ClearVariant
                                      • String ID: DdL$DdL
                                      • API String ID: 1473721057-91670653
                                      • Opcode ID: 5e91e0f9761e9d7bc780f905406615417003885d8eec73c8253ff09b9dbf17c9
                                      • Instruction ID: 8cf85b897da21b35b232154f37a53a393289a03a8f02d27ab87a98346ee69310
                                      • Opcode Fuzzy Hash: 5e91e0f9761e9d7bc780f905406615417003885d8eec73c8253ff09b9dbf17c9
                                      • Instruction Fuzzy Hash: 5D5113B86043019FD754DF18C580A1ABBF1BF99344F54886EE9859B3A1D339EC91CF4A
                                      APIs
                                      • _memset.LIBCMT ref: 0047259E
                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 004725D4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CrackInternet_memset
                                      • String ID: |
                                      • API String ID: 1413715105-2343686810
                                      • Opcode ID: cc63eb8bb5f68bae524c0b7ba67e4eb4f298ca526a07f00bbaa01354d2aaaadb
                                      • Instruction ID: 4adfb47e446f893ace23fd506e663b8e952a67a31115c745ae406753cf5a670a
                                      • Opcode Fuzzy Hash: cc63eb8bb5f68bae524c0b7ba67e4eb4f298ca526a07f00bbaa01354d2aaaadb
                                      • Instruction Fuzzy Hash: A5313871D00119ABCF11AFA1CC85EEEBFB8FF08344F10406AF918B6162DB756916DB65
                                      APIs
                                      • DestroyWindow.USER32(?,?,?,?), ref: 00486B17
                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00486B53
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$DestroyMove
                                      • String ID: static
                                      • API String ID: 2139405536-2160076837
                                      • Opcode ID: 352ac0ade79c08b1e3711c999f417e7e9207a04fdee643833d7e2eb5d5c32766
                                      • Instruction ID: c0acac3fdbca48a843832e92e86f2a53b54dc7fac4935119c3a772658612a1a1
                                      • Opcode Fuzzy Hash: 352ac0ade79c08b1e3711c999f417e7e9207a04fdee643833d7e2eb5d5c32766
                                      • Instruction Fuzzy Hash: B3318171100604AEDB10AF69CC41BFF73A9FF48754F11892EF9A5D7290DA34AC81CB68
                                      APIs
                                      • _memset.LIBCMT ref: 00462911
                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0046294C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: InfoItemMenu_memset
                                      • String ID: 0
                                      • API String ID: 2223754486-4108050209
                                      • Opcode ID: 5c8df5651b84bdd33c6f1d3aebb03e5797c6424e7f8da0b97aba1d1a942940c5
                                      • Instruction ID: 2b4b8058b7b01795732b14ccdc08f7f24d6d082f06cc36c2997a609d376c2748
                                      • Opcode Fuzzy Hash: 5c8df5651b84bdd33c6f1d3aebb03e5797c6424e7f8da0b97aba1d1a942940c5
                                      • Instruction Fuzzy Hash: BE31D871700705BBDB24DE48CE45BAFBBA4EF85350F14001AE881A6291E7B89948CB1B
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                        • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                      • GetParent.USER32(?), ref: 0043B7BA
                                      • DefDlgProcW.USER32(?,00000133,?,?,?,?,?,?,?,?,004019B3,?,?,?,00000006,?), ref: 0043B834
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: LongWindow$ParentProc
                                      • String ID: PY
                                      • API String ID: 2181805148-1007129125
                                      • Opcode ID: 77b4ac96e8eec783148a803e5fb7d112845bdab1a7f86ea98f4bf84d3ba33e36
                                      • Instruction ID: 99a89500c111a7c533a01032b7a033c3f7518cf1b05ea8c7e94d2a57aa989313
                                      • Opcode Fuzzy Hash: 77b4ac96e8eec783148a803e5fb7d112845bdab1a7f86ea98f4bf84d3ba33e36
                                      • Instruction Fuzzy Hash: FE21D534201104AFCB249F68CC88EAA3B96EF49324F544276F6156B3F1C7396D52DB5C
                                      APIs
                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00486761
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0048676C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: Combobox
                                      • API String ID: 3850602802-2096851135
                                      • Opcode ID: 2599c693f4df458194b2d20bee318bb9363e3503390fb5a9e170622b8a8df8eb
                                      • Instruction ID: 7937b7f8ceb80f7c2640562fc72fb2af059ad44b1fd006181b112b31544ba688
                                      • Opcode Fuzzy Hash: 2599c693f4df458194b2d20bee318bb9363e3503390fb5a9e170622b8a8df8eb
                                      • Instruction Fuzzy Hash: 9111B271200208AFEF51AF54DC81EAF376AEB48368F21092AF91897390D6399C5197A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PY
                                      • API String ID: 0-1007129125
                                      • Opcode ID: 5ccca152ae78d0a4e978a9b6dd6affcd7973f3de2ef92e7958034204b4974680
                                      • Instruction ID: 703345f7423792ebde65d3a34d44a26dd6e2a37a12b13719ef7777a31c0b206b
                                      • Opcode Fuzzy Hash: 5ccca152ae78d0a4e978a9b6dd6affcd7973f3de2ef92e7958034204b4974680
                                      • Instruction Fuzzy Hash: E521D534124908FFDB10AF14CC45FBE33A4EB05310F484926FA12DA2E0D679ED51DB68
                                      APIs
                                        • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                        • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                        • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                      • GetWindowRect.USER32(00000000,?), ref: 00486C71
                                      • GetSysColor.USER32(00000012), ref: 00486C8B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                      • String ID: static
                                      • API String ID: 1983116058-2160076837
                                      • Opcode ID: 9c6eecc6bf7be964b917928501c6ce077e485374675d84249056efc255601d24
                                      • Instruction ID: 619ac3c59cbe9074ca3f8c975c7c8c691f8bfa66afa20d6a6bf36cd90ef0372b
                                      • Opcode Fuzzy Hash: 9c6eecc6bf7be964b917928501c6ce077e485374675d84249056efc255601d24
                                      • Instruction Fuzzy Hash: DC212CB2510209AFDF04EFA8CC45EEE7BA8FB08315F114A29FD55D2250D639E851DB64
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CreateMenuPopup
                                      • String ID: PY
                                      • API String ID: 3826294624-1007129125
                                      • Opcode ID: 1845bf0aba41aa6b259b4370ae65a280d68a0288cbfe3ce620df00e4e4089204
                                      • Instruction ID: 88e30117b7e290c29789f23e133c4cb078c614a7c415cb0c1eedd7e530a2b2c1
                                      • Opcode Fuzzy Hash: 1845bf0aba41aa6b259b4370ae65a280d68a0288cbfe3ce620df00e4e4089204
                                      • Instruction Fuzzy Hash: 2B219078500609DFCB50EF28D448BDA77E1FB09324F05896AE8598B391C335AC56CFA9
                                      APIs
                                      • GetWindowTextLengthW.USER32(00000000), ref: 004869A2
                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004869B1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: LengthMessageSendTextWindow
                                      • String ID: edit
                                      • API String ID: 2978978980-2167791130
                                      • Opcode ID: dd0a91ca5e41458d40a7dd2483d9f0107040614a073402ee9870d4d63f33d5fa
                                      • Instruction ID: c4dc0b7ee3ea423f7e1eb401844c401eee0777dcbcb5b463cc5485c74a1bef4f
                                      • Opcode Fuzzy Hash: dd0a91ca5e41458d40a7dd2483d9f0107040614a073402ee9870d4d63f33d5fa
                                      • Instruction Fuzzy Hash: A711B2B1100104ABEF506F68DC40EEF3769EB05378F614B29F964972E0C739DC919758
                                      APIs
                                      • _memset.LIBCMT ref: 00462A22
                                      • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00462A41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: InfoItemMenu_memset
                                      • String ID: 0
                                      • API String ID: 2223754486-4108050209
                                      • Opcode ID: 751c536b083c9adfecd4a8c2834bb49aa0f4764eac95f6b1a2dda81446ac4081
                                      • Instruction ID: fa89ad59b694463807a05e008f151e0ce3f2ba89f6cc59c0a4ca2f54b8788f6f
                                      • Opcode Fuzzy Hash: 751c536b083c9adfecd4a8c2834bb49aa0f4764eac95f6b1a2dda81446ac4081
                                      • Instruction Fuzzy Hash: EA11B172A01915BACB30DA98DA44BDF73A8AB45304F044027E855B7290E7F8AD0AC79A
                                      APIs
                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0047222C
                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00472255
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Internet$OpenOption
                                      • String ID: <local>
                                      • API String ID: 942729171-4266983199
                                      • Opcode ID: 75e9458716a39df8dc3ccd06a53274ec1d022472b75fdff4666a046931244d06
                                      • Instruction ID: 87a968fd796eb7ebd351e14a87864fbf4782faaabfad8c695b3487e96fec79d3
                                      • Opcode Fuzzy Hash: 75e9458716a39df8dc3ccd06a53274ec1d022472b75fdff4666a046931244d06
                                      • Instruction Fuzzy Hash: 2C113270101221BADB248F118D84EFBFBACFF0A351F10C66BF90892200D2B49881D6F9
                                      APIs
                                      • SendMessageW.USER32(?,?,?,?), ref: 00488530
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: PY
                                      • API String ID: 3850602802-1007129125
                                      • Opcode ID: 8bf73a6c1c879f30d94fcf95ab91f7150710578e40145e960f41066a540d619f
                                      • Instruction ID: 182ef1c8f70fae0f6597b1670328eeb04f8fec7c44ccd4e953f504647ebda681
                                      • Opcode Fuzzy Hash: 8bf73a6c1c879f30d94fcf95ab91f7150710578e40145e960f41066a540d619f
                                      • Instruction Fuzzy Hash: 69210675600209EFCB05EF94D840CAE7BB5FB4C340B404559FD01A7360DB35AD61DBA8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PY
                                      • API String ID: 0-1007129125
                                      • Opcode ID: 0e27db7f8ff9ece40736cb303d5d23a131d30b9927fa6f68a85efc5cf454761f
                                      • Instruction ID: 7f7e56aa603a22163430c6b613d0582a29caf800a1518c4684294a96c073f302
                                      • Opcode Fuzzy Hash: 0e27db7f8ff9ece40736cb303d5d23a131d30b9927fa6f68a85efc5cf454761f
                                      • Instruction Fuzzy Hash: BC111C346006049FCB209F29D841E6A7BE6FB49320F14866AEA659B3E0C775B9418F94
                                      APIs
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                        • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00458E73
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_memmove
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 372448540-1403004172
                                      • Opcode ID: 2918cbd423e314682b6aeef60f20b2f437583d2d04210ddc768483336ba2776e
                                      • Instruction ID: b8e2c670fbb7cccfe9550cd9997642be974785ccb83f9afd7f496d9e06e76b61
                                      • Opcode Fuzzy Hash: 2918cbd423e314682b6aeef60f20b2f437583d2d04210ddc768483336ba2776e
                                      • Instruction Fuzzy Hash: 4001F971601118ABCF14FBA1CC429FE7368EF01320B100A2FBC25772D2DE39580CC655
                                      APIs
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                        • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00458D6B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_memmove
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 372448540-1403004172
                                      • Opcode ID: 2679ac469d2a79c52cde0aa27b2925585709cec1e737893b0f87bf023a0d60d7
                                      • Instruction ID: f717951ca8db0a39ae808ededaa33f35f94e61068a96ac8ac9a889606be0a7e6
                                      • Opcode Fuzzy Hash: 2679ac469d2a79c52cde0aa27b2925585709cec1e737893b0f87bf023a0d60d7
                                      • Instruction Fuzzy Hash: 1701B1B1A41108ABCF14EBA1C952AFF73A8DF15341F10042FB805772D2DE285E0CD67A
                                      APIs
                                        • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                        • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00458DEE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_memmove
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 372448540-1403004172
                                      • Opcode ID: 40705f3a528c46c19bec82240a1a33ca6c148120e478bd4bd703279278c2f7ad
                                      • Instruction ID: a21a4701c09283d063fe79b367182633aa51a9950eb7d0e2c1ab54a0e2954309
                                      • Opcode Fuzzy Hash: 40705f3a528c46c19bec82240a1a33ca6c148120e478bd4bd703279278c2f7ad
                                      • Instruction Fuzzy Hash: 36018FB1A41109ABDB11EAA5C942AFF77A8DF11301F20052FBC05732D3DE295E1DD67A
                                      APIs
                                        • Part of subcall function 004299AC: __getptd_noexit.LIBCMT ref: 004299AD
                                      • __lock.LIBCMT ref: 00429443
                                      • _free.LIBCMT ref: 00429470
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: __getptd_noexit__lock_free
                                      • String ID:
                                      • API String ID: 1533244847-3162483948
                                      • Opcode ID: bb0fc4ab2616d9928346d2c84e6fa6f457bbad648bccfb392cb5bae878a60f03
                                      • Instruction ID: d314c133a52d90920545c7da6750d1f452db13ffd78b4e8b53e90bd0ae39db61
                                      • Opcode Fuzzy Hash: bb0fc4ab2616d9928346d2c84e6fa6f457bbad648bccfb392cb5bae878a60f03
                                      • Instruction Fuzzy Hash: AF115631F0563597C711BF6A640169DB3A06B44724F95425FE854A7380C73C5D43CBDE
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 0045C534
                                        • Part of subcall function 0045C816: _memmove.LIBCMT ref: 0045C860
                                        • Part of subcall function 0045C816: VariantInit.OLEAUT32(00000000), ref: 0045C882
                                        • Part of subcall function 0045C816: VariantCopy.OLEAUT32(00000000,?), ref: 0045C88C
                                      • VariantClear.OLEAUT32(?), ref: 0045C556
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Variant$Init$ClearCopy_memmove
                                      • String ID: d}K
                                      • API String ID: 2932060187-3405784397
                                      • Opcode ID: 9b1aca60acbf213d6da9471b2b02533c98583e4ee9509d3790eb0f545b09e1ee
                                      • Instruction ID: 9b6b4eac42ae89553be157e2085c7612e92dc5081679660b2cee5bd476f3b436
                                      • Opcode Fuzzy Hash: 9b1aca60acbf213d6da9471b2b02533c98583e4ee9509d3790eb0f545b09e1ee
                                      • Instruction Fuzzy Hash: 401130B18007089FC710DFAAC8C089AF7F8FF18314B50852FE58AD7612E734AA48CB54
                                      APIs
                                        • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                      • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,0043B93A,?,?,?), ref: 0048C5F1
                                        • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                      • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 0048C5D7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: LongWindow$MessageProcSend
                                      • String ID: PY
                                      • API String ID: 982171247-1007129125
                                      • Opcode ID: ea7dd347cec8b253a0965eef1c2cc884f96e2e0edc460d87b948776b808b70c3
                                      • Instruction ID: 75bfe16ac3fd55d34439925630d151ba76f7166ec7360f996b83c7a81aac6a16
                                      • Opcode Fuzzy Hash: ea7dd347cec8b253a0965eef1c2cc884f96e2e0edc460d87b948776b808b70c3
                                      • Instruction Fuzzy Hash: 3A01B531200614BBCB216F14DC98E6F3BA6FB85764F14093AF9411B2E1CB75B852EB69
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: ClassName_wcscmp
                                      • String ID: #32770
                                      • API String ID: 2292705959-463685578
                                      • Opcode ID: 9645843bb023f01be4ce20977d6b38402124eff568dd58de57c01e48d443021a
                                      • Instruction ID: c10ae28a8aa268df33283df1156ce4f732750d60ee08a51e76ed462bd539b068
                                      • Opcode Fuzzy Hash: 9645843bb023f01be4ce20977d6b38402124eff568dd58de57c01e48d443021a
                                      • Instruction Fuzzy Hash: 91E0D13260023837E7209B55AC45FA7F7ACDB55B71F11006BFD04D3151D5649A45C7E5
                                      APIs
                                        • Part of subcall function 0043B314: _memset.LIBCMT ref: 0043B321
                                        • Part of subcall function 00420940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0043B2F0,?,?,?,0040100A), ref: 00420945
                                      • IsDebuggerPresent.KERNEL32(?,?,?,0040100A), ref: 0043B2F4
                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0040100A), ref: 0043B303
                                      Strings
                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0043B2FE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                      • API String ID: 3158253471-631824599
                                      • Opcode ID: 1d2e9604d48c8e7db41109c9ed8690ec6c36f65431277a35350cc55d3018cbc9
                                      • Instruction ID: 2b780658d3da49ad9f9e4503d56df9c93059da648c8d5ac8478d33f484e7c10e
                                      • Opcode Fuzzy Hash: 1d2e9604d48c8e7db41109c9ed8690ec6c36f65431277a35350cc55d3018cbc9
                                      • Instruction Fuzzy Hash: 02E06DB02007208BD720AF29E5047467AE4EF14308F00897EE856C7341EBB8E488CBA9
                                      APIs
                                      • GetSystemDirectoryW.KERNEL32(?), ref: 00441775
                                        • Part of subcall function 0047BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0044195E,?), ref: 0047BFFE
                                        • Part of subcall function 0047BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0047C010
                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0044196D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                      • String ID: WIN_XPe
                                      • API String ID: 582185067-3257408948
                                      • Opcode ID: cd0c0ee98bef79b6b26268ec6d9f30d16c8f849b6e89d9c1285d22aebae9f8a9
                                      • Instruction ID: bb4ba310a41a4012c5d7b41289f123801075eaf4a32cafaca36ef925e362631c
                                      • Opcode Fuzzy Hash: cd0c0ee98bef79b6b26268ec6d9f30d16c8f849b6e89d9c1285d22aebae9f8a9
                                      • Instruction Fuzzy Hash: 94F0ED70800109DFEB15DB91C988BEDBBF8BB08305F6404AAE112B21A0D7795F85DF6D
                                      APIs
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0048596E
                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00485981
                                        • Part of subcall function 00465244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004652BC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FindMessagePostSleepWindow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 529655941-2988720461
                                      • Opcode ID: c30adec0b07a884218d5cf888173a8ccc0fe4855ab8ef866e9007e4fb8d3fdf0
                                      • Instruction ID: ca05d0fa0a9a984355b188281ef6dce13dfdf23e4f1fed1ce80051eafa113064
                                      • Opcode Fuzzy Hash: c30adec0b07a884218d5cf888173a8ccc0fe4855ab8ef866e9007e4fb8d3fdf0
                                      • Instruction Fuzzy Hash: ABD0C931784311B6E664BB709C1BFDA6A14AB00B54F10083EB249AA5D1D9E4A804CB68
                                      APIs
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004859AE
                                      • PostMessageW.USER32(00000000), ref: 004859B5
                                        • Part of subcall function 00465244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004652BC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2115448989.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2115300986.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115592653.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115631617.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2115648180.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Requested Documentation.jbxd
                                      Similarity
                                      • API ID: FindMessagePostSleepWindow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 529655941-2988720461
                                      • Opcode ID: 305014c55dfefef85884ad9d924040b092605376d7e318b7535ddb12bf245ab0
                                      • Instruction ID: c45a3de35c9889c52fd4050a062c11b3627da7d2521aa26d3f92d5e5b640c988
                                      • Opcode Fuzzy Hash: 305014c55dfefef85884ad9d924040b092605376d7e318b7535ddb12bf245ab0
                                      • Instruction Fuzzy Hash: 2BD0C9317803117AE664BB709C0BFDA6614AB04B54F10083EB245AA5D1D9E4A804CB6C