Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FSRHC6mB16.exe

Overview

General Information

Sample name:FSRHC6mB16.exe
renamed because original name is a hash value
Original sample name:7c8209053ff4705b39dcd23318174fc4407eabc5bdc40f4babfd876f8d049bc5.exe
Analysis ID:1587611
MD5:515fd5f36230667c7060e83a5dd79abe
SHA1:35be32bbfbead2f6bbc48f9dcc7f675fba407676
SHA256:7c8209053ff4705b39dcd23318174fc4407eabc5bdc40f4babfd876f8d049bc5
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • FSRHC6mB16.exe (PID: 6816 cmdline: "C:\Users\user\Desktop\FSRHC6mB16.exe" MD5: 515FD5F36230667C7060E83A5DD79ABE)
    • RegSvcs.exe (PID: 5328 cmdline: "C:\Users\user\Desktop\FSRHC6mB16.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • FSRHC6mB16.exe (PID: 2476 cmdline: "C:\Users\user\Desktop\FSRHC6mB16.exe" MD5: 515FD5F36230667C7060E83A5DD79ABE)
      • RegSvcs.exe (PID: 6888 cmdline: "C:\Users\user\Desktop\FSRHC6mB16.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://beirutrest.com", "Username": "belogs@beirutrest.com", "Password": "9yXQ39wz(uL+"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.1725618785.0000000003770000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 7D 88 44 24 2B 88 44 24 2F B0 98 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 19 entries
          SourceRuleDescriptionAuthorStrings
          3.2.RegSvcs.exe.400000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x1300:$s3: 83 EC 38 53 B0 7D 88 44 24 2B 88 44 24 2F B0 98 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x1fdd0:$s5: delete[]
          • 0x1f288:$s6: constructor or from DllMain.
          3.2.RegSvcs.exe.50f0000.8.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            3.2.RegSvcs.exe.50f0000.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              3.2.RegSvcs.exe.50f0000.8.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                3.2.RegSvcs.exe.50f0000.8.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x3d14f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x3d1c1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3d24b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x3d2dd:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3d347:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3d3b9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3d44f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x3d4df:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                Click to see the 79 entries
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: FSRHC6mB16.exeAvira: detected
                Source: http://beirutrest.comAvira URL Cloud: Label: malware
                Source: 3.2.RegSvcs.exe.29b0ee8.4.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://beirutrest.com", "Username": "belogs@beirutrest.com", "Password": "9yXQ39wz(uL+"}
                Source: FSRHC6mB16.exeVirustotal: Detection: 71%Perma Link
                Source: FSRHC6mB16.exeReversingLabs: Detection: 87%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: FSRHC6mB16.exeJoe Sandbox ML: detected
                Source: FSRHC6mB16.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: FSRHC6mB16.exe, 00000000.00000003.1690563493.0000000004830000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000000.00000003.1690286085.0000000004690000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000002.00000003.1716398247.0000000004730000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000002.00000003.1714247016.0000000004730000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: FSRHC6mB16.exe, 00000000.00000003.1690563493.0000000004830000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000000.00000003.1690286085.0000000004690000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000002.00000003.1716398247.0000000004730000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000002.00000003.1714247016.0000000004730000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00452126
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,2_2_0045C999
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,2_2_00436ADE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00434BEE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,2_2_00436D2D
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00442E1F
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0045DD7C FindFirstFileW,FindClose,2_2_0045DD7C
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,2_2_0044BD29
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_00475FE5
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0044BF8D
                Source: global trafficTCP traffic: 192.168.2.4:62215 -> 1.1.1.1:53
                Source: Joe Sandbox ViewIP Address: 50.87.144.157 50.87.144.157
                Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0044289D InternetQueryDataAvailable,InternetReadFile,0_2_0044289D
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                Source: global trafficDNS traffic detected: DNS query: beirutrest.com
                Source: RegSvcs.exe, 00000003.00000002.4154145969.0000000002AAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://beirutrest.com
                Source: RegSvcs.exe, 00000003.00000002.4154145969.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: RegSvcs.exe, 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4154145969.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: RegSvcs.exe, 00000003.00000002.4154145969.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: RegSvcs.exe, 00000003.00000002.4154145969.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00459FFF
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00459FFF
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00459FFF OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_00459FFF
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00456354 GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,0_2_00456354
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C08E
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0047C08E SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_0047C08E

                System Summary

                barindex
                Source: 3.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 3.2.RegSvcs.exe.50f0000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.50f0000.8.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.FSRHC6mB16.exe.4340000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 2.2.FSRHC6mB16.exe.3770000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 3.2.RegSvcs.exe.29b0ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.29b0ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.260fc1e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.260fc1e.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.29b0ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.29b0ee8.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.50f0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.50f0000.8.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.260ed36.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.260ed36.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a35570.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a35570.7.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a36458.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a36458.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a35570.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a35570.7.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.260ed36.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.260ed36.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.260fc1e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.260fc1e.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a82b90.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a82b90.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.29b0000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.29b0000.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a36458.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a36458.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a82b90.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.3a82b90.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 3.2.RegSvcs.exe.29b0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 3.2.RegSvcs.exe.29b0000.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 00000002.00000002.1725618785.0000000003770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 00000000.00000002.1697552515.0000000004340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000003.00000002.4152085359.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00434D50: GetFullPathNameW,__swprintf,_wcslen,_wcslen,_wcslen,CreateDirectoryW,CreateFileW,_memset,_wcslen,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00434D50
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004461ED _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_004461ED
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,2_2_004364AA
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00409A400_2_00409A40
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004120380_2_00412038
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0047E1FA0_2_0047E1FA
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0041A46B0_2_0041A46B
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0041240C0_2_0041240C
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004045E00_2_004045E0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004128180_2_00412818
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0047CBF00_2_0047CBF0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0044EBBC0_2_0044EBBC
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00412C380_2_00412C38
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0044ED9A0_2_0044ED9A
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00424F700_2_00424F70
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0041AF0D0_2_0041AF0D
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004271610_2_00427161
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004212BE0_2_004212BE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004433900_2_00443390
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004433910_2_00443391
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0041D7500_2_0041D750
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004037E00_2_004037E0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004278590_2_00427859
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0040F8900_2_0040F890
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0042397B0_2_0042397B
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00411B630_2_00411B63
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00423EBF0_2_00423EBF
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_03F536400_2_03F53640
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00409A402_2_00409A40
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004120382_2_00412038
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0047E1FA2_2_0047E1FA
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0041A46B2_2_0041A46B
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0041240C2_2_0041240C
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004045E02_2_004045E0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004128182_2_00412818
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0047CBF02_2_0047CBF0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0044EBBC2_2_0044EBBC
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00412C382_2_00412C38
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0044ED9A2_2_0044ED9A
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00424F702_2_00424F70
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0041AF0D2_2_0041AF0D
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004271612_2_00427161
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004212BE2_2_004212BE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004433902_2_00443390
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004433912_2_00443391
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0041D7502_2_0041D750
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004037E02_2_004037E0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004278592_2_00427859
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0040F8902_2_0040F890
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0042397B2_2_0042397B
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00411B632_2_00411B63
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00423EBF2_2_00423EBF
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_03FE36402_2_03FE3640
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00408C603_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040DC113_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00407C3F3_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00418CCC3_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00406CA03_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004028B03_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041A4BE3_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00408C603_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004182443_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004016503_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402F203_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004193C43_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004187883_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402F893_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00402B903_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004073A03_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0280CB083_2_0280CB08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0280D7203_2_0280D720
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0280CE503_2_0280CE50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02800FD03_2_02800FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_028010303_2_02801030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05655EF83_2_05655EF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0565B9783_2_0565B978
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_056592503_2_05659250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0565EA583_2_0565EA58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_056556F03_2_056556F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0565F1B03_2_0565F1B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_056500403_2_05650040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_056500063_2_05650006
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063E52303_2_063E5230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063EA0003_2_063EA000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063E00403_2_063E0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063E61A83_2_063E61A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063E52213_2_063E5221
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063E83A83_2_063E83A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063E11303_2_063E1130
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_056573853_2_05657385
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 43 times
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: String function: 00425210 appears 56 times
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: String function: 00445975 appears 130 times
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: String function: 0041171A appears 74 times
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: String function: 0041832D appears 52 times
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: String function: 004136BC appears 36 times
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: String function: 004092C0 appears 50 times
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: String function: 0041718C appears 88 times
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: String function: 00401B70 appears 46 times
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: String function: 0040E6D0 appears 70 times
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: String function: 0043362D appears 38 times
                Source: FSRHC6mB16.exe, 00000000.00000003.1690563493.000000000495D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs FSRHC6mB16.exe
                Source: FSRHC6mB16.exe, 00000000.00000002.1697552515.0000000004340000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename2ee75d06-d489-4537-90fc-92fe0f559436.exe4 vs FSRHC6mB16.exe
                Source: FSRHC6mB16.exe, 00000000.00000003.1690286085.00000000047B3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs FSRHC6mB16.exe
                Source: FSRHC6mB16.exe, 00000002.00000003.1714778266.000000000485D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs FSRHC6mB16.exe
                Source: FSRHC6mB16.exe, 00000002.00000002.1725618785.0000000003770000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename2ee75d06-d489-4537-90fc-92fe0f559436.exe4 vs FSRHC6mB16.exe
                Source: FSRHC6mB16.exe, 00000002.00000003.1716398247.0000000004853000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs FSRHC6mB16.exe
                Source: FSRHC6mB16.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 3.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 3.2.RegSvcs.exe.50f0000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.50f0000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.FSRHC6mB16.exe.4340000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 2.2.FSRHC6mB16.exe.3770000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 3.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 3.2.RegSvcs.exe.29b0ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.29b0ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.260fc1e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.260fc1e.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.29b0ee8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.29b0ee8.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.50f0000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.50f0000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.260ed36.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.260ed36.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.3a35570.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3a35570.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.3a36458.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3a36458.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.3a35570.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3a35570.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.260ed36.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.260ed36.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.260fc1e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.260fc1e.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.3a82b90.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3a82b90.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.29b0000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.29b0000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.3a36458.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3a36458.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.3a82b90.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.3a82b90.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 3.2.RegSvcs.exe.29b0000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 3.2.RegSvcs.exe.29b0000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 00000002.00000002.1725618785.0000000003770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 00000000.00000002.1697552515.0000000004340000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000003.00000002.4152085359.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/1@2/2
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0044AF5C GetLastError,FormatMessageW,0_2_0044AF5C
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464422
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004364AA
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00464422 OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,2_2_00464422
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004364AA GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,2_2_004364AA
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0045D517 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D517
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0043701F CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,__wcsicoll,CloseHandle,0_2_0043701F
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0047A999 OleInitialize,CLSIDFromProgID,CoCreateInstance,CoInitializeSecurity,_memset,_wcslen,_memset,CoCreateInstanceEx,CoSetProxyBlanket,0_2_0047A999
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0043614F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043614F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeFile created: C:\Users\user\AppData\Local\Temp\derogatesJump to behavior
                Source: FSRHC6mB16.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: FSRHC6mB16.exeVirustotal: Detection: 71%
                Source: FSRHC6mB16.exeReversingLabs: Detection: 87%
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeFile read: C:\Users\user\Desktop\FSRHC6mB16.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\FSRHC6mB16.exe "C:\Users\user\Desktop\FSRHC6mB16.exe"
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\FSRHC6mB16.exe"
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeProcess created: C:\Users\user\Desktop\FSRHC6mB16.exe "C:\Users\user\Desktop\FSRHC6mB16.exe"
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\FSRHC6mB16.exe"
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\FSRHC6mB16.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeProcess created: C:\Users\user\Desktop\FSRHC6mB16.exe "C:\Users\user\Desktop\FSRHC6mB16.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\FSRHC6mB16.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: FSRHC6mB16.exeStatic file information: File size 1238119 > 1048576
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: wntdll.pdbUGP source: FSRHC6mB16.exe, 00000000.00000003.1690563493.0000000004830000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000000.00000003.1690286085.0000000004690000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000002.00000003.1716398247.0000000004730000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000002.00000003.1714247016.0000000004730000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: FSRHC6mB16.exe, 00000000.00000003.1690563493.0000000004830000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000000.00000003.1690286085.0000000004690000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000002.00000003.1716398247.0000000004730000.00000004.00001000.00020000.00000000.sdmp, FSRHC6mB16.exe, 00000002.00000003.1714247016.0000000004730000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
                Source: FSRHC6mB16.exeStatic PE information: real checksum: 0xa2135 should be: 0x13dec8
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004171D1 push ecx; ret 0_2_004171E4
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004171D1 push ecx; ret 2_2_004171E4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C40C push cs; iretd 3_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00423149 push eax; ret 3_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C50E push cs; iretd 3_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004231C8 push eax; ret 3_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040E21D push ecx; ret 3_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0041C6BE push ebx; ret 3_2_0041C6BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040BB97 push dword ptr [ecx-75h]; iretd 3_2_0040BBA3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05654061 push 5DFD1B48h; ret 3_2_05654079
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05654321 pushad ; iretd 3_2_05654335
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_004772DE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004772DE IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_004772DE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_004375B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004440780_2_00444078
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004440782_2_00444078
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeAPI/Special instruction interceptor: Address: 3F53264
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeAPI/Special instruction interceptor: Address: 3FE3264
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,3_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599636Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594884Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594745Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594516Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594406Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594297Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1683Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8143Jump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeAPI coverage: 3.2 %
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeAPI coverage: 3.2 %
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452126
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,0_2_0045C999
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,0_2_00436ADE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00434BEE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,0_2_00436D2D
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442E1F
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0045DD7C FindFirstFileW,FindClose,0_2_0045DD7C
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD29
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00475FE5
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8D
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00452126 FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00452126
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0045C999 FindFirstFileW,FindNextFileW,FindClose,2_2_0045C999
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00436ADE GetFileAttributesW,FindFirstFileW,FindClose,2_2_00436ADE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00434BEE FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00434BEE
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00436D2D FindFirstFileW,CreateFileW,SetFileTime,CloseHandle,SetFileTime,CloseHandle,2_2_00436D2D
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00442E1F SetCurrentDirectoryW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00442E1F
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0045DD7C FindFirstFileW,FindClose,2_2_0045DD7C
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0044BD29 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,2_2_0044BD29
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00475FE5 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_00475FE5
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0044BF8D _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0044BF8D
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599636Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594884Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594745Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594516Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594406Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594297Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593719Jump to behavior
                Source: FSRHC6mB16.exe, 00000002.00000002.1724815881.0000000000A98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630
                Source: RegSvcs.exe, 00000003.00000002.4155943555.0000000005003000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0045A259 BlockInput,0_2_0045A259
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,3_2_004019F0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0040EB70 LoadLibraryA,GetProcAddress,0_2_0040EB70
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_03F53530 mov eax, dword ptr fs:[00000030h]0_2_03F53530
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_03F534D0 mov eax, dword ptr fs:[00000030h]0_2_03F534D0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_03F51EB0 mov eax, dword ptr fs:[00000030h]0_2_03F51EB0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_03FE3530 mov eax, dword ptr fs:[00000030h]2_2_03FE3530
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_03FE34D0 mov eax, dword ptr fs:[00000030h]2_2_03FE34D0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_03FE1EB0 mov eax, dword ptr fs:[00000030h]2_2_03FE1EB0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00426DA1 CreateFileW,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00426DA1
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0042202E SetUnhandledExceptionFilter,0_2_0042202E
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004230F5
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00417D93
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00421FA7
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0042202E SetUnhandledExceptionFilter,2_2_0042202E
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004230F5 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004230F5
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00417D93 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00417D93
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_00421FA7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00421FA7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_004123F1 SetUnhandledExceptionFilter,3_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7C3008Jump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0043916A LogonUserW,0_2_0043916A
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0040D6D0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D6D0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004375B0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004375B0
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00436431 __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_00436431
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\FSRHC6mB16.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\FSRHC6mB16.exe"Jump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00445DD3 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00445DD3
                Source: FSRHC6mB16.exeBinary or memory string: Shell_TrayWnd
                Source: FSRHC6mB16.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_00410D10 cpuid 0_2_00410D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,3_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004223BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004223BC
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004711D2 GetUserNameW,0_2_004711D2
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0042039F __invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,0_2_0042039F
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0040E470 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0040E470
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 3.2.RegSvcs.exe.50f0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260fc1e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.50f0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260ed36.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a35570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a36458.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a35570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260ed36.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260fc1e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a82b90.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a36458.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a82b90.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4154145969.0000000002A84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4154145969.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6888, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.RegSvcs.exe.50f0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260fc1e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.50f0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260ed36.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a35570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a36458.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a35570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260ed36.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260fc1e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a82b90.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a36458.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a82b90.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: FSRHC6mB16.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 6, 0USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonestrwstrintbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoubleptrhwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----
                Source: FSRHC6mB16.exeBinary or memory string: WIN_XP
                Source: FSRHC6mB16.exeBinary or memory string: WIN_XPe
                Source: FSRHC6mB16.exeBinary or memory string: WIN_VISTA
                Source: FSRHC6mB16.exeBinary or memory string: WIN_7
                Source: Yara matchFile source: 3.2.RegSvcs.exe.50f0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260fc1e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.50f0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260ed36.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a35570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a36458.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a35570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260ed36.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260fc1e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a82b90.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a36458.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a82b90.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4154145969.0000000002A84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6888, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 3.2.RegSvcs.exe.50f0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260fc1e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.50f0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260ed36.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a35570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a36458.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a35570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260ed36.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260fc1e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a82b90.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a36458.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a82b90.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4154145969.0000000002A84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4154145969.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6888, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.RegSvcs.exe.50f0000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0ee8.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260fc1e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0ee8.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.50f0000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260ed36.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a35570.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a36458.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a35570.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260ed36.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.260fc1e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a82b90.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a36458.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.3a82b90.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegSvcs.exe.29b0000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_004741BB
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,0_2_0046483C
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 0_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0047AD92
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_004741BB socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_004741BB
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0046483C socket,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,closesocket,2_2_0046483C
                Source: C:\Users\user\Desktop\FSRHC6mB16.exeCode function: 2_2_0047AD92 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,2_2_0047AD92
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS148
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                2
                Valid Accounts
                LSA Secrets341
                Security Software Discovery
                SSH2
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                Virtualization/Sandbox Evasion
                Cached Domain Credentials121
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                Access Token Manipulation
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                Process Injection
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587611 Sample: FSRHC6mB16.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 24 beirutrest.com 2->24 26 api.ipify.org 2->26 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus detection for URL or domain 2->40 42 6 other signatures 2->42 8 FSRHC6mB16.exe 1 2->8         started        signatures3 process4 signatures5 44 Switches to a custom stack to bypass stack traces 8->44 46 Contains functionality to detect sleep reduction / modifications 8->46 11 FSRHC6mB16.exe 8->11         started        14 RegSvcs.exe 8->14         started        process6 signatures7 48 Writes to foreign memory regions 11->48 50 Maps a DLL or memory area into another process 11->50 16 RegSvcs.exe 15 2 11->16         started        52 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->52 process8 dnsIp9 20 beirutrest.com 50.87.144.157, 21, 49731 UNIFIEDLAYER-AS-1US United States 16->20 22 api.ipify.org 172.67.74.152, 443, 49730 CLOUDFLARENETUS United States 16->22 28 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->28 30 Tries to steal Mail credentials (via file / registry access) 16->30 32 Tries to harvest and steal ftp login credentials 16->32 34 Tries to harvest and steal browser information (history, passwords, etc) 16->34 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                FSRHC6mB16.exe71%VirustotalBrowse
                FSRHC6mB16.exe88%ReversingLabsWin32.Trojan.AutoitInject
                FSRHC6mB16.exe100%AviraTR/AD.GenSteal.jktys
                FSRHC6mB16.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://beirutrest.com100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                beirutrest.com
                50.87.144.157
                truetrue
                  unknown
                  api.ipify.org
                  172.67.74.152
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.orgRegSvcs.exe, 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4154145969.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmpfalse
                        high
                        https://account.dyn.com/RegSvcs.exe, 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          https://api.ipify.org/tRegSvcs.exe, 00000003.00000002.4154145969.0000000002A31000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000003.00000002.4154145969.0000000002A31000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://beirutrest.comRegSvcs.exe, 00000003.00000002.4154145969.0000000002AAF000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              50.87.144.157
                              beirutrest.comUnited States
                              46606UNIFIEDLAYER-AS-1UStrue
                              172.67.74.152
                              api.ipify.orgUnited States
                              13335CLOUDFLARENETUSfalse
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1587611
                              Start date and time:2025-01-10 15:42:30 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 8m 49s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:8
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:FSRHC6mB16.exe
                              renamed because original name is a hash value
                              Original Sample Name:7c8209053ff4705b39dcd23318174fc4407eabc5bdc40f4babfd876f8d049bc5.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@7/1@2/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 97%
                              • Number of executed functions: 43
                              • Number of non-executed functions: 315
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              09:43:28API Interceptor11017884x Sleep call for process: RegSvcs.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              50.87.144.1579pIm5d0rsW.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                KASHI SHIP PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                  0wxckB4Iba.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    pR65xo6sud.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      ship's particulars-TBN.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                        Packing List - SAPPHIRE X.xlsx.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                          WOOYANG VENUS PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                            CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              MV BBG MUARA Ship's Particulars.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                CHARIKLIA JUNIOR DETAILS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                  172.67.74.152jgbC220X2U.exeGet hashmaliciousUnknownBrowse
                                                  • api.ipify.org/?format=text
                                                  malware.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                                                  • api.ipify.org/
                                                  Simple1.exeGet hashmaliciousUnknownBrowse
                                                  • api.ipify.org/
                                                  Simple2.exeGet hashmaliciousUnknownBrowse
                                                  • api.ipify.org/
                                                  systemConfigChecker.exeGet hashmaliciousUnknownBrowse
                                                  • api.ipify.org/
                                                  systemConfigChecker.exeGet hashmaliciousUnknownBrowse
                                                  • api.ipify.org/
                                                  2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                                  • api.ipify.org/
                                                  Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
                                                  • api.ipify.org/
                                                  67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                                                  • api.ipify.org/
                                                  Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                  • api.ipify.org/
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  beirutrest.com9pIm5d0rsW.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 50.87.144.157
                                                  KASHI SHIP PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 50.87.144.157
                                                  0wxckB4Iba.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 50.87.144.157
                                                  pR65xo6sud.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 50.87.144.157
                                                  ship's particulars-TBN.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 50.87.144.157
                                                  Packing List - SAPPHIRE X.xlsx.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 50.87.144.157
                                                  WOOYANG VENUS PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 50.87.144.157
                                                  CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 50.87.144.157
                                                  MV BBG MUARA Ship's Particulars.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 50.87.144.157
                                                  CHARIKLIA JUNIOR DETAILS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 50.87.144.157
                                                  api.ipify.org9pIm5d0rsW.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 104.26.13.205
                                                  VYLigyTDuW.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 172.67.74.152
                                                  gem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                  • 104.26.12.205
                                                  https://www.tremendous.com/email/activate/yE_yBdRtyVv4Xqgg7hu_Get hashmaliciousUnknownBrowse
                                                  • 172.67.74.152
                                                  https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                  • 172.67.74.152
                                                  drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                  • 172.67.74.152
                                                  https://vq6btbhdpo.nutignaera.shop/?email=YWxlamFuZHJvLmdhcnJpZG9Ac2VhYm9hcmRtYXJpbmUuY29tGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                  • 104.26.12.205
                                                  EZZGTmJj4O.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 104.26.13.205
                                                  proforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 104.26.12.205
                                                  mail (4).emlGet hashmaliciousUnknownBrowse
                                                  • 172.67.74.152
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  UNIFIEDLAYER-AS-1US9pIm5d0rsW.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 50.87.144.157
                                                  armv6l.elfGet hashmaliciousUnknownBrowse
                                                  • 76.162.166.146
                                                  https://sacredartscommunications.com/Get hashmaliciousHTMLPhisherBrowse
                                                  • 192.185.25.242
                                                  http://abdullaksa.com/fetching//index.xml#?email=Z2xhbGlja2VyQGhpbGNvcnAuY29tGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                  • 192.185.118.129
                                                  5.elfGet hashmaliciousUnknownBrowse
                                                  • 162.144.117.236
                                                  https://p3rsa.appdocumentcenter.com/BpdLOGet hashmaliciousHTMLPhisherBrowse
                                                  • 162.241.149.91
                                                  https://app.whirr.co/p/cm4711if90205nv0h2e4l0imuGet hashmaliciousUnknownBrowse
                                                  • 162.241.149.91
                                                  Fantazy.mips.elfGet hashmaliciousUnknownBrowse
                                                  • 142.7.14.49
                                                  ReIayMSG__polarisrx.com_#7107380109.htmGet hashmaliciousHTMLPhisherBrowse
                                                  • 162.241.149.91
                                                  ReIayMSG__polarisrx.com_#6577807268.htmGet hashmaliciousHTMLPhisherBrowse
                                                  • 162.241.149.91
                                                  CLOUDFLARENETUS9pIm5d0rsW.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 104.26.13.205
                                                  B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.32.1
                                                  VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 104.21.80.1
                                                  VYLigyTDuW.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 172.67.74.152
                                                  bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 104.21.80.1
                                                  PO-0005082025 pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                  • 172.67.131.144
                                                  zrNcqxZRSM.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                  • 188.114.96.3
                                                  Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                  • 104.21.48.1
                                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.96.1
                                                  http://www.lpb.gov.lrGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                  • 104.17.25.14
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  3b5074b1b5d032e5620f69f9f700ff0e9pIm5d0rsW.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 172.67.74.152
                                                  B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 172.67.74.152
                                                  VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 172.67.74.152
                                                  VYLigyTDuW.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 172.67.74.152
                                                  QUOTATION-9044456778.pdf (83kb).com.exeGet hashmaliciousPureLog Stealer, QuasarBrowse
                                                  • 172.67.74.152
                                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 172.67.74.152
                                                  https://sign.zoho.com/zsguest?locale=en&sign_id=234b4d535f4956237c699124bb06f6840075804affff79070f72fbd27ec4885c3a2ba06657b8a52338eb80052baee9f74c4e2e0e7f85c073df939f1ac4dff75f76c95d46ac2361c7b14335e4f12c5c5d49c49b1d2f4c838a&action_type=SIGNGet hashmaliciousUnknownBrowse
                                                  • 172.67.74.152
                                                  IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 172.67.74.152
                                                  XClient.exeGet hashmaliciousXWormBrowse
                                                  • 172.67.74.152
                                                  No context
                                                  Process:C:\Users\user\Desktop\FSRHC6mB16.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):267264
                                                  Entropy (8bit):7.884875237870344
                                                  Encrypted:false
                                                  SSDEEP:6144:Q7h609juY90pXH6BMRDA0GiWNXa7rOykn45Z4PHPbw:Q7ogqYqRoMNA0Gi57Svn45ZIjw
                                                  MD5:B668F5B50DD3A2A3AFCEFACFED692B42
                                                  SHA1:1F17DA55F9EC35CA31A179ABCA772DDA20BA2130
                                                  SHA-256:E54A764EB3A45CE92FA6CB290DCA5452240E1E73FED5321D2384D6D77F30B8D7
                                                  SHA-512:E1DD4B16F702D346D748564DA611842DDF80F0C37B04D99C2CA0F67C5FC2BB4AD47756F9B88F863D4E922395F039438DA8246AC7F444E89D74826C1E84CA7118
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:u..Z67E7I7XN..2J.8OXZ57EwM7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M.XNX]-.J8.Q...D{...&1 .:6W(*;X.&V#Y7:x1Wj6M!x3[..x..5!<6.GI2kXZ57E7M_H.u.C.:.>.$.F.I..'0g".4O..&qD.;.<.&.).LxgV1D+.Iw.$I.?.-.i?Fb).Ke,T%.).&S2JD8OXZ57E7M7XN6../D8OX.p7E{L3X:.SbJD8OXZ57.7n6SOQS2.E8O X57E7M..NXS"JD8.YZ57.7M'XNXQ2JA8OXZ57E2M7XNXS2J$<OX^57..O7ZNX.2JT8OHZ57E'M7HNXS2JD(OXZ57E7M7XN.F0J.8OXZU5E..6XNXS2JD8OXZ57E7M7XNXS2JD8..[5+E7M7XNXS2JD8OXZ57E7M7XNXS2J.5MX.57E7M7XNXS2J.9O.[57E7M7XNXS2JD8OXZ57E7M7XNX}F/<LOXZ-.D7M'XNX.3JD<OXZ57E7M7XNXS2jD8/v(QV1VM7.#XS2.E8O6Z57.6M7XNXS2JD8OXZu7EwcS9:9S2J..OXZ.5E7[7XNRQ2JD8OXZ57E7M7.NX..87J,XZ5..6M78LXS.KD8oZZ57E7M7XNXS2J.8O.Z57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS2JD8OXZ57E7M7XNXS
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.4910028754606826
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 95.11%
                                                  • AutoIt3 compiled script executable (510682/80) 4.86%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:FSRHC6mB16.exe
                                                  File size:1'238'119 bytes
                                                  MD5:515fd5f36230667c7060e83a5dd79abe
                                                  SHA1:35be32bbfbead2f6bbc48f9dcc7f675fba407676
                                                  SHA256:7c8209053ff4705b39dcd23318174fc4407eabc5bdc40f4babfd876f8d049bc5
                                                  SHA512:b92d710020eaf708d32f6576bb81e64bf9c69776eef6279963dd933bde47d6f014930f5d5f52437e9b7c7aed1fedfce7be433e454df6e1487fb7a50a20adab84
                                                  SSDEEP:24576:FfmMv6Ckr7Mny5QiXx5j0HjXqiYCOvjF6PPt:F3v+7/5QiXx5j0Hj6iYCOLSt
                                                  TLSH:5845F152B3D780B6E9A33971197BE32BEB3575194323C48BA7E02F768F111409B36762
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
                                                  Icon Hash:33084d2634000616
                                                  Entrypoint:0x416310
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:0
                                                  File Version Major:5
                                                  File Version Minor:0
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:0
                                                  Import Hash:aaaa8913c89c8aa4a5d93f06853894da
                                                  Instruction
                                                  call 00007F82651B98FCh
                                                  jmp 00007F82651AD6CEh
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  int3
                                                  push ebp
                                                  mov ebp, esp
                                                  push edi
                                                  push esi
                                                  mov esi, dword ptr [ebp+0Ch]
                                                  mov ecx, dword ptr [ebp+10h]
                                                  mov edi, dword ptr [ebp+08h]
                                                  mov eax, ecx
                                                  mov edx, ecx
                                                  add eax, esi
                                                  cmp edi, esi
                                                  jbe 00007F82651AD85Ah
                                                  cmp edi, eax
                                                  jc 00007F82651AD9FAh
                                                  cmp ecx, 00000100h
                                                  jc 00007F82651AD871h
                                                  cmp dword ptr [004A94E0h], 00000000h
                                                  je 00007F82651AD868h
                                                  push edi
                                                  push esi
                                                  and edi, 0Fh
                                                  and esi, 0Fh
                                                  cmp edi, esi
                                                  pop esi
                                                  pop edi
                                                  jne 00007F82651AD85Ah
                                                  pop esi
                                                  pop edi
                                                  pop ebp
                                                  jmp 00007F82651ADCBAh
                                                  test edi, 00000003h
                                                  jne 00007F82651AD867h
                                                  shr ecx, 02h
                                                  and edx, 03h
                                                  cmp ecx, 08h
                                                  jc 00007F82651AD87Ch
                                                  rep movsd
                                                  jmp dword ptr [00416494h+edx*4]
                                                  nop
                                                  mov eax, edi
                                                  mov edx, 00000003h
                                                  sub ecx, 04h
                                                  jc 00007F82651AD85Eh
                                                  and eax, 03h
                                                  add ecx, eax
                                                  jmp dword ptr [004163A8h+eax*4]
                                                  jmp dword ptr [004164A4h+ecx*4]
                                                  nop
                                                  jmp dword ptr [00416428h+ecx*4]
                                                  nop
                                                  mov eax, E4004163h
                                                  arpl word ptr [ecx+00h], ax
                                                  or byte ptr [ecx+eax*2+00h], ah
                                                  and edx, ecx
                                                  mov al, byte ptr [esi]
                                                  mov byte ptr [edi], al
                                                  mov al, byte ptr [esi+01h]
                                                  mov byte ptr [edi+01h], al
                                                  mov al, byte ptr [esi+02h]
                                                  shr ecx, 02h
                                                  mov byte ptr [edi+02h], al
                                                  add esi, 03h
                                                  add edi, 03h
                                                  cmp ecx, 08h
                                                  jc 00007F82651AD81Eh
                                                  Programming Language:
                                                  • [ASM] VS2008 SP1 build 30729
                                                  • [ C ] VS2008 SP1 build 30729
                                                  • [C++] VS2008 SP1 build 30729
                                                  • [ C ] VS2005 build 50727
                                                  • [IMP] VS2005 build 50727
                                                  • [ASM] VS2008 build 21022
                                                  • [RES] VS2008 build 21022
                                                  • [LNK] VS2008 SP1 build 30729
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x51a0.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0xab0000x51a00x5200ba5fe9160de65d2b5b8e75f0e379b447False0.5600228658536586data6.021864101423198IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0xab4480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                  RT_ICON0xab5700x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                  RT_ICON0xab6980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                  RT_ICON0xab7c00x22ddPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain0.9127170868347338
                                                  RT_MENU0xadaa00x50dataEnglishGreat Britain0.9
                                                  RT_DIALOG0xadaf00xfcdataEnglishGreat Britain0.6507936507936508
                                                  RT_STRING0xadbf00x530dataEnglishGreat Britain0.33960843373493976
                                                  RT_STRING0xae1200x690dataEnglishGreat Britain0.26964285714285713
                                                  RT_STRING0xae7b00x43adataEnglishGreat Britain0.3733826247689464
                                                  RT_STRING0xaebf00x5fcdataEnglishGreat Britain0.3087467362924282
                                                  RT_STRING0xaf1f00x65cdataEnglishGreat Britain0.34336609336609336
                                                  RT_STRING0xaf8500x388dataEnglishGreat Britain0.377212389380531
                                                  RT_STRING0xafbd80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                                  RT_GROUP_ICON0xafd300x14dataEnglishGreat Britain1.2
                                                  RT_GROUP_ICON0xafd480x14dataEnglishGreat Britain1.15
                                                  RT_GROUP_ICON0xafd600x14dataEnglishGreat Britain1.25
                                                  RT_GROUP_ICON0xafd780x14dataEnglishGreat Britain1.25
                                                  RT_VERSION0xafd900x19cdataEnglishGreat Britain0.5339805825242718
                                                  RT_MANIFEST0xaff300x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                                  DLLImport
                                                  WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                                  VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                  COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                                  MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                                  WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                                  PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                                  USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                                  KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
                                                  USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
                                                  GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
                                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                  ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
                                                  SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                  ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
                                                  OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
                                                  Language of compilation systemCountry where language is spokenMap
                                                  EnglishGreat Britain
                                                  EnglishUnited States
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 10, 2025 15:43:27.955303907 CET49730443192.168.2.4172.67.74.152
                                                  Jan 10, 2025 15:43:27.955354929 CET44349730172.67.74.152192.168.2.4
                                                  Jan 10, 2025 15:43:27.955447912 CET49730443192.168.2.4172.67.74.152
                                                  Jan 10, 2025 15:43:27.965122938 CET49730443192.168.2.4172.67.74.152
                                                  Jan 10, 2025 15:43:27.965140104 CET44349730172.67.74.152192.168.2.4
                                                  Jan 10, 2025 15:43:28.445020914 CET44349730172.67.74.152192.168.2.4
                                                  Jan 10, 2025 15:43:28.445106030 CET49730443192.168.2.4172.67.74.152
                                                  Jan 10, 2025 15:43:28.450115919 CET49730443192.168.2.4172.67.74.152
                                                  Jan 10, 2025 15:43:28.450134993 CET44349730172.67.74.152192.168.2.4
                                                  Jan 10, 2025 15:43:28.450483084 CET44349730172.67.74.152192.168.2.4
                                                  Jan 10, 2025 15:43:28.494761944 CET49730443192.168.2.4172.67.74.152
                                                  Jan 10, 2025 15:43:28.521514893 CET49730443192.168.2.4172.67.74.152
                                                  Jan 10, 2025 15:43:28.567332983 CET44349730172.67.74.152192.168.2.4
                                                  Jan 10, 2025 15:43:28.631663084 CET44349730172.67.74.152192.168.2.4
                                                  Jan 10, 2025 15:43:28.631715059 CET44349730172.67.74.152192.168.2.4
                                                  Jan 10, 2025 15:43:28.631772995 CET49730443192.168.2.4172.67.74.152
                                                  Jan 10, 2025 15:43:28.707649946 CET49730443192.168.2.4172.67.74.152
                                                  Jan 10, 2025 15:43:29.580296040 CET4973121192.168.2.450.87.144.157
                                                  Jan 10, 2025 15:43:29.585196018 CET214973150.87.144.157192.168.2.4
                                                  Jan 10, 2025 15:43:29.585575104 CET4973121192.168.2.450.87.144.157
                                                  Jan 10, 2025 15:43:29.590764999 CET4973121192.168.2.450.87.144.157
                                                  Jan 10, 2025 15:43:29.595690966 CET214973150.87.144.157192.168.2.4
                                                  Jan 10, 2025 15:43:29.596956968 CET4973121192.168.2.450.87.144.157
                                                  Jan 10, 2025 15:43:42.330334902 CET6221553192.168.2.41.1.1.1
                                                  Jan 10, 2025 15:43:42.335128069 CET53622151.1.1.1192.168.2.4
                                                  Jan 10, 2025 15:43:42.335196972 CET6221553192.168.2.41.1.1.1
                                                  Jan 10, 2025 15:43:42.340156078 CET53622151.1.1.1192.168.2.4
                                                  Jan 10, 2025 15:43:42.803039074 CET6221553192.168.2.41.1.1.1
                                                  Jan 10, 2025 15:43:42.808084965 CET53622151.1.1.1192.168.2.4
                                                  Jan 10, 2025 15:43:42.808146000 CET6221553192.168.2.41.1.1.1
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 10, 2025 15:43:27.942811012 CET6485653192.168.2.41.1.1.1
                                                  Jan 10, 2025 15:43:27.949537992 CET53648561.1.1.1192.168.2.4
                                                  Jan 10, 2025 15:43:29.288667917 CET4960453192.168.2.41.1.1.1
                                                  Jan 10, 2025 15:43:29.579404116 CET53496041.1.1.1192.168.2.4
                                                  Jan 10, 2025 15:43:42.329866886 CET53503091.1.1.1192.168.2.4
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jan 10, 2025 15:43:27.942811012 CET192.168.2.41.1.1.10x9e48Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                  Jan 10, 2025 15:43:29.288667917 CET192.168.2.41.1.1.10x1c65Standard query (0)beirutrest.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jan 10, 2025 15:43:27.949537992 CET1.1.1.1192.168.2.40x9e48No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 15:43:27.949537992 CET1.1.1.1192.168.2.40x9e48No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 15:43:27.949537992 CET1.1.1.1192.168.2.40x9e48No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 15:43:29.579404116 CET1.1.1.1192.168.2.40x1c65No error (0)beirutrest.com50.87.144.157A (IP address)IN (0x0001)false
                                                  • api.ipify.org
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.449730172.67.74.1524436888C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-10 14:43:28 UTC155OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                  Host: api.ipify.org
                                                  Connection: Keep-Alive
                                                  2025-01-10 14:43:28 UTC424INHTTP/1.1 200 OK
                                                  Date: Fri, 10 Jan 2025 14:43:28 GMT
                                                  Content-Type: text/plain
                                                  Content-Length: 12
                                                  Connection: close
                                                  Vary: Origin
                                                  CF-Cache-Status: DYNAMIC
                                                  Server: cloudflare
                                                  CF-RAY: 8ffd70878a41435c-EWR
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1704&min_rtt=1693&rtt_var=657&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1636771&cwnd=249&unsent_bytes=0&cid=c281f72fe36acd50&ts=198&x=0"
                                                  2025-01-10 14:43:28 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                  Data Ascii: 8.46.123.189


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:09:43:21
                                                  Start date:10/01/2025
                                                  Path:C:\Users\user\Desktop\FSRHC6mB16.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\FSRHC6mB16.exe"
                                                  Imagebase:0x400000
                                                  File size:1'238'119 bytes
                                                  MD5 hash:515FD5F36230667C7060E83A5DD79ABE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1697552515.0000000004340000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:09:43:23
                                                  Start date:10/01/2025
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\Desktop\FSRHC6mB16.exe"
                                                  Imagebase:0x2e0000
                                                  File size:45'984 bytes
                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:09:43:23
                                                  Start date:10/01/2025
                                                  Path:C:\Users\user\Desktop\FSRHC6mB16.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\FSRHC6mB16.exe"
                                                  Imagebase:0x400000
                                                  File size:1'238'119 bytes
                                                  MD5 hash:515FD5F36230667C7060E83A5DD79ABE
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.1725618785.0000000003770000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:09:43:25
                                                  Start date:10/01/2025
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\FSRHC6mB16.exe"
                                                  Imagebase:0x4e0000
                                                  File size:45'984 bytes
                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4153390359.00000000025CE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000003.00000002.4153938509.00000000029B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4155463966.0000000003A31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4154145969.0000000002A84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4154145969.0000000002A84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4154145969.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000003.00000002.4152085359.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000003.00000002.4156389211.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                  Reputation:high
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:3.2%
                                                    Dynamic/Decrypted Code Coverage:1.1%
                                                    Signature Coverage:3.1%
                                                    Total number of Nodes:1693
                                                    Total number of Limit Nodes:41
                                                    execution_graph 83094 4444e4 83099 40d900 83094->83099 83096 4444ee 83103 43723d 83096->83103 83098 444504 83100 40d917 83099->83100 83101 40d909 83099->83101 83100->83101 83102 40d91c CloseHandle 83100->83102 83101->83096 83102->83096 83104 40d900 CloseHandle 83103->83104 83105 437247 moneypunct 83104->83105 83105->83098 83106 4161c2 83107 4161d3 83106->83107 83141 41aa31 HeapCreate 83107->83141 83110 416212 83143 416e29 GetModuleHandleW 83110->83143 83114 416223 __RTC_Initialize 83177 41b669 83114->83177 83117 416231 83118 41623d GetCommandLineW 83117->83118 83246 4117af 67 API calls 3 library calls 83117->83246 83192 42235f GetEnvironmentStringsW 83118->83192 83121 41623c 83121->83118 83122 41624c 83198 4222b1 GetModuleFileNameW 83122->83198 83124 416256 83125 416261 83124->83125 83247 4117af 67 API calls 3 library calls 83124->83247 83202 422082 83125->83202 83129 416272 83215 41186e 83129->83215 83132 416279 83134 416284 __wwincmdln 83132->83134 83249 4117af 67 API calls 3 library calls 83132->83249 83221 40d7f0 83134->83221 83137 4162b3 83251 411a4b 67 API calls _doexit 83137->83251 83140 4162b8 _raise 83142 416206 83141->83142 83142->83110 83244 41616a 67 API calls 3 library calls 83142->83244 83144 416e44 83143->83144 83145 416e3d 83143->83145 83146 416fac 83144->83146 83147 416e4e GetProcAddress GetProcAddress GetProcAddress GetProcAddress 83144->83147 83252 41177f Sleep GetModuleHandleW 83145->83252 83282 416ad5 70 API calls 2 library calls 83146->83282 83150 416e97 TlsAlloc 83147->83150 83149 416e43 83149->83144 83153 416218 83150->83153 83154 416ee5 TlsSetValue 83150->83154 83153->83114 83245 41616a 67 API calls 3 library calls 83153->83245 83154->83153 83155 416ef6 83154->83155 83253 411a69 6 API calls 4 library calls 83155->83253 83157 416efb 83254 41696e TlsGetValue 83157->83254 83160 41696e __encode_pointer 6 API calls 83161 416f16 83160->83161 83162 41696e __encode_pointer 6 API calls 83161->83162 83163 416f26 83162->83163 83164 41696e __encode_pointer 6 API calls 83163->83164 83165 416f36 83164->83165 83264 41828b InitializeCriticalSectionAndSpinCount ___lock_fhandle 83165->83264 83167 416f43 83167->83146 83265 4169e9 TlsGetValue 83167->83265 83172 4169e9 __decode_pointer 6 API calls 83173 416f8a 83172->83173 83173->83146 83174 416f91 83173->83174 83281 416b12 67 API calls 5 library calls 83174->83281 83176 416f99 GetCurrentThreadId 83176->83153 83395 41718c 83177->83395 83179 41b675 GetStartupInfoA 83180 416ffb __calloc_crt 67 API calls 83179->83180 83187 41b696 83180->83187 83181 41b8b4 _raise 83181->83117 83182 41b831 GetStdHandle 83186 41b7fb 83182->83186 83183 41b896 SetHandleCount 83183->83181 83184 416ffb __calloc_crt 67 API calls 83184->83187 83185 41b843 GetFileType 83185->83186 83186->83181 83186->83182 83186->83183 83186->83185 83397 4189e6 InitializeCriticalSectionAndSpinCount _raise 83186->83397 83187->83181 83187->83184 83187->83186 83188 41b77e 83187->83188 83188->83181 83188->83186 83189 41b7a7 GetFileType 83188->83189 83396 4189e6 InitializeCriticalSectionAndSpinCount _raise 83188->83396 83189->83188 83193 422370 83192->83193 83194 422374 83192->83194 83193->83122 83195 416fb6 __malloc_crt 67 API calls 83194->83195 83196 422395 _realloc 83195->83196 83197 42239c FreeEnvironmentStringsW 83196->83197 83197->83122 83200 4222e6 _wparse_cmdline 83198->83200 83199 422329 _wparse_cmdline 83199->83124 83200->83199 83201 416fb6 __malloc_crt 67 API calls 83200->83201 83201->83199 83203 42209a _wcslen 83202->83203 83207 416267 83202->83207 83204 416ffb __calloc_crt 67 API calls 83203->83204 83210 4220be _wcslen 83204->83210 83205 422123 83206 413a88 __getptd_noexit 67 API calls 83205->83206 83206->83207 83207->83129 83248 4117af 67 API calls 3 library calls 83207->83248 83208 416ffb __calloc_crt 67 API calls 83208->83210 83209 422149 83211 413a88 __getptd_noexit 67 API calls 83209->83211 83210->83205 83210->83207 83210->83208 83210->83209 83213 422108 83210->83213 83398 426349 67 API calls _raise 83210->83398 83211->83207 83213->83210 83399 417d93 10 API calls 3 library calls 83213->83399 83216 41187c __IsNonwritableInCurrentImage 83215->83216 83400 418486 83216->83400 83218 41189a __initterm_e 83220 4118b9 __IsNonwritableInCurrentImage __initterm 83218->83220 83404 411421 83218->83404 83220->83132 83222 431bcb 83221->83222 83223 40d80c 83221->83223 83448 4092c0 83223->83448 83225 40d847 83452 40eb50 83225->83452 83228 40d877 83455 411ac6 67 API calls 4 library calls 83228->83455 83231 40d888 83456 411b24 67 API calls _raise 83231->83456 83233 40d891 83457 40f370 SystemParametersInfoW SystemParametersInfoW 83233->83457 83235 40d89f 83458 40d6d0 GetCurrentDirectoryW 83235->83458 83237 40d8a7 SystemParametersInfoW 83238 40d8d4 83237->83238 83239 40d8cd FreeLibrary 83237->83239 83240 4092c0 VariantClear 83238->83240 83239->83238 83241 40d8dd 83240->83241 83242 4092c0 VariantClear 83241->83242 83243 40d8e6 83242->83243 83243->83137 83250 411a1f 67 API calls _doexit 83243->83250 83244->83110 83245->83114 83246->83121 83247->83125 83248->83129 83249->83134 83250->83137 83251->83140 83252->83149 83253->83157 83255 4169a7 GetModuleHandleW 83254->83255 83256 416986 83254->83256 83258 4169c2 GetProcAddress 83255->83258 83259 4169b7 83255->83259 83256->83255 83257 416990 TlsGetValue 83256->83257 83261 41699b 83257->83261 83263 41699f 83258->83263 83283 41177f Sleep GetModuleHandleW 83259->83283 83261->83255 83261->83263 83262 4169bd 83262->83258 83262->83263 83263->83160 83264->83167 83266 416a01 83265->83266 83267 416a22 GetModuleHandleW 83265->83267 83266->83267 83268 416a0b TlsGetValue 83266->83268 83269 416a32 83267->83269 83270 416a3d GetProcAddress 83267->83270 83273 416a16 83268->83273 83284 41177f Sleep GetModuleHandleW 83269->83284 83271 416a1a 83270->83271 83271->83146 83275 416ffb 83271->83275 83273->83267 83273->83271 83274 416a38 83274->83270 83274->83271 83277 417004 83275->83277 83278 416f70 83277->83278 83279 417022 Sleep 83277->83279 83285 422452 83277->83285 83278->83146 83278->83172 83280 417037 83279->83280 83280->83277 83280->83278 83281->83176 83282->83153 83283->83262 83284->83274 83286 42245e _raise 83285->83286 83287 422476 83286->83287 83297 422495 _memset 83286->83297 83298 417f23 67 API calls __getptd_noexit 83287->83298 83289 42247b 83299 417ebb 6 API calls 2 library calls 83289->83299 83291 422507 HeapAlloc 83291->83297 83292 42248b _raise 83292->83277 83297->83291 83297->83292 83300 418407 83297->83300 83307 41a74c 5 API calls 2 library calls 83297->83307 83308 42254e LeaveCriticalSection _doexit 83297->83308 83309 411afc 6 API calls __decode_pointer 83297->83309 83298->83289 83301 41841c 83300->83301 83302 41842f EnterCriticalSection 83300->83302 83310 418344 83301->83310 83302->83297 83304 418422 83304->83302 83338 4117af 67 API calls 3 library calls 83304->83338 83306 41842e 83306->83302 83307->83297 83308->83297 83309->83297 83311 418350 _raise 83310->83311 83312 418360 83311->83312 83313 418378 83311->83313 83339 418252 67 API calls 2 library calls 83312->83339 83322 418386 _raise 83313->83322 83342 416fb6 83313->83342 83316 418365 83340 4180a7 67 API calls 7 library calls 83316->83340 83319 41836c 83341 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 83319->83341 83320 4183a7 83325 418407 __lock 67 API calls 83320->83325 83321 418398 83348 417f23 67 API calls __getptd_noexit 83321->83348 83322->83304 83327 4183ae 83325->83327 83328 4183e2 83327->83328 83329 4183b6 83327->83329 83330 413a88 __getptd_noexit 67 API calls 83328->83330 83349 4189e6 InitializeCriticalSectionAndSpinCount _raise 83329->83349 83333 4183d3 83330->83333 83332 4183c1 83332->83333 83350 413a88 83332->83350 83364 4183fe LeaveCriticalSection _doexit 83333->83364 83336 4183cd 83363 417f23 67 API calls __getptd_noexit 83336->83363 83338->83306 83339->83316 83340->83319 83345 416fbf 83342->83345 83344 416ff5 83344->83320 83344->83321 83345->83344 83346 416fd6 Sleep 83345->83346 83365 4138ba 83345->83365 83347 416feb 83346->83347 83347->83344 83347->83345 83348->83322 83349->83332 83351 413a94 _raise 83350->83351 83352 413ad3 83351->83352 83354 418407 __lock 65 API calls 83351->83354 83355 413b0d _raise _realloc 83351->83355 83353 413ae8 RtlFreeHeap 83352->83353 83352->83355 83353->83355 83356 413afa 83353->83356 83357 413aab ___sbh_find_block 83354->83357 83355->83336 83394 417f23 67 API calls __getptd_noexit 83356->83394 83362 413ac5 83357->83362 83392 419f9d __VEC_memcpy VirtualFree VirtualFree HeapFree __shift 83357->83392 83359 413aff GetLastError 83359->83355 83393 413ade LeaveCriticalSection _doexit 83362->83393 83363->83333 83364->83322 83366 41396d 83365->83366 83376 4138cc 83365->83376 83390 411afc 6 API calls __decode_pointer 83366->83390 83368 413973 83391 417f23 67 API calls __getptd_noexit 83368->83391 83373 4138dd 83373->83376 83383 418252 67 API calls 2 library calls 83373->83383 83384 4180a7 67 API calls 7 library calls 83373->83384 83385 411803 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 83373->83385 83374 413929 RtlAllocateHeap 83374->83376 83376->83373 83376->83374 83377 413959 83376->83377 83380 41395e 83376->83380 83382 413965 83376->83382 83386 41386b 67 API calls 4 library calls 83376->83386 83387 411afc 6 API calls __decode_pointer 83376->83387 83388 417f23 67 API calls __getptd_noexit 83377->83388 83389 417f23 67 API calls __getptd_noexit 83380->83389 83382->83345 83383->83373 83384->83373 83386->83376 83387->83376 83388->83380 83389->83382 83390->83368 83391->83382 83392->83362 83393->83352 83394->83359 83395->83179 83396->83188 83397->83186 83398->83210 83399->83213 83401 41848c 83400->83401 83402 41696e __encode_pointer 6 API calls 83401->83402 83403 4184a4 83401->83403 83402->83401 83403->83218 83407 4113e5 83404->83407 83406 41142e 83406->83220 83408 4113f1 _raise 83407->83408 83415 41181b 83408->83415 83414 411412 _raise 83414->83406 83416 418407 __lock 67 API calls 83415->83416 83417 4113f6 83416->83417 83418 4112fa 83417->83418 83419 4169e9 __decode_pointer 6 API calls 83418->83419 83420 41130e 83419->83420 83421 4169e9 __decode_pointer 6 API calls 83420->83421 83422 41131e 83421->83422 83433 4113a1 83422->83433 83441 4170e7 68 API calls 4 library calls 83422->83441 83424 41133c 83426 411357 83424->83426 83427 411366 83424->83427 83437 411388 83424->83437 83425 41696e __encode_pointer 6 API calls 83428 411396 83425->83428 83442 417047 73 API calls _realloc 83426->83442 83430 411360 83427->83430 83427->83433 83431 41696e __encode_pointer 6 API calls 83428->83431 83430->83427 83434 41137c 83430->83434 83443 417047 73 API calls _realloc 83430->83443 83431->83433 83438 41141b 83433->83438 83436 41696e __encode_pointer 6 API calls 83434->83436 83435 411376 83435->83433 83435->83434 83436->83437 83437->83425 83444 411824 83438->83444 83441->83424 83442->83430 83443->83435 83447 41832d LeaveCriticalSection 83444->83447 83446 411420 83446->83414 83447->83446 83449 4092c8 moneypunct 83448->83449 83450 429db0 VariantClear 83449->83450 83451 4092d5 moneypunct 83449->83451 83450->83451 83451->83225 83496 40eb70 83452->83496 83455->83231 83456->83233 83457->83235 83500 401f80 83458->83500 83460 40d6f1 IsDebuggerPresent 83461 431a9d MessageBoxA 83460->83461 83462 40d6ff 83460->83462 83463 431ab6 83461->83463 83462->83463 83464 40d71f 83462->83464 83593 403e90 75 API calls 3 library calls 83463->83593 83570 40f3b0 83464->83570 83468 40d73a GetFullPathNameW 83590 401440 127 API calls _wcscat 83468->83590 83470 40d77a 83471 40d782 83470->83471 83472 431b09 SetCurrentDirectoryW 83470->83472 83473 40d78b 83471->83473 83594 43604b 6 API calls 83471->83594 83472->83471 83582 4101f0 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 83473->83582 83476 431b28 83476->83473 83478 431b30 GetModuleFileNameW 83476->83478 83480 431ba4 GetForegroundWindow ShellExecuteW 83478->83480 83481 431b4c 83478->83481 83483 40d7c7 83480->83483 83595 401b70 83481->83595 83482 40d795 83486 40d7a8 83482->83486 83591 40e1e0 97 API calls _memset 83482->83591 83488 40d7d1 SetCurrentDirectoryW 83483->83488 83486->83483 83592 401000 Shell_NotifyIconW _memset 83486->83592 83488->83237 83490 431b66 83602 40d3b0 75 API calls 2 library calls 83490->83602 83493 431b72 GetForegroundWindow ShellExecuteW 83494 431b9f 83493->83494 83494->83483 83495 40eba0 LoadLibraryA GetProcAddress 83495->83228 83497 40d86e 83496->83497 83498 40eb76 LoadLibraryA 83496->83498 83497->83228 83497->83495 83498->83497 83499 40eb87 GetProcAddress 83498->83499 83499->83497 83603 40e680 75 API calls 83500->83603 83502 401f90 83604 402940 75 API calls __write_nolock 83502->83604 83504 401fa2 GetModuleFileNameW 83605 40ff90 83504->83605 83506 401fbd 83617 4107b0 75 API calls 83506->83617 83508 401fd6 83509 401b70 75 API calls 83508->83509 83510 401fe4 83509->83510 83618 4019e0 76 API calls 83510->83618 83512 401ff2 83513 4092c0 VariantClear 83512->83513 83514 402002 83513->83514 83515 401b70 75 API calls 83514->83515 83516 40201c 83515->83516 83619 4019e0 76 API calls 83516->83619 83518 40202c 83519 401b70 75 API calls 83518->83519 83520 40203c 83519->83520 83620 40c3e0 75 API calls 83520->83620 83522 40204d 83621 40c060 83522->83621 83526 40206e 83627 4115d0 79 API calls 2 library calls 83526->83627 83528 40207d 83529 42c174 83528->83529 83530 402088 83528->83530 83638 401a70 75 API calls 83529->83638 83628 4115d0 79 API calls 2 library calls 83530->83628 83533 42c189 83639 401a70 75 API calls 83533->83639 83534 402093 83534->83533 83535 40209e 83534->83535 83629 4115d0 79 API calls 2 library calls 83535->83629 83538 42c1a7 83540 42c1b0 GetModuleFileNameW 83538->83540 83539 4020a9 83539->83540 83541 4020b4 83539->83541 83640 401a70 75 API calls 83540->83640 83630 4115d0 79 API calls 2 library calls 83541->83630 83544 4020bf 83546 402107 83544->83546 83549 42c20a _wcscpy 83544->83549 83631 401a70 75 API calls 83544->83631 83545 42c1e2 83641 40df50 75 API calls 83545->83641 83548 402119 83546->83548 83546->83549 83551 42c243 83548->83551 83633 40e7e0 76 API calls 83548->83633 83643 401a70 75 API calls 83549->83643 83550 42c1f1 83642 401a70 75 API calls 83550->83642 83555 4020e5 _wcscpy 83632 401a70 75 API calls 83555->83632 83556 42c201 83556->83549 83558 402132 83634 40d030 76 API calls 83558->83634 83560 40213e 83562 4092c0 VariantClear 83560->83562 83565 402148 83562->83565 83563 402184 83567 4092c0 VariantClear 83563->83567 83565->83563 83635 40d030 76 API calls 83565->83635 83636 40e640 76 API calls 83565->83636 83637 401a70 75 API calls 83565->83637 83569 402196 moneypunct 83567->83569 83569->83460 83571 42ccf4 _memset 83570->83571 83572 40f3c9 83570->83572 83574 42cd05 GetOpenFileNameW 83571->83574 84318 40ffb0 76 API calls moneypunct 83572->84318 83574->83572 83576 40d732 83574->83576 83575 40f3d2 84319 410130 SHGetMalloc 83575->84319 83576->83468 83576->83470 83578 40f3d9 84324 410020 88 API calls __wcsicoll 83578->84324 83580 40f3e7 84325 40f400 83580->84325 83583 42b9d3 83582->83583 83584 41025a LoadImageW RegisterClassExW 83582->83584 84377 443e8f EnumResourceNamesW LoadImageW 83583->84377 84376 4102f0 7 API calls 83584->84376 83587 40d790 83589 4103e0 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 83587->83589 83588 42b9da 83589->83482 83590->83470 83591->83486 83592->83483 83593->83470 83594->83476 83596 401b76 _wcslen 83595->83596 83597 41171a 75 API calls 83596->83597 83600 401bc5 83596->83600 83598 401bad _realloc 83597->83598 83599 41171a 75 API calls 83598->83599 83599->83600 83601 40d3b0 75 API calls 2 library calls 83600->83601 83601->83490 83602->83493 83603->83502 83604->83504 83644 40f5e0 83605->83644 83608 40ffa6 83608->83506 83610 42b6e6 83612 413a88 __getptd_noexit 67 API calls 83610->83612 83611 42b6d8 83611->83610 83700 434fe1 83611->83700 83614 42b6f5 83612->83614 83615 434fe1 106 API calls 83614->83615 83616 42b702 83615->83616 83616->83506 83617->83508 83618->83512 83619->83518 83620->83522 83622 41171a 75 API calls 83621->83622 83623 40c088 83622->83623 83624 41171a 75 API calls 83623->83624 83625 402061 83624->83625 83626 401a70 75 API calls 83625->83626 83626->83526 83627->83528 83628->83534 83629->83539 83630->83544 83631->83555 83632->83546 83633->83558 83634->83560 83635->83565 83636->83565 83637->83565 83638->83533 83639->83538 83640->83545 83641->83550 83642->83556 83643->83565 83704 40f580 83644->83704 83646 40f5f8 _strcat moneypunct 83712 40f6d0 83646->83712 83651 42b2ee 83741 4151b0 83651->83741 83653 40f679 83653->83651 83654 40f681 83653->83654 83728 414e94 83654->83728 83658 40f68b 83658->83608 83663 452574 83658->83663 83660 42b31d 83747 415484 83660->83747 83662 42b33d 83664 41557c _fseek 105 API calls 83663->83664 83665 4525df 83664->83665 84263 4523ce 83665->84263 83668 4525fc 83668->83611 83669 4151b0 __fread_nolock 81 API calls 83670 45261d 83669->83670 83671 4151b0 __fread_nolock 81 API calls 83670->83671 83672 45262e 83671->83672 83673 4151b0 __fread_nolock 81 API calls 83672->83673 83674 452649 83673->83674 83675 4151b0 __fread_nolock 81 API calls 83674->83675 83676 452666 83675->83676 83677 41557c _fseek 105 API calls 83676->83677 83678 452682 83677->83678 83679 4138ba _malloc 67 API calls 83678->83679 83680 45268e 83679->83680 83681 4138ba _malloc 67 API calls 83680->83681 83682 45269b 83681->83682 83683 4151b0 __fread_nolock 81 API calls 83682->83683 83684 4526ac 83683->83684 83685 44afdc GetSystemTimeAsFileTime 83684->83685 83686 4526bf 83685->83686 83687 4526d5 83686->83687 83688 4526fd 83686->83688 83691 413a88 __getptd_noexit 67 API calls 83687->83691 83689 452704 83688->83689 83690 45275b 83688->83690 84269 44b195 83689->84269 83693 413a88 __getptd_noexit 67 API calls 83690->83693 83694 4526df 83691->83694 83696 452759 83693->83696 83697 413a88 __getptd_noexit 67 API calls 83694->83697 83695 452753 83699 413a88 __getptd_noexit 67 API calls 83695->83699 83696->83611 83698 4526e8 83697->83698 83698->83611 83699->83696 83701 434ff1 83700->83701 83702 434feb 83700->83702 83701->83610 83703 414e94 __fcloseall 106 API calls 83702->83703 83703->83701 83705 429440 83704->83705 83706 40f589 _wcslen 83704->83706 83707 40f58f WideCharToMultiByte 83706->83707 83708 40f5d8 83707->83708 83709 40f5ad 83707->83709 83708->83646 83760 41171a 83709->83760 83713 40f6dd _strlen 83712->83713 83775 40f790 83713->83775 83716 414e06 83794 414d40 83716->83794 83718 40f666 83718->83651 83719 40f450 83718->83719 83723 40f45a _strcat _realloc __write_nolock 83719->83723 83720 4151b0 __fread_nolock 81 API calls 83720->83723 83722 42936d 83724 41557c _fseek 105 API calls 83722->83724 83723->83720 83723->83722 83727 40f531 83723->83727 83877 41557c 83723->83877 83725 429394 83724->83725 83726 4151b0 __fread_nolock 81 API calls 83725->83726 83726->83727 83727->83653 83729 414ea0 _raise 83728->83729 83730 414ed1 83729->83730 83731 414eb4 83729->83731 83733 415965 __lock_file 68 API calls 83730->83733 83737 414ec9 _raise 83730->83737 84016 417f23 67 API calls __getptd_noexit 83731->84016 83736 414ee9 83733->83736 83734 414eb9 84017 417ebb 6 API calls 2 library calls 83734->84017 84000 414e1d 83736->84000 83737->83658 84085 41511a 83741->84085 83743 4151c8 83744 44afdc 83743->83744 84256 4431e0 83744->84256 83746 44affd 83746->83660 83748 415490 _raise 83747->83748 83749 4154bb 83748->83749 83750 41549e 83748->83750 83752 415965 __lock_file 68 API calls 83749->83752 84260 417f23 67 API calls __getptd_noexit 83750->84260 83754 4154c3 83752->83754 83753 4154a3 84261 417ebb 6 API calls 2 library calls 83753->84261 83756 4152e7 __ftell_nolock 71 API calls 83754->83756 83757 4154cf 83756->83757 84262 4154e8 LeaveCriticalSection LeaveCriticalSection _ftell 83757->84262 83759 4154b3 _raise 83759->83662 83762 411724 83760->83762 83761 4138ba _malloc 67 API calls 83761->83762 83762->83761 83763 40f5bb WideCharToMultiByte 83762->83763 83766 411740 std::bad_alloc::bad_alloc 83762->83766 83772 411afc 6 API calls __decode_pointer 83762->83772 83763->83646 83769 411421 __cinit 74 API calls 83766->83769 83771 411766 83766->83771 83767 411770 83774 41805b RaiseException 83767->83774 83769->83771 83770 41177e 83773 4116fd 67 API calls std::exception::exception 83771->83773 83772->83762 83773->83767 83774->83770 83776 40f7ae _memset 83775->83776 83778 40f628 83776->83778 83779 415258 83776->83779 83778->83716 83780 415285 83779->83780 83781 415268 83779->83781 83780->83781 83782 41528c 83780->83782 83790 417f23 67 API calls __getptd_noexit 83781->83790 83792 41c551 103 API calls 14 library calls 83782->83792 83785 41526d 83791 417ebb 6 API calls 2 library calls 83785->83791 83786 4152b2 83789 41527d 83786->83789 83793 4191c9 101 API calls 6 library calls 83786->83793 83789->83776 83790->83785 83792->83786 83793->83789 83797 414d4c _raise 83794->83797 83795 414d5f 83846 417f23 67 API calls __getptd_noexit 83795->83846 83797->83795 83799 414d95 83797->83799 83798 414d64 83847 417ebb 6 API calls 2 library calls 83798->83847 83813 41e28c 83799->83813 83802 414d9a 83803 414da1 83802->83803 83804 414dae 83802->83804 83848 417f23 67 API calls __getptd_noexit 83803->83848 83805 414dd6 83804->83805 83806 414db6 83804->83806 83831 41dfd8 83805->83831 83849 417f23 67 API calls __getptd_noexit 83806->83849 83810 414d74 _raise @_EH4_CallFilterFunc@8 83810->83718 83814 41e298 _raise 83813->83814 83815 418407 __lock 67 API calls 83814->83815 83825 41e2a6 83815->83825 83816 41e322 83818 416fb6 __malloc_crt 67 API calls 83816->83818 83820 41e32c 83818->83820 83819 41e3b0 _raise 83819->83802 83828 41e31b 83820->83828 83856 4189e6 InitializeCriticalSectionAndSpinCount _raise 83820->83856 83821 418344 __mtinitlocknum 67 API calls 83821->83825 83824 41e351 83826 41e35c 83824->83826 83827 41e36f EnterCriticalSection 83824->83827 83825->83816 83825->83821 83825->83828 83854 4159a6 68 API calls __lock 83825->83854 83855 415a14 LeaveCriticalSection LeaveCriticalSection _doexit 83825->83855 83829 413a88 __getptd_noexit 67 API calls 83826->83829 83827->83828 83851 41e3bb 83828->83851 83829->83828 83840 41dffb __wopenfile 83831->83840 83832 41e015 83861 417f23 67 API calls __getptd_noexit 83832->83861 83834 41e1e9 83834->83832 83837 41e247 83834->83837 83835 41e01a 83862 417ebb 6 API calls 2 library calls 83835->83862 83858 425db0 83837->83858 83840->83832 83840->83834 83863 4136bc 79 API calls 2 library calls 83840->83863 83842 41e1e2 83842->83834 83864 4136bc 79 API calls 2 library calls 83842->83864 83844 41e201 83844->83834 83865 4136bc 79 API calls 2 library calls 83844->83865 83846->83798 83848->83810 83849->83810 83850 414dfc LeaveCriticalSection LeaveCriticalSection _ftell 83850->83810 83857 41832d LeaveCriticalSection 83851->83857 83853 41e3c2 83853->83819 83854->83825 83855->83825 83856->83824 83857->83853 83866 425ce4 83858->83866 83860 414de1 83860->83850 83861->83835 83863->83842 83864->83844 83865->83834 83869 425cf0 _raise 83866->83869 83867 425d03 83868 417f23 _raise 67 API calls 83867->83868 83871 425d08 83868->83871 83869->83867 83870 425d41 83869->83870 83872 4255c4 __tsopen_nolock 132 API calls 83870->83872 83873 417ebb _raise 6 API calls 83871->83873 83874 425d5b 83872->83874 83876 425d17 _raise 83873->83876 83875 425d82 __sopen_helper LeaveCriticalSection 83874->83875 83875->83876 83876->83860 83878 415588 _raise 83877->83878 83879 415596 83878->83879 83881 4155c4 83878->83881 83908 417f23 67 API calls __getptd_noexit 83879->83908 83890 415965 83881->83890 83883 41559b 83909 417ebb 6 API calls 2 library calls 83883->83909 83889 4155ab _raise 83889->83723 83891 415977 83890->83891 83892 415999 EnterCriticalSection 83890->83892 83891->83892 83893 41597f 83891->83893 83894 4155cc 83892->83894 83895 418407 __lock 67 API calls 83893->83895 83896 4154f2 83894->83896 83895->83894 83897 415512 83896->83897 83898 415502 83896->83898 83903 415524 83897->83903 83911 4152e7 83897->83911 83965 417f23 67 API calls __getptd_noexit 83898->83965 83901 415507 83910 4155f7 LeaveCriticalSection LeaveCriticalSection _ftell 83901->83910 83928 41486c 83903->83928 83908->83883 83910->83889 83912 41531a 83911->83912 83913 4152fa 83911->83913 83914 41453a __fileno 67 API calls 83912->83914 83966 417f23 67 API calls __getptd_noexit 83913->83966 83916 415320 83914->83916 83919 41efd4 __locking 71 API calls 83916->83919 83917 4152ff 83967 417ebb 6 API calls 2 library calls 83917->83967 83920 415335 83919->83920 83921 4153a9 83920->83921 83923 415364 83920->83923 83927 41530f 83920->83927 83968 417f23 67 API calls __getptd_noexit 83921->83968 83924 41efd4 __locking 71 API calls 83923->83924 83923->83927 83925 415404 83924->83925 83926 41efd4 __locking 71 API calls 83925->83926 83925->83927 83926->83927 83927->83903 83929 414885 83928->83929 83930 4148a7 83928->83930 83929->83930 83931 41453a __fileno 67 API calls 83929->83931 83934 41453a 83930->83934 83932 4148a0 83931->83932 83969 41c3cf 101 API calls 5 library calls 83932->83969 83935 414549 83934->83935 83939 41455e 83934->83939 83970 417f23 67 API calls __getptd_noexit 83935->83970 83937 41454e 83971 417ebb 6 API calls 2 library calls 83937->83971 83940 41efd4 83939->83940 83941 41efe0 _raise 83940->83941 83942 41f003 83941->83942 83943 41efe8 83941->83943 83945 41f011 83942->83945 83948 41f052 83942->83948 83992 417f36 67 API calls __getptd_noexit 83943->83992 83994 417f36 67 API calls __getptd_noexit 83945->83994 83946 41efed 83993 417f23 67 API calls __getptd_noexit 83946->83993 83972 41ba3b 83948->83972 83950 41f016 83995 417f23 67 API calls __getptd_noexit 83950->83995 83953 41f01d 83996 417ebb 6 API calls 2 library calls 83953->83996 83954 41f058 83956 41f065 83954->83956 83957 41f07b 83954->83957 83982 41ef5f 83956->83982 83997 417f23 67 API calls __getptd_noexit 83957->83997 83958 41eff5 _raise 83958->83901 83961 41f073 83999 41f0a6 LeaveCriticalSection __unlock_fhandle 83961->83999 83962 41f080 83998 417f36 67 API calls __getptd_noexit 83962->83998 83965->83901 83966->83917 83968->83927 83969->83930 83970->83937 83973 41ba47 _raise 83972->83973 83974 41baa2 83973->83974 83977 418407 __lock 67 API calls 83973->83977 83975 41bac4 _raise 83974->83975 83976 41baa7 EnterCriticalSection 83974->83976 83975->83954 83976->83975 83978 41ba73 83977->83978 83979 41ba8a 83978->83979 83980 4189e6 ___lock_fhandle InitializeCriticalSectionAndSpinCount 83978->83980 83981 41bad2 ___lock_fhandle LeaveCriticalSection 83979->83981 83980->83979 83981->83974 83983 41b9c4 __commit 67 API calls 83982->83983 83984 41ef6e 83983->83984 83985 41ef84 SetFilePointer 83984->83985 83986 41ef74 83984->83986 83988 41ef9b GetLastError 83985->83988 83989 41efa3 83985->83989 83987 417f23 _raise 67 API calls 83986->83987 83990 41ef79 83987->83990 83988->83989 83989->83990 83991 417f49 __dosmaperr 67 API calls 83989->83991 83990->83961 83991->83990 83992->83946 83993->83958 83994->83950 83995->83953 83997->83962 83998->83961 83999->83958 84001 414e31 84000->84001 84002 414e4d 84000->84002 84046 417f23 67 API calls __getptd_noexit 84001->84046 84004 41486c __flush 101 API calls 84002->84004 84008 414e46 84002->84008 84006 414e59 84004->84006 84005 414e36 84047 417ebb 6 API calls 2 library calls 84005->84047 84019 41e680 84006->84019 84018 414f08 LeaveCriticalSection LeaveCriticalSection _ftell 84008->84018 84011 41453a __fileno 67 API calls 84012 414e67 84011->84012 84023 41e5b3 84012->84023 84014 414e6d 84014->84008 84015 413a88 __getptd_noexit 67 API calls 84014->84015 84015->84008 84016->83734 84018->83737 84020 41e690 84019->84020 84021 414e61 84019->84021 84020->84021 84022 413a88 __getptd_noexit 67 API calls 84020->84022 84021->84011 84022->84021 84024 41e5bf _raise 84023->84024 84025 41e5e2 84024->84025 84026 41e5c7 84024->84026 84028 41e5f0 84025->84028 84031 41e631 84025->84031 84063 417f36 67 API calls __getptd_noexit 84026->84063 84065 417f36 67 API calls __getptd_noexit 84028->84065 84029 41e5cc 84064 417f23 67 API calls __getptd_noexit 84029->84064 84034 41ba3b ___lock_fhandle 68 API calls 84031->84034 84033 41e5f5 84066 417f23 67 API calls __getptd_noexit 84033->84066 84036 41e637 84034->84036 84038 41e652 84036->84038 84039 41e644 84036->84039 84037 41e5fc 84067 417ebb 6 API calls 2 library calls 84037->84067 84068 417f23 67 API calls __getptd_noexit 84038->84068 84048 41e517 84039->84048 84043 41e5d4 _raise 84043->84014 84044 41e64c 84069 41e676 LeaveCriticalSection __unlock_fhandle 84044->84069 84046->84005 84070 41b9c4 84048->84070 84050 41e57d 84083 41b93e 68 API calls 2 library calls 84050->84083 84052 41e527 84052->84050 84053 41e55b 84052->84053 84055 41b9c4 __commit 67 API calls 84052->84055 84053->84050 84056 41b9c4 __commit 67 API calls 84053->84056 84054 41e585 84057 41e5a7 84054->84057 84084 417f49 67 API calls 3 library calls 84054->84084 84058 41e552 84055->84058 84059 41e567 CloseHandle 84056->84059 84057->84044 84061 41b9c4 __commit 67 API calls 84058->84061 84059->84050 84062 41e573 GetLastError 84059->84062 84061->84053 84062->84050 84063->84029 84064->84043 84065->84033 84066->84037 84068->84044 84069->84043 84071 41b9d1 84070->84071 84072 41b9e9 84070->84072 84073 417f36 __commit 67 API calls 84071->84073 84075 417f36 __commit 67 API calls 84072->84075 84077 41ba2e 84072->84077 84074 41b9d6 84073->84074 84076 417f23 _raise 67 API calls 84074->84076 84078 41ba17 84075->84078 84079 41b9de 84076->84079 84077->84052 84080 417f23 _raise 67 API calls 84078->84080 84079->84052 84081 41ba1e 84080->84081 84082 417ebb _raise 6 API calls 84081->84082 84082->84077 84083->84054 84084->84057 84086 415126 _raise 84085->84086 84087 41513a _memset 84086->84087 84088 41516f 84086->84088 84089 415164 _raise 84086->84089 84114 417f23 67 API calls __getptd_noexit 84087->84114 84090 415965 __lock_file 68 API calls 84088->84090 84089->83743 84091 415177 84090->84091 84098 414f10 84091->84098 84094 415154 84115 417ebb 6 API calls 2 library calls 84094->84115 84099 414f4c 84098->84099 84102 414f2e _memset 84098->84102 84116 4151a6 LeaveCriticalSection LeaveCriticalSection _ftell 84099->84116 84100 414f37 84167 417f23 67 API calls __getptd_noexit 84100->84167 84102->84099 84102->84100 84105 414f8b 84102->84105 84105->84099 84106 41453a __fileno 67 API calls 84105->84106 84109 4150d5 _memset 84105->84109 84111 4150a9 _memset 84105->84111 84117 41ed9e 84105->84117 84147 41e6b1 84105->84147 84169 41ee9b 67 API calls 3 library calls 84105->84169 84106->84105 84171 417f23 67 API calls __getptd_noexit 84109->84171 84170 417f23 67 API calls __getptd_noexit 84111->84170 84113 414f3c 84168 417ebb 6 API calls 2 library calls 84113->84168 84114->84094 84116->84089 84118 41edaa _raise 84117->84118 84119 41edb2 84118->84119 84120 41edcd 84118->84120 84241 417f36 67 API calls __getptd_noexit 84119->84241 84122 41eddb 84120->84122 84126 41ee1c 84120->84126 84243 417f36 67 API calls __getptd_noexit 84122->84243 84124 41edb7 84242 417f23 67 API calls __getptd_noexit 84124->84242 84125 41ede0 84244 417f23 67 API calls __getptd_noexit 84125->84244 84129 41ee29 84126->84129 84130 41ee3d 84126->84130 84246 417f36 67 API calls __getptd_noexit 84129->84246 84132 41ba3b ___lock_fhandle 68 API calls 84130->84132 84133 41ee43 84132->84133 84136 41ee50 84133->84136 84137 41ee66 84133->84137 84134 41ee2e 84247 417f23 67 API calls __getptd_noexit 84134->84247 84135 41edbf _raise 84135->84105 84172 41e7dc 84136->84172 84248 417f23 67 API calls __getptd_noexit 84137->84248 84142 41ede7 84245 417ebb 6 API calls 2 library calls 84142->84245 84143 41ee5e 84250 41ee91 LeaveCriticalSection __unlock_fhandle 84143->84250 84144 41ee6b 84249 417f36 67 API calls __getptd_noexit 84144->84249 84148 41e6c1 84147->84148 84152 41e6de 84147->84152 84254 417f23 67 API calls __getptd_noexit 84148->84254 84150 41e6c6 84255 417ebb 6 API calls 2 library calls 84150->84255 84153 41e713 84152->84153 84159 41e6d6 84152->84159 84251 423600 84152->84251 84155 41453a __fileno 67 API calls 84153->84155 84156 41e727 84155->84156 84157 41ed9e __read 79 API calls 84156->84157 84158 41e72e 84157->84158 84158->84159 84160 41453a __fileno 67 API calls 84158->84160 84159->84105 84161 41e751 84160->84161 84161->84159 84162 41453a __fileno 67 API calls 84161->84162 84163 41e75d 84162->84163 84163->84159 84164 41453a __fileno 67 API calls 84163->84164 84165 41e769 84164->84165 84166 41453a __fileno 67 API calls 84165->84166 84166->84159 84167->84113 84169->84105 84170->84113 84171->84113 84173 41e813 84172->84173 84174 41e7f8 84172->84174 84176 41e822 84173->84176 84178 41e849 84173->84178 84175 417f36 __commit 67 API calls 84174->84175 84177 41e7fd 84175->84177 84179 417f36 __commit 67 API calls 84176->84179 84181 417f23 _raise 67 API calls 84177->84181 84180 41e868 84178->84180 84195 41e87c 84178->84195 84182 41e827 84179->84182 84183 417f36 __commit 67 API calls 84180->84183 84192 41e805 84181->84192 84185 417f23 _raise 67 API calls 84182->84185 84187 41e86d 84183->84187 84184 41e8d4 84186 417f36 __commit 67 API calls 84184->84186 84188 41e82e 84185->84188 84189 41e8d9 84186->84189 84190 417f23 _raise 67 API calls 84187->84190 84191 417ebb _raise 6 API calls 84188->84191 84193 417f23 _raise 67 API calls 84189->84193 84194 41e874 84190->84194 84191->84192 84192->84143 84193->84194 84198 417ebb _raise 6 API calls 84194->84198 84195->84184 84195->84192 84196 41e8b0 84195->84196 84197 41e8f5 84195->84197 84196->84184 84203 41e8bb ReadFile 84196->84203 84200 416fb6 __malloc_crt 67 API calls 84197->84200 84198->84192 84204 41e90b 84200->84204 84201 41ed62 GetLastError 84205 41ebe8 84201->84205 84206 41ed6f 84201->84206 84202 41e9e7 84202->84201 84209 41e9fb 84202->84209 84203->84201 84203->84202 84207 41e931 84204->84207 84208 41e913 84204->84208 84213 417f49 __dosmaperr 67 API calls 84205->84213 84221 41eb6d 84205->84221 84211 417f23 _raise 67 API calls 84206->84211 84210 423462 __lseeki64_nolock 69 API calls 84207->84210 84212 417f23 _raise 67 API calls 84208->84212 84220 41ec2d 84209->84220 84209->84221 84222 41ea17 84209->84222 84215 41e93d 84210->84215 84216 41ed74 84211->84216 84214 41e918 84212->84214 84213->84221 84217 417f36 __commit 67 API calls 84214->84217 84215->84203 84218 417f36 __commit 67 API calls 84216->84218 84217->84192 84218->84221 84219 413a88 __getptd_noexit 67 API calls 84219->84192 84220->84221 84223 41eca5 ReadFile 84220->84223 84221->84192 84221->84219 84224 41eafa 84222->84224 84225 41ea7d ReadFile 84222->84225 84227 41ecc4 GetLastError 84223->84227 84234 41ecce 84223->84234 84224->84221 84230 41eb75 84224->84230 84231 41eb68 84224->84231 84238 41eb32 84224->84238 84226 41ea9b GetLastError 84225->84226 84233 41eaa5 84225->84233 84226->84222 84226->84233 84227->84220 84227->84234 84228 41ebbe MultiByteToWideChar 84228->84221 84229 41ebe2 GetLastError 84228->84229 84229->84205 84236 41ebac 84230->84236 84230->84238 84232 417f23 _raise 67 API calls 84231->84232 84232->84221 84233->84222 84237 423462 __lseeki64_nolock 69 API calls 84233->84237 84234->84220 84235 423462 __lseeki64_nolock 69 API calls 84234->84235 84235->84234 84239 423462 __lseeki64_nolock 69 API calls 84236->84239 84237->84233 84238->84228 84240 41ebbb 84239->84240 84240->84228 84241->84124 84242->84135 84243->84125 84244->84142 84246->84134 84247->84142 84248->84144 84249->84143 84250->84135 84252 416fb6 __malloc_crt 67 API calls 84251->84252 84253 423615 84252->84253 84253->84153 84254->84150 84259 414cef GetSystemTimeAsFileTime __aulldiv 84256->84259 84258 4431ef 84258->83746 84259->84258 84260->83753 84262->83759 84267 4523e1 _wcscpy 84263->84267 84264 44afdc GetSystemTimeAsFileTime 84264->84267 84265 4151b0 81 API calls __fread_nolock 84265->84267 84266 452553 84266->83668 84266->83669 84267->84264 84267->84265 84267->84266 84268 41557c 105 API calls _fseek 84267->84268 84268->84267 84270 44b1b4 84269->84270 84271 44b1a6 84269->84271 84273 44b1ca 84270->84273 84274 44b1c2 84270->84274 84275 414e06 138 API calls 84270->84275 84272 414e06 138 API calls 84271->84272 84272->84270 84304 4352d1 81 API calls 2 library calls 84273->84304 84274->83695 84277 44b2c1 84275->84277 84277->84273 84278 44b2cf 84277->84278 84280 44b2dc 84278->84280 84283 414e94 __fcloseall 106 API calls 84278->84283 84279 44b20d 84281 44b211 84279->84281 84282 44b23b 84279->84282 84280->83695 84285 44b21e 84281->84285 84287 414e94 __fcloseall 106 API calls 84281->84287 84305 43526e 84282->84305 84283->84280 84288 44b22e 84285->84288 84291 414e94 __fcloseall 106 API calls 84285->84291 84286 44b242 84289 44b270 84286->84289 84290 44b248 84286->84290 84287->84285 84288->83695 84315 44b0af 111 API calls 84289->84315 84292 44b255 84290->84292 84295 414e94 __fcloseall 106 API calls 84290->84295 84291->84288 84296 44b265 84292->84296 84298 414e94 __fcloseall 106 API calls 84292->84298 84294 44b276 84316 43522c 67 API calls __getptd_noexit 84294->84316 84295->84292 84296->83695 84298->84296 84299 44b27c 84300 44b289 84299->84300 84301 414e94 __fcloseall 106 API calls 84299->84301 84302 414e94 __fcloseall 106 API calls 84300->84302 84303 44b299 84300->84303 84301->84300 84302->84303 84303->83695 84304->84279 84306 4138ba _malloc 67 API calls 84305->84306 84307 43527d 84306->84307 84308 4138ba _malloc 67 API calls 84307->84308 84309 43528d 84308->84309 84310 4138ba _malloc 67 API calls 84309->84310 84311 43529d 84310->84311 84313 4352bc 84311->84313 84317 43522c 67 API calls __getptd_noexit 84311->84317 84313->84286 84314 4352c8 84314->84286 84315->84294 84316->84299 84317->84314 84318->83575 84320 410148 SHGetDesktopFolder 84319->84320 84323 4101a3 _wcscpy 84319->84323 84321 41015a _wcscpy 84320->84321 84320->84323 84322 41018a SHGetPathFromIDListW 84321->84322 84321->84323 84322->84323 84323->83578 84324->83580 84326 40f5e0 152 API calls 84325->84326 84327 40f417 84326->84327 84328 42ca37 84327->84328 84329 40f42c 84327->84329 84330 42ca1f 84327->84330 84331 452574 140 API calls 84328->84331 84370 4037e0 139 API calls 7 library calls 84329->84370 84371 43717f 110 API calls _printf 84330->84371 84334 42ca50 84331->84334 84335 42ca76 84334->84335 84336 42ca54 84334->84336 84340 41171a 75 API calls 84335->84340 84339 434fe1 106 API calls 84336->84339 84337 40f446 84337->83576 84338 42ca2d 84338->84328 84341 42ca5e 84339->84341 84355 42cacc moneypunct 84340->84355 84372 43717f 110 API calls _printf 84341->84372 84343 42ca6c 84343->84335 84344 42ccc3 84345 413a88 __getptd_noexit 67 API calls 84344->84345 84346 42cccd 84345->84346 84347 434fe1 106 API calls 84346->84347 84348 42ccda 84347->84348 84352 401b70 75 API calls 84352->84355 84355->84344 84355->84352 84356 402cc0 84355->84356 84364 4026a0 84355->84364 84373 445051 75 API calls _realloc 84355->84373 84374 44c80c 87 API calls 3 library calls 84355->84374 84375 44b408 75 API calls 84355->84375 84357 402d71 84356->84357 84362 402cd2 moneypunct _realloc 84356->84362 84359 41171a 75 API calls 84357->84359 84358 41171a 75 API calls 84360 402cd9 84358->84360 84359->84362 84361 41171a 75 API calls 84360->84361 84363 402cff 84360->84363 84361->84363 84362->84358 84363->84355 84365 4026af 84364->84365 84367 40276b 84364->84367 84366 41171a 75 API calls 84365->84366 84365->84367 84368 4026ee moneypunct 84365->84368 84366->84368 84367->84355 84368->84367 84369 41171a 75 API calls 84368->84369 84369->84368 84370->84337 84371->84338 84372->84343 84373->84355 84374->84355 84375->84355 84376->83587 84377->83588 84378 3f523f0 84393 3f50040 84378->84393 84380 3f524a9 84396 3f522e0 84380->84396 84382 3f524d2 CreateFileW 84384 3f52526 84382->84384 84387 3f52521 84382->84387 84385 3f5253d VirtualAlloc 84384->84385 84384->84387 84386 3f5255b ReadFile 84385->84386 84385->84387 84386->84387 84388 3f52576 84386->84388 84389 3f512e0 13 API calls 84388->84389 84390 3f525a9 84389->84390 84391 3f525cc ExitProcess 84390->84391 84392 3f52370 CreateProcessW 84390->84392 84391->84387 84392->84391 84399 3f534d0 GetPEB 84393->84399 84395 3f506cb 84395->84380 84397 3f522e9 Sleep 84396->84397 84398 3f522f7 84397->84398 84400 3f534fa 84399->84400 84400->84395 84401 444343 84404 444326 84401->84404 84403 44434e WriteFile 84405 444340 84404->84405 84406 4442c7 84404->84406 84405->84403 84411 40e190 SetFilePointerEx 84406->84411 84408 4442e0 SetFilePointerEx 84412 40e190 SetFilePointerEx 84408->84412 84410 4442ff 84410->84403 84411->84408 84412->84410 84413 46d22f 84416 46d098 84413->84416 84415 46d241 84417 46d0b5 84416->84417 84418 46d115 84417->84418 84419 46d0b9 84417->84419 84467 45c216 78 API calls 84418->84467 84420 41171a 75 API calls 84419->84420 84422 46d0c0 84420->84422 84424 46d0cc 84422->84424 84460 40d940 76 API calls 84422->84460 84423 46d126 84425 46d0f8 84423->84425 84431 46d142 84423->84431 84461 453063 84424->84461 84426 4092c0 VariantClear 84425->84426 84428 46d0fd 84426->84428 84428->84415 84432 46d1c8 84431->84432 84436 46d158 84431->84436 84473 4676a3 78 API calls 84432->84473 84434 46d0ea 84434->84431 84438 46d0ee 84434->84438 84437 453063 111 API calls 84436->84437 84445 46d15e 84437->84445 84438->84425 84466 44ade5 CloseHandle moneypunct 84438->84466 84439 46d1ce 84474 4444c2 SetFilePointerEx SetFilePointerEx WriteFile 84439->84474 84440 46d18d 84468 467fce 82 API calls 84440->84468 84442 46d196 84469 4013a0 75 API calls 84442->84469 84445->84440 84445->84442 84447 46d1e7 84450 4092c0 VariantClear 84447->84450 84458 46d194 84447->84458 84448 46d1a2 84470 40df50 75 API calls 84448->84470 84450->84458 84451 46d1ac 84471 40d3b0 75 API calls 2 library calls 84451->84471 84453 46d224 84453->84415 84454 46d1b8 84472 467fce 82 API calls 84454->84472 84455 40d900 CloseHandle 84457 46d216 84455->84457 84475 44ade5 CloseHandle moneypunct 84457->84475 84458->84453 84458->84455 84460->84424 84462 45306e 84461->84462 84463 45307a 84461->84463 84462->84463 84476 452e2a 111 API calls 5 library calls 84462->84476 84465 40dfa0 83 API calls 84463->84465 84465->84434 84466->84425 84467->84423 84468->84458 84469->84448 84470->84451 84471->84454 84472->84458 84473->84439 84474->84447 84475->84453 84476->84463 84477 40916c 84486 409170 84477->84486 84479 42c082 84481 4092c0 VariantClear 84479->84481 84480 4091fb 84482 4092c0 VariantClear 84480->84482 84484 409204 84481->84484 84482->84484 84483 42c06f 84495 45e62e 116 API calls 3 library calls 84483->84495 84486->84479 84486->84480 84486->84483 84487 4092c0 VariantClear 84486->84487 84488 4091f0 84486->84488 84489 40be00 84486->84489 84487->84486 84490 40be36 84489->84490 84491 40be08 moneypunct _realloc 84489->84491 84493 41171a 75 API calls 84490->84493 84492 41171a 75 API calls 84491->84492 84494 40be0f 84492->84494 84493->84491 84494->84486 84495->84479 84496 40116e 84497 401119 DefWindowProcW 84496->84497 84498 40f110 RegOpenKeyExW 84499 40f13c RegQueryValueExW RegCloseKey 84498->84499 84500 40f15f 84498->84500 84499->84500 84501 429212 84506 410b90 84501->84506 84504 411421 __cinit 74 API calls 84505 42922f 84504->84505 84507 410b9a __write_nolock 84506->84507 84508 41171a 75 API calls 84507->84508 84509 410c31 GetModuleFileNameW 84508->84509 84523 413db0 84509->84523 84511 410c66 _wcsncat 84526 413e3c 84511->84526 84514 41171a 75 API calls 84515 410ca3 _wcscpy 84514->84515 84516 410cd1 RegOpenKeyExW 84515->84516 84517 429bc3 RegQueryValueExW 84516->84517 84518 410cf7 84516->84518 84519 429bf2 _wcscat _wcslen _wcsncpy 84517->84519 84520 429cd9 RegCloseKey 84517->84520 84518->84504 84521 41171a 75 API calls 84519->84521 84522 429cd8 84519->84522 84521->84519 84522->84520 84529 413b95 84523->84529 84559 41abec 84526->84559 84530 413c2f 84529->84530 84536 413bae 84529->84536 84531 413d60 84530->84531 84532 413d7b 84530->84532 84555 417f23 67 API calls __getptd_noexit 84531->84555 84557 417f23 67 API calls __getptd_noexit 84532->84557 84535 413d65 84540 413cfb 84535->84540 84556 417ebb 6 API calls 2 library calls 84535->84556 84536->84530 84545 413c1d 84536->84545 84551 41ab19 67 API calls _raise 84536->84551 84539 413d03 84539->84530 84539->84540 84542 413d8e 84539->84542 84540->84511 84541 413cb9 84541->84530 84543 413cd6 84541->84543 84553 41ab19 67 API calls _raise 84541->84553 84558 41ab19 67 API calls _raise 84542->84558 84543->84530 84543->84540 84547 413cef 84543->84547 84545->84530 84550 413c9b 84545->84550 84552 41ab19 67 API calls _raise 84545->84552 84554 41ab19 67 API calls _raise 84547->84554 84550->84539 84550->84541 84551->84545 84552->84550 84553->84543 84554->84540 84555->84535 84557->84535 84558->84540 84560 41ac02 84559->84560 84561 41abfd 84559->84561 84568 417f23 67 API calls __getptd_noexit 84560->84568 84561->84560 84567 41ac22 84561->84567 84565 410c99 84565->84514 84566 41ac07 84569 417ebb 6 API calls 2 library calls 84566->84569 84567->84565 84570 417f23 67 API calls __getptd_noexit 84567->84570 84568->84566 84570->84566 84571 401230 84572 401241 _memset 84571->84572 84573 4012c5 84571->84573 84586 401be0 84572->84586 84575 40126b 84576 4012ae KillTimer SetTimer 84575->84576 84577 42aa61 84575->84577 84578 401298 84575->84578 84576->84573 84581 42aa8b Shell_NotifyIconW 84577->84581 84582 42aa69 Shell_NotifyIconW 84577->84582 84579 4012a2 84578->84579 84580 42aaac 84578->84580 84579->84576 84583 42aaf8 Shell_NotifyIconW 84579->84583 84584 42aad7 Shell_NotifyIconW 84580->84584 84585 42aab5 Shell_NotifyIconW 84580->84585 84581->84576 84582->84576 84583->84576 84584->84576 84585->84576 84587 401bfb 84586->84587 84607 401cde 84586->84607 84608 4013a0 75 API calls 84587->84608 84589 401c0b 84590 42a9a0 LoadStringW 84589->84590 84591 401c18 84589->84591 84593 42a9bb 84590->84593 84609 4021e0 84591->84609 84622 40df50 75 API calls 84593->84622 84594 401c2d 84596 401c3a 84594->84596 84597 42a9cd 84594->84597 84596->84593 84598 401c44 84596->84598 84623 40d3b0 75 API calls 2 library calls 84597->84623 84621 40d3b0 75 API calls 2 library calls 84598->84621 84601 42a9dc 84602 401c53 _memset _wcscpy _wcsncpy 84601->84602 84603 42a9f0 84601->84603 84606 401cc2 Shell_NotifyIconW 84602->84606 84624 40d3b0 75 API calls 2 library calls 84603->84624 84605 42a9fe 84606->84607 84607->84575 84608->84589 84610 4021f1 _wcslen 84609->84610 84611 42a598 84609->84611 84614 402205 84610->84614 84615 402226 84610->84615 84627 40c740 84611->84627 84613 42a5a2 84625 404020 75 API calls moneypunct 84614->84625 84626 401380 75 API calls 84615->84626 84618 40220c _realloc 84618->84594 84619 40222d 84619->84613 84620 41171a 75 API calls 84619->84620 84620->84618 84621->84602 84622->84602 84623->84601 84624->84605 84625->84618 84626->84619 84628 40c752 84627->84628 84629 40c747 84627->84629 84628->84613 84629->84628 84632 402ae0 75 API calls _realloc 84629->84632 84631 42a572 _realloc 84631->84613 84632->84631 84633 4034b0 84634 4034b9 84633->84634 84635 4034bd 84633->84635 84636 41171a 75 API calls 84635->84636 84637 42a0ba 84635->84637 84638 4034fe moneypunct _realloc 84636->84638 84639 431914 84640 431920 84639->84640 84641 431928 84640->84641 84642 43193d 84640->84642 84903 45e62e 116 API calls 3 library calls 84641->84903 84904 47f2b4 174 API calls 84642->84904 84645 43194a 84680 4095b0 moneypunct 84645->84680 84905 45e62e 116 API calls 3 library calls 84645->84905 84647 409708 84649 4097af 84649->84647 84890 40d590 VariantClear 84649->84890 84651 4315b8 WaitForSingleObject 84653 4315d6 GetExitCodeProcess CloseHandle 84651->84653 84651->84680 84652 431623 Sleep 84655 43163b timeGetTime 84652->84655 84677 409894 84652->84677 84894 40d590 VariantClear 84653->84894 84655->84677 84659 40986e Sleep 84661 409880 timeGetTime 84659->84661 84659->84677 84661->84677 84662 4098f1 TranslateMessage DispatchMessageW 84662->84680 84663 431673 CloseHandle 84663->84677 84664 43170c GetExitCodeProcess CloseHandle 84664->84677 84665 40d590 VariantClear 84665->84677 84666 46dd22 133 API calls 84666->84677 84668 46e641 134 API calls 84668->84677 84671 431781 Sleep 84671->84680 84675 45e62e 116 API calls 84675->84680 84677->84663 84677->84664 84677->84665 84677->84666 84677->84668 84677->84671 84677->84680 84682 4092c0 VariantClear 84677->84682 84891 447e59 75 API calls 84677->84891 84892 453b07 77 API calls 84677->84892 84893 4646a2 76 API calls 84677->84893 84895 444233 88 API calls _wcslen 84677->84895 84896 457509 VariantClear 84677->84896 84897 404120 84677->84897 84901 4717e3 VariantClear 84677->84901 84902 436272 6 API calls 84677->84902 84680->84647 84680->84649 84680->84651 84680->84652 84680->84659 84680->84662 84680->84675 84680->84677 84681 4319c9 VariantClear 84680->84681 84683 4092c0 VariantClear 84680->84683 84685 40b380 84680->84685 84709 409340 84680->84709 84742 409030 84680->84742 84756 40d300 84680->84756 84761 40d320 84680->84761 84767 409a40 84680->84767 84906 40e380 VariantClear moneypunct 84680->84906 84681->84680 84682->84677 84683->84680 84686 40b3a5 84685->84686 84687 40b53d 84685->84687 84690 40b3b6 84686->84690 84691 430a99 84686->84691 84907 45e62e 116 API calls 3 library calls 84687->84907 84694 430aae 84690->84694 84697 40b3f2 84690->84697 84708 40b4fd moneypunct 84690->84708 84908 45e62e 116 API calls 3 library calls 84691->84908 84693 40b528 84693->84680 84696 4092c0 VariantClear 84694->84696 84695 430dc9 84695->84695 84696->84693 84698 40b429 84697->84698 84700 430ae9 VariantClear 84697->84700 84701 40b476 moneypunct 84697->84701 84707 40b43b moneypunct 84698->84707 84909 40e380 VariantClear moneypunct 84698->84909 84699 40b4eb 84699->84708 84910 40e380 VariantClear moneypunct 84699->84910 84700->84707 84701->84699 84704 430d08 moneypunct 84701->84704 84702 430d41 VariantClear 84702->84708 84704->84702 84704->84708 84705 41171a 75 API calls 84705->84701 84707->84701 84707->84705 84708->84693 84911 45e62e 116 API calls 3 library calls 84708->84911 84710 409386 84709->84710 84716 409395 84709->84716 84912 4042f0 75 API calls __cinit 84710->84912 84713 42fba9 84916 45e62e 116 API calls 3 library calls 84713->84916 84715 42fc07 84918 45e62e 116 API calls 3 library calls 84715->84918 84716->84713 84716->84715 84718 42fc85 84716->84718 84720 42fcd8 84716->84720 84722 42fd4f 84716->84722 84726 42fd39 84716->84726 84730 40946f 84716->84730 84731 40947b 84716->84731 84733 4094c1 84716->84733 84738 4092c0 VariantClear 84716->84738 84741 409484 moneypunct 84716->84741 84915 453155 75 API calls 84716->84915 84917 40c620 118 API calls 84716->84917 84919 45e62e 116 API calls 3 library calls 84716->84919 84920 4781ae 140 API calls 84718->84920 84922 47f2b4 174 API calls 84720->84922 84724 4092c0 VariantClear 84722->84724 84724->84741 84725 42fc9c 84725->84741 84921 45e62e 116 API calls 3 library calls 84725->84921 84924 45e62e 116 API calls 3 library calls 84726->84924 84728 42fce9 84728->84741 84923 45e62e 116 API calls 3 library calls 84728->84923 84913 409210 VariantClear 84730->84913 84736 4092c0 VariantClear 84731->84736 84733->84741 84914 404260 76 API calls 84733->84914 84736->84741 84738->84716 84739 4094e1 84740 4092c0 VariantClear 84739->84740 84740->84741 84741->84680 84925 409110 117 API calls 84742->84925 84744 42ceb6 84935 410ae0 VariantClear moneypunct 84744->84935 84746 40906e 84746->84744 84748 42cea9 84746->84748 84750 4090a4 84746->84750 84747 42cebf 84934 45e62e 116 API calls 3 library calls 84748->84934 84926 404160 84750->84926 84753 4090f0 moneypunct 84753->84680 84754 4092c0 VariantClear 84755 4090be moneypunct 84754->84755 84755->84753 84755->84754 84757 4292e3 84756->84757 84760 40d30c 84756->84760 84758 429323 84757->84758 84759 4292fd TranslateAcceleratorW 84757->84759 84758->84680 84759->84760 84760->84680 84762 4296d0 84761->84762 84765 40d32f 84761->84765 84762->84680 84763 42972a IsDialogMessageW 84764 40d33c 84763->84764 84763->84765 84764->84680 84765->84763 84765->84764 85070 4340ec GetClassLongW 84765->85070 84768 409a66 _wcslen 84767->84768 84769 41171a 75 API calls 84768->84769 84828 40aade moneypunct _realloc 84768->84828 84770 409a9c _realloc 84769->84770 84771 41171a 75 API calls 84770->84771 84773 409abd 84771->84773 84776 409aeb CharUpperBuffW 84773->84776 84779 409b09 moneypunct 84773->84779 84773->84828 84774 42cee9 84775 41171a 75 API calls 84774->84775 84785 42cf10 _realloc 84775->84785 84776->84779 84817 409b88 moneypunct 84779->84817 85073 47d10e 150 API calls 84779->85073 84780 42dbb9 84781 4092c0 VariantClear 84780->84781 84782 42e5e0 84781->84782 85104 410ae0 VariantClear moneypunct 84782->85104 84784 42e5f2 85103 45e62e 116 API calls 3 library calls 84785->85103 84786 409e4a 84786->84785 84788 41171a 75 API calls 84786->84788 84792 409ea4 84786->84792 84787 40aa5b 84789 41171a 75 API calls 84787->84789 84788->84792 84811 40aa81 moneypunct _realloc 84789->84811 84790 409ed0 84794 42d50d 84790->84794 84851 409ef8 moneypunct _realloc 84790->84851 85082 40b800 VariantClear VariantClear moneypunct 84790->85082 84792->84790 84793 41171a 75 API calls 84792->84793 84795 42d480 84793->84795 84796 42d527 84794->84796 85083 40b800 VariantClear VariantClear moneypunct 84794->85083 84800 42d491 84795->84800 85078 44b3f6 75 API calls 84795->85078 84796->84851 85084 40e2e0 VariantClear moneypunct 84796->85084 84797 42d195 VariantClear 84797->84817 84799 40a3a7 84802 40a415 84799->84802 84849 42db5c 84799->84849 85079 40df50 75 API calls 84800->85079 84807 41171a 75 API calls 84802->84807 84803 4092c0 VariantClear 84803->84817 84825 40a41c 84807->84825 84809 41171a 75 API calls 84809->84817 84816 41171a 75 API calls 84811->84816 84812 42d4a6 85080 4530b3 75 API calls 84812->85080 84813 40be00 75 API calls 84813->84817 84814 42db96 85090 45e62e 116 API calls 3 library calls 84814->85090 84816->84828 84817->84780 84817->84785 84817->84786 84817->84787 84817->84797 84817->84803 84817->84809 84817->84811 84817->84813 84818 42d128 84817->84818 84822 42d20c 84817->84822 85074 40c3e0 75 API calls 84817->85074 85075 40c620 118 API calls 84817->85075 85077 40e380 VariantClear moneypunct 84817->85077 84820 4092c0 VariantClear 84818->84820 84824 42d131 84820->84824 84821 42d4d7 85081 4530b3 75 API calls 84821->85081 84822->84680 85076 410ae0 VariantClear moneypunct 84824->85076 84835 40a481 84825->84835 85091 40c8a0 VariantClear moneypunct 84825->85091 85072 401380 75 API calls 84828->85072 84832 402cc0 75 API calls 84832->84851 84833 4092c0 VariantClear 84862 40a534 moneypunct _realloc 84833->84862 84834 411421 74 API calls __cinit 84834->84851 84836 40a4ed 84835->84836 84837 42dc1e VariantClear 84835->84837 84835->84862 84841 40a4ff moneypunct 84836->84841 85092 40e380 VariantClear moneypunct 84836->85092 84837->84841 84840 41171a 75 API calls 84840->84862 84841->84840 84841->84862 84845 44b3f6 75 API calls 84845->84851 84846 42deb6 VariantClear 84846->84862 84847 41171a 75 API calls 84847->84851 84848 40a73c 84850 42e237 84848->84850 84858 40a76b 84848->84858 85089 4721e5 VariantClear 84849->85089 85096 46e709 VariantClear VariantClear moneypunct 84850->85096 84851->84799 84851->84814 84851->84828 84851->84832 84851->84834 84851->84845 84851->84847 84851->84849 84856 40a053 84851->84856 85085 45ee98 75 API calls 84851->85085 85086 4019e0 76 API calls 84851->85086 85087 404260 76 API calls 84851->85087 85088 409210 VariantClear 84851->85088 84852 42dfe9 VariantClear 84852->84862 84853 42df47 VariantClear 84853->84862 84855 40a7a2 84870 40a7ad moneypunct 84855->84870 85097 40b800 VariantClear VariantClear moneypunct 84855->85097 84856->84680 84857 40e380 VariantClear 84857->84862 84858->84855 84882 40a800 moneypunct 84858->84882 85071 40b800 VariantClear VariantClear moneypunct 84858->85071 84861 41171a 75 API calls 84866 42dd10 VariantInit VariantCopy 84861->84866 84862->84833 84862->84846 84862->84848 84862->84850 84862->84852 84862->84853 84862->84857 84862->84861 84869 41171a 75 API calls 84862->84869 85093 46e9cd 75 API calls 84862->85093 85094 409210 VariantClear 84862->85094 85095 44cc6c VariantClear moneypunct 84862->85095 84863 40a8b0 84876 40a8c2 moneypunct 84863->84876 85099 40e380 VariantClear moneypunct 84863->85099 84864 42e312 84865 42e337 VariantClear 84864->84865 84864->84876 84865->84876 84866->84862 84868 42dd30 VariantClear 84866->84868 84867 42e3b2 84877 42e3da VariantClear 84867->84877 84883 40a91a moneypunct 84867->84883 84868->84862 84869->84862 84871 40a7ee 84870->84871 84875 42e2a7 VariantClear 84870->84875 84870->84882 84871->84882 85098 40e380 VariantClear moneypunct 84871->85098 84873 40a908 84873->84883 85100 40e380 VariantClear moneypunct 84873->85100 84875->84882 84876->84867 84876->84873 84877->84883 84878 42e47f 84884 42e4a3 VariantClear 84878->84884 84889 40a957 moneypunct 84878->84889 84880 40a945 84880->84889 85101 40e380 VariantClear moneypunct 84880->85101 84882->84863 84882->84864 84883->84878 84883->84880 84884->84889 84886 40aa22 moneypunct 84886->84680 84887 42e559 VariantClear 84887->84889 84889->84886 84889->84887 85102 40e380 VariantClear moneypunct 84889->85102 84890->84647 84891->84677 84892->84677 84893->84677 84894->84677 84895->84677 84896->84677 84898 40412e 84897->84898 84899 4092c0 VariantClear 84898->84899 84900 404138 84899->84900 84900->84671 84901->84677 84902->84677 84903->84680 84904->84645 84905->84680 84906->84680 84907->84691 84908->84694 84909->84707 84910->84708 84911->84695 84912->84716 84913->84731 84914->84739 84915->84716 84916->84741 84917->84716 84918->84741 84919->84716 84920->84725 84921->84741 84922->84728 84923->84741 84924->84722 84925->84746 84927 4092c0 VariantClear 84926->84927 84928 40416e 84927->84928 84929 404120 VariantClear 84928->84929 84930 40419b 84929->84930 84936 40efe0 84930->84936 84944 4734b7 84930->84944 84931 4041c6 84931->84744 84931->84755 84934->84744 84935->84747 84937 40eff5 CreateFileW 84936->84937 84938 4299bf 84936->84938 84939 40f017 84937->84939 84938->84939 84940 4299c4 CreateFileW 84938->84940 84939->84931 84940->84939 84941 4299ea 84940->84941 84988 40e0d0 SetFilePointerEx SetFilePointerEx 84941->84988 84943 4299f5 84943->84939 84945 453063 111 API calls 84944->84945 84946 4734d7 84945->84946 84947 473545 84946->84947 84948 47350c 84946->84948 84989 463c42 84947->84989 84949 4092c0 VariantClear 84948->84949 84956 473514 84949->84956 84951 473558 84952 47355c 84951->84952 84969 473595 84951->84969 84953 4092c0 VariantClear 84952->84953 84962 473564 84953->84962 84954 473616 85002 463d7e 84954->85002 84956->84931 84957 473622 84959 473697 84957->84959 84960 47362c 84957->84960 84958 453063 111 API calls 84958->84969 85036 457838 84959->85036 84963 4092c0 VariantClear 84960->84963 84962->84931 84966 473634 84963->84966 84966->84931 84968 473655 84971 4092c0 VariantClear 84968->84971 84969->84954 84969->84958 84969->84968 85048 462f5a 87 API calls __wcsicoll 84969->85048 84981 47365d 84971->84981 84972 4736b0 85049 45e62e 116 API calls 3 library calls 84972->85049 84973 4736c9 85050 40e7e0 76 API calls 84973->85050 84976 4736ba GetCurrentProcess TerminateProcess 84976->84973 84977 4736db 84984 4736ff 84977->84984 85051 40d030 76 API calls 84977->85051 84978 473731 84985 473744 FreeLibrary 84978->84985 84986 47374b 84978->84986 84980 4736f1 85052 46b945 134 API calls 2 library calls 84980->85052 84981->84931 84984->84978 85053 40d030 76 API calls 84984->85053 85054 46b945 134 API calls 2 library calls 84984->85054 84985->84986 84986->84931 84988->84943 85055 45335b 76 API calls 84989->85055 84991 463c5d 85056 442c52 80 API calls _wcslen 84991->85056 84993 463c72 84995 40c060 75 API calls 84993->84995 85001 463cac 84993->85001 84996 463c8e 84995->84996 85057 4608ce 75 API calls _realloc 84996->85057 84998 463ca4 84999 40c740 75 API calls 84998->84999 84999->85001 85000 463cf7 85000->84951 85001->85000 85058 462f5a 87 API calls __wcsicoll 85001->85058 85003 453063 111 API calls 85002->85003 85004 463d99 85003->85004 85005 463de0 85004->85005 85006 463dca 85004->85006 85060 40c760 78 API calls 85005->85060 85059 453081 111 API calls 85006->85059 85009 463dd0 LoadLibraryW 85019 463e09 85009->85019 85010 463de7 85015 463e19 85010->85015 85061 40c760 78 API calls 85010->85061 85012 463e3e 85016 463e4e 85012->85016 85017 463e7b 85012->85017 85013 463dfb 85013->85015 85062 40c760 78 API calls 85013->85062 85015->84957 85063 40d500 75 API calls 85016->85063 85065 40c760 78 API calls 85017->85065 85019->85012 85019->85015 85021 463e57 85064 45efe7 77 API calls moneypunct 85021->85064 85022 463e82 GetProcAddress 85025 463e90 85022->85025 85024 463e62 GetProcAddress 85027 463e79 85024->85027 85025->85015 85026 463edf 85025->85026 85025->85027 85026->85015 85029 463eef FreeLibrary 85026->85029 85027->85025 85066 403470 75 API calls _realloc 85027->85066 85029->85015 85030 463eb4 85067 40d500 75 API calls 85030->85067 85032 463ebd 85068 45efe7 77 API calls moneypunct 85032->85068 85034 463ec8 GetProcAddress 85069 401330 moneypunct 85034->85069 85037 457a4c 85036->85037 85043 45785f _strcat moneypunct _wcslen _wcscpy 85036->85043 85044 410d40 85037->85044 85038 443576 78 API calls 85038->85043 85039 40c760 78 API calls 85039->85043 85040 453081 111 API calls 85040->85043 85041 4138ba 67 API calls _malloc 85041->85043 85042 40f580 77 API calls 85042->85043 85043->85037 85043->85038 85043->85039 85043->85040 85043->85041 85043->85042 85045 410d55 85044->85045 85046 410ded VirtualProtect 85045->85046 85047 410dbb 85045->85047 85046->85047 85047->84972 85047->84973 85048->84969 85049->84976 85050->84977 85051->84980 85052->84984 85053->84984 85054->84984 85055->84991 85056->84993 85057->84998 85058->85000 85059->85009 85060->85010 85061->85013 85062->85019 85063->85021 85064->85024 85065->85022 85066->85030 85067->85032 85068->85034 85069->85026 85070->84765 85071->84855 85072->84774 85073->84779 85074->84817 85075->84817 85076->84886 85077->84817 85078->84800 85079->84812 85080->84821 85081->84790 85082->84794 85083->84796 85084->84851 85085->84851 85086->84851 85087->84851 85088->84851 85089->84814 85090->84780 85091->84825 85092->84841 85093->84862 85094->84862 85095->84862 85096->84855 85097->84870 85098->84882 85099->84876 85100->84883 85101->84889 85102->84889 85103->84780 85104->84784 85105 40a199 85106 41171a 75 API calls 85105->85106 85143 409f10 moneypunct _realloc 85106->85143 85107 44b3f6 75 API calls 85107->85143 85108 411421 74 API calls __cinit 85108->85143 85109 40ab0b 85187 401380 75 API calls 85109->85187 85111 42cee9 85112 41171a 75 API calls 85111->85112 85114 42cf10 _realloc 85112->85114 85113 40a3a7 85115 40a415 85113->85115 85116 42db5c 85113->85116 85206 45e62e 116 API calls 3 library calls 85114->85206 85119 41171a 75 API calls 85115->85119 85192 4721e5 VariantClear 85116->85192 85126 40a41c 85119->85126 85120 4092c0 VariantClear 85123 42e5e0 85120->85123 85121 42db96 85193 45e62e 116 API calls 3 library calls 85121->85193 85207 410ae0 VariantClear moneypunct 85123->85207 85134 40a481 85126->85134 85194 40c8a0 VariantClear moneypunct 85126->85194 85128 42dbb9 85128->85120 85130 42e5f2 85131 4092c0 VariantClear 85159 40a534 moneypunct _realloc 85131->85159 85132 40a053 85133 402cc0 75 API calls 85133->85143 85135 40a4ed 85134->85135 85137 42dc1e VariantClear 85134->85137 85134->85159 85141 40a4ff moneypunct 85135->85141 85195 40e380 VariantClear moneypunct 85135->85195 85137->85141 85140 41171a 75 API calls 85140->85159 85141->85140 85141->85159 85143->85107 85143->85108 85143->85109 85143->85113 85143->85116 85143->85121 85143->85132 85143->85133 85145 41171a 75 API calls 85143->85145 85188 45ee98 75 API calls 85143->85188 85189 4019e0 76 API calls 85143->85189 85190 404260 76 API calls 85143->85190 85191 409210 VariantClear 85143->85191 85145->85143 85146 42deb6 VariantClear 85146->85159 85147 40a73c 85148 42e237 85147->85148 85154 40a76b 85147->85154 85199 46e709 VariantClear VariantClear moneypunct 85148->85199 85149 42dfe9 VariantClear 85149->85159 85150 42df47 VariantClear 85150->85159 85152 40a7a2 85165 40a7ad moneypunct 85152->85165 85200 40b800 VariantClear VariantClear moneypunct 85152->85200 85153 40e380 VariantClear 85153->85159 85154->85152 85178 40a800 moneypunct 85154->85178 85186 40b800 VariantClear VariantClear moneypunct 85154->85186 85157 41171a 75 API calls 85157->85159 85158 41171a 75 API calls 85163 42dd10 VariantInit VariantCopy 85158->85163 85159->85131 85159->85146 85159->85147 85159->85148 85159->85149 85159->85150 85159->85153 85159->85157 85159->85158 85196 46e9cd 75 API calls 85159->85196 85197 409210 VariantClear 85159->85197 85198 44cc6c VariantClear moneypunct 85159->85198 85160 40a8b0 85172 40a8c2 moneypunct 85160->85172 85202 40e380 VariantClear moneypunct 85160->85202 85161 42e312 85162 42e337 VariantClear 85161->85162 85161->85172 85162->85172 85163->85159 85168 42dd30 VariantClear 85163->85168 85164 42e3b2 85173 42e3da VariantClear 85164->85173 85179 40a91a moneypunct 85164->85179 85166 40a7ee 85165->85166 85171 42e2a7 VariantClear 85165->85171 85165->85178 85166->85178 85201 40e380 VariantClear moneypunct 85166->85201 85168->85159 85169 40a908 85169->85179 85203 40e380 VariantClear moneypunct 85169->85203 85171->85178 85172->85164 85172->85169 85173->85179 85174 42e47f 85180 42e4a3 VariantClear 85174->85180 85185 40a957 moneypunct 85174->85185 85177 40a945 85177->85185 85204 40e380 VariantClear moneypunct 85177->85204 85178->85160 85178->85161 85179->85174 85179->85177 85180->85185 85182 40aa22 moneypunct 85183 42e559 VariantClear 85183->85185 85185->85182 85185->85183 85205 40e380 VariantClear moneypunct 85185->85205 85186->85152 85187->85111 85188->85143 85189->85143 85190->85143 85191->85143 85192->85121 85193->85128 85194->85126 85195->85141 85196->85159 85197->85159 85198->85159 85199->85152 85200->85165 85201->85178 85202->85172 85203->85179 85204->85185 85205->85185 85206->85128 85207->85130 85208 42919b 85213 40ef10 85208->85213 85211 411421 __cinit 74 API calls 85212 4291aa 85211->85212 85214 41171a 75 API calls 85213->85214 85215 40ef17 85214->85215 85216 42ad48 85215->85216 85221 40ef40 74 API calls __cinit 85215->85221 85218 40ef2a 85222 40e470 85218->85222 85221->85218 85223 40c060 75 API calls 85222->85223 85224 40e483 GetVersionExW 85223->85224 85225 4021e0 75 API calls 85224->85225 85226 40e4bb 85225->85226 85248 40e600 85226->85248 85232 42accc 85234 42ad28 GetSystemInfo 85232->85234 85237 42ad38 GetSystemInfo 85234->85237 85235 40e557 GetCurrentProcess 85268 40ee30 LoadLibraryA GetProcAddress 85235->85268 85236 40e56c 85236->85237 85261 40eee0 85236->85261 85241 40e5c9 85265 40eea0 85241->85265 85244 40e5e0 85246 40e5f1 FreeLibrary 85244->85246 85247 40e5f4 85244->85247 85245 40e5dd FreeLibrary 85245->85244 85246->85247 85247->85211 85249 40e60b 85248->85249 85250 40c740 75 API calls 85249->85250 85251 40e4c2 85250->85251 85252 40e620 85251->85252 85253 40e62a 85252->85253 85254 42ac93 85253->85254 85255 40c740 75 API calls 85253->85255 85256 40e4ce 85255->85256 85256->85232 85257 40ee70 85256->85257 85258 40e551 85257->85258 85259 40ee76 LoadLibraryA 85257->85259 85258->85235 85258->85236 85259->85258 85260 40ee87 GetProcAddress 85259->85260 85260->85258 85262 40e5bf 85261->85262 85263 40eee6 LoadLibraryA 85261->85263 85262->85234 85262->85241 85263->85262 85264 40eef7 GetProcAddress 85263->85264 85264->85262 85269 40eec0 LoadLibraryA GetProcAddress 85265->85269 85267 40e5d3 GetNativeSystemInfo 85267->85244 85267->85245 85268->85236 85269->85267 85270 42e89e 85277 40c000 85270->85277 85272 42e8ac 85273 409a40 165 API calls 85272->85273 85274 42e8ca 85273->85274 85288 44b92e VariantClear 85274->85288 85276 42f3ae 85278 40c014 85277->85278 85279 40c007 85277->85279 85280 40c01a 85278->85280 85281 40c02c 85278->85281 85289 409210 VariantClear 85279->85289 85290 409210 VariantClear 85280->85290 85284 41171a 75 API calls 85281->85284 85287 40c033 85284->85287 85285 40c00f 85285->85272 85286 40c023 85286->85272 85287->85272 85288->85276 85289->85285 85290->85286
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00409A61
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                    • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                    • String ID: 0vH$4RH
                                                    • API String ID: 1143807570-2085553193
                                                    • Opcode ID: 7b2637cd2a587f620c9938fb5b9b59ed84abee97a557bf1eb096015dace6ef80
                                                    • Instruction ID: 7c8f52bff4b3ea9a641e6aac08ab5e1c8beb32691f0f21fab5f23224d73a3634
                                                    • Opcode Fuzzy Hash: 7b2637cd2a587f620c9938fb5b9b59ed84abee97a557bf1eb096015dace6ef80
                                                    • Instruction Fuzzy Hash: 34238170A043109FD724DF25D480A6BB7E1BF89304F54896EE84A9B391D739EC46CB9B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1266 40e470-40e500 call 40c060 GetVersionExW call 4021e0 call 40e600 call 40e620 1275 40e506-40e509 1266->1275 1276 42accc-42acd1 1266->1276 1279 40e540-40e555 call 40ee70 1275->1279 1280 40e50b-40e51c 1275->1280 1277 42acd3-42acdb 1276->1277 1278 42acdd-42ace0 1276->1278 1281 42ad12-42ad20 1277->1281 1282 42ace2-42aceb 1278->1282 1283 42aced-42acf0 1278->1283 1297 40e557-40e573 GetCurrentProcess call 40ee30 1279->1297 1298 40e579-40e5a8 1279->1298 1284 40e522-40e525 1280->1284 1285 42ac9b-42aca7 1280->1285 1296 42ad28-42ad2d GetSystemInfo 1281->1296 1282->1281 1283->1281 1287 42acf2-42ad06 1283->1287 1284->1279 1288 40e527-40e537 1284->1288 1290 42acb2-42acba 1285->1290 1291 42aca9-42acad 1285->1291 1292 42ad08-42ad0c 1287->1292 1293 42ad0e 1287->1293 1294 42acbf-42acc7 1288->1294 1295 40e53d 1288->1295 1290->1279 1291->1279 1292->1281 1293->1281 1294->1279 1295->1279 1299 42ad38-42ad3d GetSystemInfo 1296->1299 1297->1298 1307 40e575 1297->1307 1298->1299 1300 40e5ae-40e5c3 call 40eee0 1298->1300 1300->1296 1306 40e5c9-40e5db call 40eea0 GetNativeSystemInfo 1300->1306 1310 40e5e0-40e5ef 1306->1310 1311 40e5dd-40e5de FreeLibrary 1306->1311 1307->1298 1312 40e5f1-40e5f2 FreeLibrary 1310->1312 1313 40e5f4-40e5ff 1310->1313 1311->1310 1312->1313
                                                    APIs
                                                    • GetVersionExW.KERNEL32 ref: 0040E495
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    • GetCurrentProcess.KERNEL32(?,?), ref: 0040E560
                                                    • GetNativeSystemInfo.KERNELBASE(?,?), ref: 0040E5D3
                                                    • FreeLibrary.KERNEL32(?), ref: 0040E5DE
                                                    • FreeLibrary.KERNEL32(?), ref: 0040E5F2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_wcslen
                                                    • String ID: pMH
                                                    • API String ID: 2923339712-2522892712
                                                    • Opcode ID: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                                    • Instruction ID: 31d199e0849a18b4fe3a20375a839c17b1fda7a8e5a404adfed2e153d323e8b3
                                                    • Opcode Fuzzy Hash: 3f36deb7b7369dd68d3c05326faf84e57561e58110467ef3184d2bc56fc1d5cf
                                                    • Instruction Fuzzy Hash: D4612E71508792AEC311CB69C44425ABFE07B6A308F580E6EE48483A42D379E568C7AB
                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EB55,0040D86E), ref: 0040EB7B
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EB8D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: IsThemeActive$uxtheme.dll
                                                    • API String ID: 2574300362-3542929980
                                                    • Opcode ID: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                                    • Instruction ID: e8120cabfd18d8fe06d2f96d8b82b2b5a4bcadd10797c678d2963416b1e4c3b8
                                                    • Opcode Fuzzy Hash: 9e55e894ab04f38af4b02d6559f2dae0f2ca0bab174211e780b997e8b6ae5f43
                                                    • Instruction Fuzzy Hash: 05D0C9B49407039AD7306F72C918B0A7BE4AB50342F204C3EF996A1694DBBCD0508B28

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00410C44
                                                    • __wsplitpath.LIBCMT ref: 00410C61
                                                      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                    • _wcsncat.LIBCMT ref: 00410C78
                                                    • __wmakepath.LIBCMT ref: 00410C94
                                                      • Part of subcall function 00413E3C: __wmakepath_s.LIBCMT ref: 00413E52
                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                    • _wcscpy.LIBCMT ref: 00410CCC
                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00020019,?), ref: 00410CE9
                                                    • RegQueryValueExW.ADVAPI32 ref: 00429BE4
                                                    • _wcscat.LIBCMT ref: 00429C43
                                                    • _wcslen.LIBCMT ref: 00429C55
                                                    • _wcslen.LIBCMT ref: 00429C66
                                                    • _wcscat.LIBCMT ref: 00429C80
                                                    • _wcsncpy.LIBCMT ref: 00429CC0
                                                    • RegCloseKey.ADVAPI32(?), ref: 00429CDE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcscat_wcslen$CloseException@8FileModuleNameOpenQueryThrowValue__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpystd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\
                                                    • API String ID: 1004883554-2276155026
                                                    • Opcode ID: d7f6643cad26fd3001d91627fc5ef1af4f656d40d4c5ca14c02d7ab544e78cf5
                                                    • Instruction ID: ef4714a7fd58501e566ba693257e1f196c1b97611c18bc9c35ab262cfa7686fb
                                                    • Opcode Fuzzy Hash: d7f6643cad26fd3001d91627fc5ef1af4f656d40d4c5ca14c02d7ab544e78cf5
                                                    • Instruction Fuzzy Hash: B961B3B1508340DFC300EF65EC8599BBBE8FB99704F44882EF544C3261EBB59948CB5A
                                                    APIs
                                                      • Part of subcall function 00409A40: _wcslen.LIBCMT ref: 00409A61
                                                      • Part of subcall function 00409A40: CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                    • Sleep.KERNEL32(0000000A), ref: 00409870
                                                    • timeGetTime.WINMM ref: 00409880
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: BuffCharSleepTimeUpper_wcslentime
                                                    • String ID:
                                                    • API String ID: 3219444185-0
                                                    • Opcode ID: da6b74c52f7fd8fa7285d44dc66266380a963bd06260c315e722df216112258b
                                                    • Instruction ID: 79dfb759edd1749a95aa3438e3198289cebfc990e9c1b7da565b255c5aac8c6d
                                                    • Opcode Fuzzy Hash: da6b74c52f7fd8fa7285d44dc66266380a963bd06260c315e722df216112258b
                                                    • Instruction Fuzzy Hash: D422F171608342ABC724DF64C984BABB7A0BF89304F14492FE54997392D77CEC45CB9A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1156 4161c2-4161d1 1157 4161d3-4161df 1156->1157 1158 4161fa 1156->1158 1157->1158 1159 4161e1-4161e8 1157->1159 1160 4161fd-416209 call 41aa31 1158->1160 1159->1158 1161 4161ea-4161f8 1159->1161 1164 416213-41621a call 416e29 1160->1164 1165 41620b-416212 call 41616a 1160->1165 1161->1160 1170 416224-416233 call 41843a call 41b669 1164->1170 1171 41621c-416223 call 41616a 1164->1171 1165->1164 1178 416235-41623c call 4117af 1170->1178 1179 41623d-416258 GetCommandLineW call 42235f call 4222b1 1170->1179 1171->1170 1178->1179 1186 416262-416269 call 422082 1179->1186 1187 41625a-416261 call 4117af 1179->1187 1192 416273-41627c call 41186e 1186->1192 1193 41626b-416272 call 4117af 1186->1193 1187->1186 1198 416285-41628d call 42203c 1192->1198 1199 41627e-416284 call 4117af 1192->1199 1193->1192 1204 416295-416297 1198->1204 1205 41628f-416293 1198->1205 1199->1198 1206 416298-4162a0 call 40d7f0 1204->1206 1205->1206 1208 4162a5-4162ab 1206->1208 1209 4162b3-41630f call 411a4b call 4171d1 1208->1209 1210 4162ad-4162ae call 411a1f 1208->1210 1210->1209
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __amsg_exit$_fast_error_exit$CommandInitializeLine__cinit__ioinit__mtinit__wsetargv__wsetenvp__wwincmdln
                                                    • String ID:
                                                    • API String ID: 2477803136-0
                                                    • Opcode ID: 5c6ad9204277a855c32b49e0d8ca3a5fd5782e976c2a5896ff1cb7bad4d5bdf3
                                                    • Instruction ID: 5d71fe406d9f608d9de966b229f2038f561e79c4b175df4472a1e640f9164680
                                                    • Opcode Fuzzy Hash: 5c6ad9204277a855c32b49e0d8ca3a5fd5782e976c2a5896ff1cb7bad4d5bdf3
                                                    • Instruction Fuzzy Hash: 6A21A671D00315A9DB14BBB2A9467EE2664AF1074CF1144AFF9056A2D3EEBCC8C1461D

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_fseek_wcscpy
                                                    • String ID: FILE
                                                    • API String ID: 3888824918-3121273764
                                                    • Opcode ID: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                                    • Instruction ID: c0f9aeb359a44d31a21a8716142a7f32772eb03c7b5129f1ec28ea3a2d041f76
                                                    • Opcode Fuzzy Hash: e8200e6015bbe3313da03f0c122791b2111f624a8fcd35516e511649d5e709ac
                                                    • Instruction Fuzzy Hash: D541EFB1504300BBD310EB55CC81FEB73A9AFC8718F54491EFA8457181F679E644C7AA

                                                    Control-flow Graph

                                                    APIs
                                                    • GetSysColorBrush.USER32 ref: 00410326
                                                    • RegisterClassExW.USER32 ref: 00410359
                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                                    • InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                                    • LoadIconW.USER32(00400000,000000A9), ref: 004103B1
                                                    • ImageList_ReplaceIcon.COMCTL32(009CF240,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                    • API String ID: 2914291525-1005189915
                                                    • Opcode ID: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                                    • Instruction ID: c8c51aded5b6d43d10953d3ded2c15c159303f3bf9a059b11759766ceadcbce4
                                                    • Opcode Fuzzy Hash: b078764552fc12f322907e2d646497bc841117f43cad8f480623bc49e689b681
                                                    • Instruction Fuzzy Hash: 9F2129B4518301AFD340DF64D888B4EBFF4FB89704F008A2EF685962A0E7B58144CF5A

                                                    Control-flow Graph

                                                    APIs
                                                    • GetSysColorBrush.USER32(0000000F), ref: 004101F9
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00410209
                                                    • LoadIconW.USER32(?,00000063), ref: 0041021F
                                                    • LoadIconW.USER32(?,000000A4), ref: 00410232
                                                    • LoadIconW.USER32(?,000000A2), ref: 00410245
                                                    • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
                                                    • RegisterClassExW.USER32 ref: 004102C6
                                                      • Part of subcall function 004102F0: GetSysColorBrush.USER32 ref: 00410326
                                                      • Part of subcall function 004102F0: RegisterClassExW.USER32 ref: 00410359
                                                      • Part of subcall function 004102F0: RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,?), ref: 0041036A
                                                      • Part of subcall function 004102F0: InitCommonControlsEx.COMCTL32(0000000F,?,?,?,?,?,?), ref: 0041038A
                                                      • Part of subcall function 004102F0: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,?,?,?,?,?), ref: 0041039A
                                                      • Part of subcall function 004102F0: LoadIconW.USER32(00400000,000000A9), ref: 004103B1
                                                      • Part of subcall function 004102F0: ImageList_ReplaceIcon.COMCTL32(009CF240,000000FF,00000000,?,?,?,?,?,?), ref: 004103C1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                    • String ID: #$0$PGH
                                                    • API String ID: 423443420-3673556320
                                                    • Opcode ID: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                                    • Instruction ID: 6be78a7d21e01e6533eb66d2751721d4fd39e3055bf34e10baa21603515e7cea
                                                    • Opcode Fuzzy Hash: 1033d1e55498f891403c4089579710d7d6683e73571bc8446147a2c837657170
                                                    • Instruction Fuzzy Hash: 60216DB5A18300AFD310CF59EC84A4A7FE4FB99710F00497FF648972A0D7B599408B99

                                                    Control-flow Graph

                                                    APIs
                                                    • _fseek.LIBCMT ref: 004525DA
                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                                      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                                      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                                    • __fread_nolock.LIBCMT ref: 00452618
                                                    • __fread_nolock.LIBCMT ref: 00452629
                                                    • __fread_nolock.LIBCMT ref: 00452644
                                                    • __fread_nolock.LIBCMT ref: 00452661
                                                    • _fseek.LIBCMT ref: 0045267D
                                                    • _malloc.LIBCMT ref: 00452689
                                                    • _malloc.LIBCMT ref: 00452696
                                                    • __fread_nolock.LIBCMT ref: 004526A7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_fseek_malloc_wcscpy
                                                    • String ID:
                                                    • API String ID: 1911931848-0
                                                    • Opcode ID: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                                    • Instruction ID: daf5751c9f96f1f9c2235ce4d63c31b1673d17b5fb5ed0b9a51dc370059b243a
                                                    • Opcode Fuzzy Hash: 3570a21b3fd7755177810c9e6035fea9311faeeb4ffbf150b354229a8e607498
                                                    • Instruction Fuzzy Hash: 47514CB1A08340AFD310DF5AD881A9BF7E9FFC8704F40492EF68887241D77AE5448B5A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1356 40f450-40f45c call 425210 1359 40f460-40f478 1356->1359 1359->1359 1360 40f47a-40f4a8 call 413990 call 410f70 1359->1360 1365 40f4b0-40f4d1 call 4151b0 1360->1365 1368 40f531 1365->1368 1369 40f4d3-40f4da 1365->1369 1372 40f536-40f540 1368->1372 1370 40f4dc-40f4de 1369->1370 1371 40f4fd-40f517 call 41557c 1369->1371 1373 40f4e0-40f4e2 1370->1373 1376 40f51c-40f51f 1371->1376 1375 40f4e6-40f4ed 1373->1375 1377 40f521-40f52c 1375->1377 1378 40f4ef-40f4f2 1375->1378 1376->1365 1381 40f543-40f54e 1377->1381 1382 40f52e-40f52f 1377->1382 1379 42937a-4293a0 call 41557c call 4151b0 1378->1379 1380 40f4f8-40f4fb 1378->1380 1393 4293a5-4293c3 call 4151d0 1379->1393 1380->1371 1380->1373 1383 40f550-40f553 1381->1383 1384 40f555-40f560 1381->1384 1382->1378 1383->1378 1386 429372 1384->1386 1387 40f566-40f571 1384->1387 1386->1379 1389 429361-429367 1387->1389 1390 40f577-40f57a 1387->1390 1389->1375 1392 42936d 1389->1392 1390->1378 1392->1386 1393->1372
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock_fseek_strcat
                                                    • String ID: AU3!$EA06
                                                    • API String ID: 3818483258-2658333250
                                                    • Opcode ID: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                                    • Instruction ID: a326fe91d6bb541f17a8cee8b09d92be642ba4032c5aa5fe266a96c6f27d1a6c
                                                    • Opcode Fuzzy Hash: 61a815b4762265f9d00ad5303640aa958846bc8ab5516fbcebd88596bc1aced3
                                                    • Instruction Fuzzy Hash: 2B416C7160C340ABC331DA24C841AEB77A59B95308F68087EF5C597683E578E44A876B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1396 410130-410142 SHGetMalloc 1397 410148-410158 SHGetDesktopFolder 1396->1397 1398 42944f-429459 call 411691 1396->1398 1399 4101d1-4101e0 1397->1399 1400 41015a-410188 call 411691 1397->1400 1399->1398 1406 4101e6-4101ee 1399->1406 1408 4101c5-4101ce 1400->1408 1409 41018a-4101a1 SHGetPathFromIDListW 1400->1409 1408->1399 1410 4101a3-4101b1 call 411691 1409->1410 1411 4101b4-4101c0 1409->1411 1410->1411 1411->1408
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$DesktopFolderFromListMallocPath
                                                    • String ID: C:\Users\user\Desktop\FSRHC6mB16.exe
                                                    • API String ID: 192938534-690544295
                                                    • Opcode ID: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                                    • Instruction ID: 2fe23ff91bf644c1e681f842d3c1e96d6f0f177144f23c1ad52f1bdc7517ad48
                                                    • Opcode Fuzzy Hash: 41672701d810a85b6866b378b1839c38d53fca73f5daf9d2a63f2dfb0070f590
                                                    • Instruction Fuzzy Hash: 822179B5604211AFC210EB64DC84DABB3ECEFC8704F14891DF94987210E739ED46CBA6

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1414 401230-40123b 1415 401241-401272 call 4131f0 call 401be0 1414->1415 1416 4012c5-4012cd 1414->1416 1421 401274-401292 1415->1421 1422 4012ae-4012bf KillTimer SetTimer 1415->1422 1423 42aa61-42aa67 1421->1423 1424 401298-40129c 1421->1424 1422->1416 1427 42aa8b-42aaa7 Shell_NotifyIconW 1423->1427 1428 42aa69-42aa86 Shell_NotifyIconW 1423->1428 1425 4012a2-4012a8 1424->1425 1426 42aaac-42aab3 1424->1426 1425->1422 1429 42aaf8-42ab15 Shell_NotifyIconW 1425->1429 1430 42aad7-42aaf3 Shell_NotifyIconW 1426->1430 1431 42aab5-42aad2 Shell_NotifyIconW 1426->1431 1427->1422 1428->1422 1429->1422 1430->1422 1431->1422
                                                    APIs
                                                    • _memset.LIBCMT ref: 00401257
                                                      • Part of subcall function 00401BE0: _memset.LIBCMT ref: 00401C62
                                                      • Part of subcall function 00401BE0: _wcsncpy.LIBCMT ref: 00401CA1
                                                      • Part of subcall function 00401BE0: _wcscpy.LIBCMT ref: 00401CBD
                                                      • Part of subcall function 00401BE0: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                                    • KillTimer.USER32(?,?), ref: 004012B0
                                                    • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012BF
                                                    • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AA80
                                                    • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AACC
                                                    • Shell_NotifyIconW.SHELL32(?,?), ref: 0042AB0F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell_$Timer_memset$Kill_wcscpy_wcsncpy
                                                    • String ID:
                                                    • API String ID: 1792922140-0
                                                    • Opcode ID: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                                                    • Instruction ID: 78dbdb20408675f5dda5a176dd8a03fc230073daf987e80dd157250a536ae6f7
                                                    • Opcode Fuzzy Hash: a7115ab057bf29602ed6c82bb799c717f5f73d3545905a596edaeb05fb95c8cc
                                                    • Instruction Fuzzy Hash: 56319670609642BFD319CB24D544B9BFBE8BF85304F04856EF488A3251C7789A19D7AB

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1432 3f52620-3f526ce call 3f50040 1435 3f526d5-3f526fb call 3f53530 CreateFileW 1432->1435 1438 3f52702-3f52712 1435->1438 1439 3f526fd 1435->1439 1444 3f52714 1438->1444 1445 3f52719-3f52733 VirtualAlloc 1438->1445 1440 3f5284d-3f52851 1439->1440 1442 3f52893-3f52896 1440->1442 1443 3f52853-3f52857 1440->1443 1446 3f52899-3f528a0 1442->1446 1447 3f52863-3f52867 1443->1447 1448 3f52859-3f5285c 1443->1448 1444->1440 1451 3f52735 1445->1451 1452 3f5273a-3f52751 ReadFile 1445->1452 1453 3f528f5-3f5290a 1446->1453 1454 3f528a2-3f528ad 1446->1454 1449 3f52877-3f5287b 1447->1449 1450 3f52869-3f52873 1447->1450 1448->1447 1457 3f5287d-3f52887 1449->1457 1458 3f5288b 1449->1458 1450->1449 1451->1440 1459 3f52753 1452->1459 1460 3f52758-3f52798 VirtualAlloc 1452->1460 1455 3f5290c-3f52917 VirtualFree 1453->1455 1456 3f5291a-3f52922 1453->1456 1461 3f528b1-3f528bd 1454->1461 1462 3f528af 1454->1462 1455->1456 1457->1458 1458->1442 1459->1440 1463 3f5279f-3f527ba call 3f53780 1460->1463 1464 3f5279a 1460->1464 1465 3f528d1-3f528dd 1461->1465 1466 3f528bf-3f528cf 1461->1466 1462->1453 1472 3f527c5-3f527cf 1463->1472 1464->1440 1467 3f528df-3f528e8 1465->1467 1468 3f528ea-3f528f0 1465->1468 1470 3f528f3 1466->1470 1467->1470 1468->1470 1470->1446 1473 3f527d1-3f52800 call 3f53780 1472->1473 1474 3f52802-3f52816 call 3f53590 1472->1474 1473->1472 1480 3f52818 1474->1480 1481 3f5281a-3f5281e 1474->1481 1480->1440 1482 3f52820-3f52824 CloseHandle 1481->1482 1483 3f5282a-3f5282e 1481->1483 1482->1483 1484 3f52830-3f5283b VirtualFree 1483->1484 1485 3f5283e-3f52847 1483->1485 1484->1485 1485->1435 1485->1440
                                                    APIs
                                                    • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 03F526F1
                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 03F52917
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateFileFreeVirtual
                                                    • String ID:
                                                    • API String ID: 204039940-0
                                                    • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                    • Instruction ID: 45f2bb7499d4eef341e1089e631c0ef27293e1e7e6583f9c339e6b2cc6d4a425
                                                    • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                    • Instruction Fuzzy Hash: 80A11975E00209EBDB14CFE4C994BEEBBB5BF48305F248699E601BB280D7759A41CF94

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1486 414f10-414f2c 1487 414f4f 1486->1487 1488 414f2e-414f31 1486->1488 1489 414f51-414f55 1487->1489 1488->1487 1490 414f33-414f35 1488->1490 1491 414f37-414f46 call 417f23 1490->1491 1492 414f56-414f5b 1490->1492 1504 414f47-414f4c call 417ebb 1491->1504 1493 414f6a-414f6d 1492->1493 1494 414f5d-414f68 1492->1494 1497 414f7a-414f7c 1493->1497 1498 414f6f-414f77 call 4131f0 1493->1498 1494->1493 1496 414f8b-414f9e 1494->1496 1502 414fa0-414fa6 1496->1502 1503 414fa8 1496->1503 1497->1491 1501 414f7e-414f89 1497->1501 1498->1497 1501->1491 1501->1496 1506 414faf-414fb1 1502->1506 1503->1506 1504->1487 1508 4150a1-4150a4 1506->1508 1509 414fb7-414fbe 1506->1509 1508->1489 1511 414fc0-414fc5 1509->1511 1512 415004-415007 1509->1512 1511->1512 1515 414fc7 1511->1515 1513 415071-415072 call 41e6b1 1512->1513 1514 415009-41500d 1512->1514 1523 415077-41507b 1513->1523 1519 41500f-415018 1514->1519 1520 41502e-415035 1514->1520 1516 415102 1515->1516 1517 414fcd-414fd1 1515->1517 1526 415106-41510f 1516->1526 1521 414fd3 1517->1521 1522 414fd5-414fd8 1517->1522 1524 415023-415028 1519->1524 1525 41501a-415021 1519->1525 1527 415037 1520->1527 1528 415039-41503c 1520->1528 1521->1522 1529 4150a9-4150af 1522->1529 1530 414fde-414fff call 41ee9b 1522->1530 1523->1526 1531 415081-415085 1523->1531 1532 41502a-41502c 1524->1532 1525->1532 1526->1489 1527->1528 1533 415042-41504e call 41453a call 41ed9e 1528->1533 1534 4150d5-4150d9 1528->1534 1540 4150b1-4150bd call 4131f0 1529->1540 1541 4150c0-4150d0 call 417f23 1529->1541 1547 415099-41509b 1530->1547 1531->1534 1539 415087-415096 1531->1539 1532->1528 1554 415053-415058 1533->1554 1537 4150eb-4150fd call 417f23 1534->1537 1538 4150db-4150e8 call 4131f0 1534->1538 1537->1504 1538->1537 1539->1547 1540->1541 1541->1504 1547->1508 1547->1509 1555 415114-415118 1554->1555 1556 41505e-415061 1554->1556 1555->1526 1556->1516 1557 415067-41506f 1556->1557 1557->1547
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                    • String ID:
                                                    • API String ID: 3886058894-0
                                                    • Opcode ID: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                                    • Instruction ID: 085ef53bf2cba992f8731f00f2d52beda6aca72a1b803249d76dffc069a60243
                                                    • Opcode Fuzzy Hash: b117a392f3759847975495debe7ea87102f8b7de0bc78f8cbc322732e1c6b221
                                                    • Instruction Fuzzy Hash: CA510830900604EFCB208FA9C8445DFBBB5EFC5324F24825BF82596290D7799ED2CB99

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1558 4103e0-410461 CreateWindowExW * 2 ShowWindow * 2
                                                    APIs
                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
                                                    • ShowWindow.USER32(?,00000000), ref: 00410454
                                                    • ShowWindow.USER32(?,00000000), ref: 0041045E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateShow
                                                    • String ID: AutoIt v3$edit
                                                    • API String ID: 1584632944-3779509399
                                                    • Opcode ID: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                                    • Instruction ID: daa3d4afae2654ee996124117597f48fa5c574a0ac4b96d00400a8ba476d7f73
                                                    • Opcode Fuzzy Hash: 2f6e2284bb2ae2ba7cf4e865adc3bced08dc322388bda6343c860b78a8eff359
                                                    • Instruction Fuzzy Hash: F3F0A975BE4310BAF6609754AC43F592B59A765F00F3445ABB700BF1D0D6E478408B9C

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1559 3f523f0-3f5251f call 3f50040 call 3f522e0 CreateFileW 1566 3f52526-3f52536 1559->1566 1567 3f52521 1559->1567 1570 3f5253d-3f52557 VirtualAlloc 1566->1570 1571 3f52538 1566->1571 1568 3f525d6-3f525db 1567->1568 1572 3f52559 1570->1572 1573 3f5255b-3f52572 ReadFile 1570->1573 1571->1568 1572->1568 1574 3f52574 1573->1574 1575 3f52576-3f525b0 call 3f52320 call 3f512e0 1573->1575 1574->1568 1580 3f525b2-3f525c7 call 3f52370 1575->1580 1581 3f525cc-3f525d4 ExitProcess 1575->1581 1580->1581 1581->1568
                                                    APIs
                                                      • Part of subcall function 03F522E0: Sleep.KERNELBASE(000001F4), ref: 03F522F1
                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 03F52515
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateFileSleep
                                                    • String ID: 8OXZ57E7M7XNXS2JD
                                                    • API String ID: 2694422964-1573672394
                                                    • Opcode ID: 283d664b622a0ac78ab347d9138c29d9d425635740ba908b7c4c29f4e473f1f2
                                                    • Instruction ID: 6076be26da718de732ccb12e6e40f45bfb1c216a0db4553f5aede3bd5373dd77
                                                    • Opcode Fuzzy Hash: 283d664b622a0ac78ab347d9138c29d9d425635740ba908b7c4c29f4e473f1f2
                                                    • Instruction Fuzzy Hash: 97518171D14249EBEF11DBE4C814BEEBB79AF19300F004699E608BB2C0DB791B49CB65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1583 413a88-413a99 call 41718c 1586 413b10-413b15 call 4171d1 1583->1586 1587 413a9b-413aa2 1583->1587 1588 413aa4-413abc call 418407 call 419f6d 1587->1588 1589 413ae7 1587->1589 1601 413ac7-413ad7 call 413ade 1588->1601 1602 413abe-413ac6 call 419f9d 1588->1602 1591 413ae8-413af8 RtlFreeHeap 1589->1591 1591->1586 1594 413afa-413b0f call 417f23 GetLastError call 417ee1 1591->1594 1594->1586 1601->1586 1608 413ad9-413adc 1601->1608 1602->1601 1608->1591
                                                    APIs
                                                    • __lock.LIBCMT ref: 00413AA6
                                                      • Part of subcall function 00418407: __mtinitlocknum.LIBCMT ref: 0041841D
                                                      • Part of subcall function 00418407: __amsg_exit.LIBCMT ref: 00418429
                                                      • Part of subcall function 00418407: EnterCriticalSection.KERNEL32(?,?,?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001), ref: 00418431
                                                    • ___sbh_find_block.LIBCMT ref: 00413AB1
                                                    • ___sbh_free_block.LIBCMT ref: 00413AC0
                                                    • RtlFreeHeap.NTDLL(00000000,00411739,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
                                                    • GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                    • String ID:
                                                    • API String ID: 2714421763-0
                                                    • Opcode ID: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                                    • Instruction ID: 54fb22c17cbd059cfb8714ef359fce415cc636064f476ff80f42ef981757bf49
                                                    • Opcode Fuzzy Hash: 1be655156b84d1756d47887b3dc267bc1ef03bd4322eaa0c22e254cdcea9361a
                                                    • Instruction Fuzzy Hash: 7401A731A08301BADF206F71AC09BDF3B64AF00759F10052FF544A6182DB7D9AC19B9C
                                                    APIs
                                                      • Part of subcall function 0040F580: _wcslen.LIBCMT ref: 0040F58A
                                                      • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0040F5A3
                                                      • Part of subcall function 0040F580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,-00000010,00000001,?,?,?,?), ref: 0040F5CC
                                                    • _strcat.LIBCMT ref: 0040F603
                                                      • Part of subcall function 0040F6A0: _memset.LIBCMT ref: 0040F6A8
                                                      • Part of subcall function 0040F6D0: _strlen.LIBCMT ref: 0040F6D8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$_memset_strcat_strlen_wcslen
                                                    • String ID: HH
                                                    • API String ID: 1194219731-2761332787
                                                    • Opcode ID: ee47fd20779ff5886c3c730aa44a1efa7791f275b5868e90dcef310a8da63108
                                                    • Instruction ID: 1fd31f67f6889806bd2ce24d6488871f5ee50ddf162d20410a363c4a19aba518
                                                    • Opcode Fuzzy Hash: ee47fd20779ff5886c3c730aa44a1efa7791f275b5868e90dcef310a8da63108
                                                    • Instruction Fuzzy Hash: 022158B260825067C724EF7A9C8266EF7D8AF85308F148C3FF554D2282F638D555879A
                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 03F51B0D
                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F51B31
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F51B53
                                                    • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 03F51E5C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                                    • String ID:
                                                    • API String ID: 572931308-0
                                                    • Opcode ID: 5c0c2c366f6ee379bfa73ed3ee6324b9c12a1226fce66c24c6c78c8833906ccb
                                                    • Instruction ID: cc770148fc933e352dd5b1327d9d944ceedaa51c774dbe1f98cbdc9827f61461
                                                    • Opcode Fuzzy Hash: 5c0c2c366f6ee379bfa73ed3ee6324b9c12a1226fce66c24c6c78c8833906ccb
                                                    • Instruction Fuzzy Hash: A0620E34A14258DBEB24CFA4C851BDEB375EF58300F1091A9E60DEB390E7799E81CB59
                                                    APIs
                                                    • _malloc.LIBCMT ref: 00411734
                                                      • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                                      • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                                      • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                                    • std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                      • Part of subcall function 004116B0: std::exception::exception.LIBCMT ref: 004116BC
                                                    • std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                    • __CxxThrowException@8.LIBCMT ref: 00411779
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                    • String ID:
                                                    • API String ID: 1411284514-0
                                                    • Opcode ID: ca7221cdd9cc9326792a0c346bb7c35cd30f9974032eaa45b6addcc39664c516
                                                    • Instruction ID: c554e94cc15d94fff19a40754e7570613bf3612ee9c26c673f8185df9075a277
                                                    • Opcode Fuzzy Hash: ca7221cdd9cc9326792a0c346bb7c35cd30f9974032eaa45b6addcc39664c516
                                                    • Instruction Fuzzy Hash: 6FF0E23550060A66CF08B723EC06ADE3B649F11798B10403BFA20552F2DF6DADC9865C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                                    • Instruction ID: a1f682be926937ece900e9fcc50ccc13891f43ead78ba7c6857800eee9f0599c
                                                    • Opcode Fuzzy Hash: c2b84d901eedfcb5732c73c427cf3e6a40f349a1394e6728fcd5bdf3f2a5d4d9
                                                    • Instruction Fuzzy Hash: EC81D2756043009FC310EF65C985B6AB7E4EF84315F008D2EF988AB392D779E909CB96
                                                    APIs
                                                    • RegOpenKeyExW.KERNELBASE(80000001,0040F0EE,00000000,00000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F132
                                                    • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F14F
                                                    • RegCloseKey.KERNELBASE(00000000,?,?,00000000,00000000,80000001,80000001,?,0040F0EE,80000001,Control Panel\Mouse,SwapMouseButtons,00000004,?,?,0044BA28), ref: 0040F159
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue
                                                    • String ID:
                                                    • API String ID: 3677997916-0
                                                    • Opcode ID: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                                    • Instruction ID: 6acd5c45b0bc896a902747136fbadff1bb775023c46fd22fba7b324c5144c726
                                                    • Opcode Fuzzy Hash: 2fc94d7b08a1a7677ebb25c0c676948635cded20fa34e442ec21f1e1bf5971ab
                                                    • Instruction Fuzzy Hash: 60F0BDB0204202ABD614DF54DD88E6BB7F9EF88704F10492DB585D7250D7B4A804CB26
                                                    APIs
                                                    • _malloc.LIBCMT ref: 00435278
                                                      • Part of subcall function 004138BA: __FF_MSGBANNER.LIBCMT ref: 004138DD
                                                      • Part of subcall function 004138BA: __NMSG_WRITE.LIBCMT ref: 004138E4
                                                      • Part of subcall function 004138BA: RtlAllocateHeap.NTDLL(00000000,0041172A,?,?,?,?,00411739,?,00401C0B), ref: 00413931
                                                    • _malloc.LIBCMT ref: 00435288
                                                    • _malloc.LIBCMT ref: 00435298
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _malloc$AllocateHeap
                                                    • String ID:
                                                    • API String ID: 680241177-0
                                                    • Opcode ID: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                                    • Instruction ID: 30b75876ff52ae1c35022de4a6700901ba1db26c97f4d16f7fcf584af9a5a73f
                                                    • Opcode Fuzzy Hash: d11b1792ef3d24f06ef5636d78d46cf58a843b0d423fa777cd48d8e801ebef30
                                                    • Instruction Fuzzy Hash: E5F0A0B1500F0046E660AB3198457C7A2E09B14307F00186FB6855618ADA7C69C4CEAC
                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 03F523CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID: D
                                                    • API String ID: 963392458-2746444292
                                                    • Opcode ID: d8032cd0c60c85bdcbdd1e95e32548ef73afa8e82147693fe147fc67f90273c0
                                                    • Instruction ID: b8e468a3a2a4b862fd561e5af00e10d580afd1dd8e886a2c815df6f40d1faf56
                                                    • Opcode Fuzzy Hash: d8032cd0c60c85bdcbdd1e95e32548ef73afa8e82147693fe147fc67f90273c0
                                                    • Instruction Fuzzy Hash: 5101FB75900308ABDB20DFE0CC49FEE777CAF44701F408A59BB16AA180EA749648CB61
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00401B71
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Exception@8Throw_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                    • String ID: @EXITCODE
                                                    • API String ID: 580348202-3436989551
                                                    • Opcode ID: 48d001a4b96ee351bc7679959485890c1c6d832d60c6cde5ea273d4c8ab31dfe
                                                    • Instruction ID: 288ad252d7dad0c090ff8240dee62855692e698d70424b42c0a66861a7771545
                                                    • Opcode Fuzzy Hash: 48d001a4b96ee351bc7679959485890c1c6d832d60c6cde5ea273d4c8ab31dfe
                                                    • Instruction Fuzzy Hash: 73F06DF2A002025BD7649B35DC0276776E4AB44704F18C83EE14AC7791F6BDE8829B15
                                                    APIs
                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 03F51B0D
                                                    • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03F51B31
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03F51B53
                                                    • TerminateProcess.KERNELBASE(00000000,00000000,?), ref: 03F51E5C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Process$ContextCreateMemoryReadTerminateThreadWow64
                                                    • String ID:
                                                    • API String ID: 572931308-0
                                                    • Opcode ID: cda9e504f2d45f499d696161523d23a525f419a6d7e2a7c62ebf8d064aefc9a0
                                                    • Instruction ID: e93ba079ba3abdbdcf2e8dc51f247727e14e02cb2ca765fdbef1b974fd3ae132
                                                    • Opcode Fuzzy Hash: cda9e504f2d45f499d696161523d23a525f419a6d7e2a7c62ebf8d064aefc9a0
                                                    • Instruction Fuzzy Hash: F812D024E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A4E77A5F81CF5A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ClearVariant
                                                    • String ID:
                                                    • API String ID: 1473721057-0
                                                    • Opcode ID: 6c16c26e9bf893d3f0825eaadb8974e969e989bbfb615565e5d5139426136a1e
                                                    • Instruction ID: 1f11e118333250ff1b1cce483c812f274274124743f71e781b8a547d9d3e43da
                                                    • Opcode Fuzzy Hash: 6c16c26e9bf893d3f0825eaadb8974e969e989bbfb615565e5d5139426136a1e
                                                    • Instruction Fuzzy Hash: 35917E706042009FC714DF55D890A6AB7E5EF89318F14896FF849AB392D738EE41CB9E
                                                    APIs
                                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0040DFD2,?,00000001,00403843,?), ref: 0040F00A
                                                    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000004,00000080,00000000,?,0040DFD2,?,00000001,00403843,?), ref: 004299D9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                                                    • Instruction ID: 855a981e3d87b0586b227f36a287a9e63fe5cd358b5bfab8de368ff291d46a89
                                                    • Opcode Fuzzy Hash: 7605a8ea73ac57d11bec7dd1d6207c313580f8ed20fa142c5c15d61e0266fbc2
                                                    • Instruction Fuzzy Hash: 67011D703803107AF2311F28AD5BF5632546B44B24F244B39FBD5BE2E2D2F86885970C
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __lock_file_memset
                                                    • String ID:
                                                    • API String ID: 26237723-0
                                                    • Opcode ID: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                                    • Instruction ID: c8a12bf2a45d0ac11074f8cac28b928f9e20b60047ac9024d749846706a082ab
                                                    • Opcode Fuzzy Hash: c74911371e76cb9dc4786cfdbe28690debad29cef5acae8c4501fea9e7903076
                                                    • Instruction Fuzzy Hash: 32012971C00609FBCF22AF65DC029DF3B31AF44714F04815BF82416261D7798AA2DF99
                                                    APIs
                                                      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                    • __lock_file.LIBCMT ref: 00414EE4
                                                      • Part of subcall function 00415965: __lock.LIBCMT ref: 0041598A
                                                    • __fclose_nolock.LIBCMT ref: 00414EEE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __decode_pointer__fclose_nolock__getptd_noexit__lock__lock_file
                                                    • String ID:
                                                    • API String ID: 717694121-0
                                                    • Opcode ID: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                                    • Instruction ID: 225a509e04b880138f2478077c57af59103cae2c072c29012e7845c0956b1514
                                                    • Opcode Fuzzy Hash: 6051778e024176e7de16a1974b8d1b3b80c3b8a23747dfcb666cdf4e7799d8f6
                                                    • Instruction Fuzzy Hash: DEF06270D0470499C721BB6A9802ADE7AB0AFC1338F21864FE479A72D1C77C46C29F5D
                                                    APIs
                                                    • TranslateMessage.USER32(?), ref: 004098F6
                                                    • DispatchMessageW.USER32(?), ref: 00409901
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Message$DispatchTranslate
                                                    • String ID:
                                                    • API String ID: 1706434739-0
                                                    • Opcode ID: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                                                    • Instruction ID: 6b3a2aeb923af73eb4cdb1bab797699f2cf27729a5018e8568c19fb4e3feaf67
                                                    • Opcode Fuzzy Hash: 743ba5b075e4e96b6aa8f27e888cbbcb244a1ef3297f43ff84cf2107d4412f6a
                                                    • Instruction Fuzzy Hash: D4F05471114301AEDA24DBE58D41B5BB3A8AFD8700F408C2EBA51E61C1FBF8E404C76A
                                                    APIs
                                                    • TranslateMessage.USER32(?), ref: 004098F6
                                                    • DispatchMessageW.USER32(?), ref: 00409901
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Message$DispatchTranslate
                                                    • String ID:
                                                    • API String ID: 1706434739-0
                                                    • Opcode ID: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                                                    • Instruction ID: cc4909b6a78c34842ee59a7900970f574117f06624f4f9c7373c79b1fb9dfc76
                                                    • Opcode Fuzzy Hash: fb629fc6ca96518639a0c0a81923e3da878f7f29ff55e6bd70df59113b88f2fd
                                                    • Instruction Fuzzy Hash: DDF054B1114301AADA14DBE58D41B5BB3A4AF94740F408C2EBA11E52C1EBFCD504C71A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ProtectVirtual
                                                    • String ID:
                                                    • API String ID: 544645111-0
                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction ID: fb1d736feddc8336b94c661b4f3a99b04f66f7614ca83ae43ac4a02a862e88ab
                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                    • Instruction Fuzzy Hash: 1331D574A00105DFC718DF99E490AAAFBA6FB49304B2486A6E409CB751D774EDC1CBC5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0d8ad4d875158e0120ed104e09085659f42b86f6d600f5d33fa38308f41241bf
                                                    • Instruction ID: 573dba848690e0cdfd4c9be45b5663ff9194aa529e9341154cf92adfcd841cf8
                                                    • Opcode Fuzzy Hash: 0d8ad4d875158e0120ed104e09085659f42b86f6d600f5d33fa38308f41241bf
                                                    • Instruction Fuzzy Hash: 5E11C374200200ABC7249FAAD8D5F2A73A5AF45304B244C6FE845E7392D73CEC81EB5E
                                                    APIs
                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ProcWindow
                                                    • String ID:
                                                    • API String ID: 181713994-0
                                                    • Opcode ID: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                                    • Instruction ID: 72bdf1ad184d721e15e17473fba0dc1faec6c1a9a9d1f3fcb71c15abd8c9f185
                                                    • Opcode Fuzzy Hash: 2bcff8431ba1ff294e2b1c33dceaa93ee25f984dfbecb3b506615433fd530346
                                                    • Instruction Fuzzy Hash: FDF05436700118A7DF38995CE89ACFF632AD7ED350F418227FD152B3A6813C5C41966E
                                                    APIs
                                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041AA46
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateHeap
                                                    • String ID:
                                                    • API String ID: 10892065-0
                                                    • Opcode ID: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                                    • Instruction ID: 99ddfbee892492b32903703907324a593b21f4d4a70cf9c354be63060b8faba1
                                                    • Opcode Fuzzy Hash: 715419928b85d2867e9ba06f33a68846dd0d9c70f7b25bc38942ce62b1fa172d
                                                    • Instruction Fuzzy Hash: 56D05E325543449EDF009F71AC087663FDCE788395F008836BC1CC6150E778C950CA08
                                                    APIs
                                                      • Part of subcall function 00444326: SetFilePointerEx.KERNEL32(00000000,00000001,00000000,00000000,00000001,?,?,0044434E,?,?,00429A83,?,00487174,00000003,0040DFEE,?), ref: 004442F3
                                                    • WriteFile.KERNELBASE(?,?,00000001,?,00000000,?,?,00429A83,?,00487174,00000003,0040DFEE,?,?,00000001,00403843), ref: 00444362
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: File$PointerWrite
                                                    • String ID:
                                                    • API String ID: 539440098-0
                                                    • Opcode ID: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                                                    • Instruction ID: 4a339a6eb5dfef6003722c1615037f540bc53d76d7f4c43935d02bdd90bbdfc9
                                                    • Opcode Fuzzy Hash: 35769b91a3a7bdb08b20991cec1574ff36ffa6c1adc4d20a0c17b9033c9b0ad0
                                                    • Instruction Fuzzy Hash: 7CE09275104311AFD250DF54D944F9BB3F8AF88714F108D0EF59587241D7B4A9848BA6
                                                    APIs
                                                    • DefWindowProcW.USER32(?,?,?,?), ref: 00401123
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ProcWindow
                                                    • String ID:
                                                    • API String ID: 181713994-0
                                                    • Opcode ID: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                                    • Instruction ID: 4c36cba44089d0e03573cc5e8dee84df23505be31ebc2729507753268ee0d302
                                                    • Opcode Fuzzy Hash: 837c1f5b160989e4bc04331483680d437582dbd9ffcfcea34caefcb6c1da81af
                                                    • Instruction Fuzzy Hash: C3C08C72100008BB8700DE04EC44CFBB72CEBD8310700C20BBC0586201C230885097A1
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __wfsopen
                                                    • String ID:
                                                    • API String ID: 197181222-0
                                                    • Opcode ID: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                                    • Instruction ID: 6225ca515e7db1e5d7746fb8cf1e0ad45b41b4d1817cc5a1d8a93eb941133566
                                                    • Opcode Fuzzy Hash: d1a4d26266dcb7911ef956bf4afcad96e19892d5a9e8770749e386b2bd63db79
                                                    • Instruction Fuzzy Hash: EDC09B7644010C77CF122943FC02E453F1997C0764F044011FB1C1D561D577D5619589
                                                    APIs
                                                    • CloseHandle.KERNELBASE(00000000,?,0040DF8E), ref: 0040D91D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                                                    • Instruction ID: 397672216df932ca6c22f29d52987cd2165f63c791f69eb8015935d900cfb6d9
                                                    • Opcode Fuzzy Hash: b0db0cc9728059d6acb69f925b284233246e7185417bf28957a0aabd78f307cc
                                                    • Instruction Fuzzy Hash: 16E0DEB5900B019EC7318F6AE544416FBF8AEE46213248E2FD4E6D2A64D3B4A5898F54
                                                    APIs
                                                    • Sleep.KERNELBASE(000001F4), ref: 03F522F1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                    • Instruction ID: 5e166f90244e184fd675c8a072246b944709f673a9b6c10a0f5d6c802f7ef2a2
                                                    • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                    • Instruction Fuzzy Hash: 34E0BF7594010DEFDB00EFA8D6496DE7FB4EF04301F1006A1FD05D7690DB309E548A62
                                                    APIs
                                                    • Sleep.KERNELBASE(000001F4), ref: 03F522F1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                    • Instruction ID: a127790de8d55f01de65c97b61ef16211d60024e8e9035b923248eeb42dab8f0
                                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                    • Instruction Fuzzy Hash: BFE0E67594010DEFDB00EFB8D64969E7FF4EF04301F1006A1FD01D2280D6309D508A72
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: PF$PF$"DF$$JG$&F$&F$'HG$'|G$*"D$*nF$*vG$+%F$0wE$4rE$5CG$6MG$6NF$6tE$7eF$<HF$<G$ApG$BnE$DvE$F)G$GSG$IqE$K@G$LbF$MdF$MuE$NgF$O*F$PIF$QbG$R+F$RnG$YlE$YtG$Z9G$ZPG$^[F$^oE$_7G$_?G$b"D$fH$i}G$j)F$kQG$lE$rTG$vjE$}eE$~mE$*F$.F$3G$_G$`F$mE$pE$wG
                                                    • API String ID: 0-4260964411
                                                    • Opcode ID: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                                    • Instruction ID: b1e67458769bbea4a86cd8903524db5b6e79558e2e7ab8c51025fc7bd56032a7
                                                    • Opcode Fuzzy Hash: bb854585b2a8d25cf70b859c951904b6599901827447d171664d6ae6ba41e592
                                                    • Instruction Fuzzy Hash: 118366F1905B409FC351DFAAF984605BAE1F3AA3157A2857FC5088B731D7B8194A8F4C
                                                    APIs
                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C158
                                                    • DefDlgProcW.USER32(?,0000004E,?,?,004A83D8,?,004A83D8,?), ref: 0047C173
                                                    • GetKeyState.USER32(00000011), ref: 0047C1A4
                                                    • GetKeyState.USER32(00000009), ref: 0047C1AD
                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C1C0
                                                    • GetKeyState.USER32(00000010), ref: 0047C1CA
                                                    • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C1DE
                                                    • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C20A
                                                    • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C22D
                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047C2D6
                                                    • SendMessageW.USER32 ref: 0047C2FB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$State$LongProcWindow
                                                    • String ID: @GUI_DRAGID$F
                                                    • API String ID: 1562745308-4164748364
                                                    • Opcode ID: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                                    • Instruction ID: f40edf6d5039c675f00343e7880f865f139be9e64e9b8d530a61de5f06f6045f
                                                    • Opcode Fuzzy Hash: dcc01cbd87ddd492c2c278cbacd50e58f25e8ccd866e9ebab9dee97b514268e5
                                                    • Instruction Fuzzy Hash: C6429F702042019FD714CF54C884FAB77A5EB89B04F548A6EFA48AB291DBB4EC45CB5A
                                                    APIs
                                                    • GetForegroundWindow.USER32(00000000,?,?,004448AF,?), ref: 004375B3
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004375D8
                                                    • IsIconic.USER32(?), ref: 004375E1
                                                    • ShowWindow.USER32(?,00000009,?,?,004448AF,?), ref: 004375EE
                                                    • SetForegroundWindow.USER32(?), ref: 004375FD
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00437615
                                                    • GetCurrentThreadId.KERNEL32 ref: 00437619
                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00437624
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437632
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 00437638
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,004448AF,?), ref: 0043763E
                                                    • SetForegroundWindow.USER32(?), ref: 00437645
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437654
                                                    • keybd_event.USER32(00000012,00000000), ref: 0043765D
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043766B
                                                    • keybd_event.USER32(00000012,00000000), ref: 00437674
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437682
                                                    • keybd_event.USER32(00000012,00000000), ref: 0043768B
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00437699
                                                    • keybd_event.USER32(00000012,00000000), ref: 004376A2
                                                    • SetForegroundWindow.USER32(?), ref: 004376AD
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376CD
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D3
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,004448AF), ref: 004376D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 3778422247-2988720461
                                                    • Opcode ID: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                                    • Instruction ID: 6108fbe056c1a000d5481f33e03d330ccc862392245923d3170deea12ea07584
                                                    • Opcode Fuzzy Hash: ec12ba9e870cc2e5dd85ad52799cb15a6745d125a488419c4f0ebb71fc1ee38e
                                                    • Instruction Fuzzy Hash: AC31A4712803157FE6245BA59D0EF7F3F9CEB48B51F10082EFA02EA1D1DAE458009B79
                                                    APIs
                                                    • _memset.LIBCMT ref: 0044621B
                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 00446277
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0044628A
                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004462A4
                                                    • GetProcessWindowStation.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462BD
                                                    • SetProcessWindowStation.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004462C8
                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004462E4
                                                    • _wcslen.LIBCMT ref: 0044639E
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                    • _wcsncpy.LIBCMT ref: 004463C7
                                                    • LoadUserProfileW.USERENV(?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 004463E7
                                                    • CreateEnvironmentBlock.USERENV(?,?,00000000,00000000,?,?,00000000,?,?,?,?), ref: 00446408
                                                    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,?,00000000,?,?,00000000,?), ref: 00446446
                                                    • UnloadUserProfile.USERENV(?,?,?,?,?,?,?), ref: 00446483
                                                    • CloseWindowStation.USER32(00000000,?,?,?,?), ref: 00446497
                                                    • CloseDesktop.USER32(00000000,?,?,?,?), ref: 0044649E
                                                    • SetProcessWindowStation.USER32(?,?,?,?,?), ref: 004464A9
                                                    • CloseHandle.KERNEL32(?,?,?,?,?), ref: 004464B4
                                                    • DestroyEnvironmentBlock.USERENV(?,?,?,?,?,?), ref: 004464C8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_memset_wcslen_wcsncpy
                                                    • String ID: $default$winsta0
                                                    • API String ID: 2173856841-1027155976
                                                    • Opcode ID: dd3fbc5dfca59238d4d8e810ac2ec3cbfbbbad9087bbfadb14fa7de528d26857
                                                    • Instruction ID: eafd5d154f9bcf2590b8f8eb1e0f3d39b01f77f2fd200ee1cb9c7344d9c52646
                                                    • Opcode Fuzzy Hash: dd3fbc5dfca59238d4d8e810ac2ec3cbfbbbad9087bbfadb14fa7de528d26857
                                                    • Instruction Fuzzy Hash: DD819170208341AFE724DF65C848B6FBBE8AF89744F04491DF69097291DBB8D805CB6B
                                                    APIs
                                                      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\FSRHC6mB16.exe,?,C:\Users\user\Desktop\FSRHC6mB16.exe,004A8E80,C:\Users\user\Desktop\FSRHC6mB16.exe,0040F3D2), ref: 0040FFCA
                                                      • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A45
                                                      • Part of subcall function 00436A1D: __wsplitpath.LIBCMT ref: 00436A6C
                                                      • Part of subcall function 00436A1D: __wcsicoll.LIBCMT ref: 00436A93
                                                      • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                    • _wcscat.LIBCMT ref: 0044BD96
                                                    • _wcscat.LIBCMT ref: 0044BDBF
                                                    • __wsplitpath.LIBCMT ref: 0044BDEC
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0044BE04
                                                    • _wcscpy.LIBCMT ref: 0044BE73
                                                    • _wcscat.LIBCMT ref: 0044BE85
                                                    • _wcscat.LIBCMT ref: 0044BE97
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC3
                                                    • DeleteFileW.KERNEL32(?), ref: 0044BED5
                                                    • MoveFileW.KERNEL32(?,?), ref: 0044BEF5
                                                    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0C
                                                    • DeleteFileW.KERNEL32(?), ref: 0044BF17
                                                    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2E
                                                    • FindClose.KERNEL32(00000000), ref: 0044BF35
                                                    • MoveFileW.KERNEL32(?,?), ref: 0044BF51
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF66
                                                    • FindClose.KERNEL32(00000000), ref: 0044BF7E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
                                                    • String ID: \*.*
                                                    • API String ID: 2188072990-1173974218
                                                    • Opcode ID: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                                    • Instruction ID: 14f7055b3521afb04026f42b490306401b0ba37f80ed0ea0ca267746d8cc4687
                                                    • Opcode Fuzzy Hash: 37b83e77465c63a9a0fc5a2f65b261a2e9867c78515d1bc57cb11e6e3b171851
                                                    • Instruction Fuzzy Hash: CA5166B2008344AAD720DBA4DC44FDF73E8AB85314F448D1EF68982141EB79D64CCBAA
                                                    APIs
                                                    • __invoke_watson.LIBCMT ref: 004203A4
                                                      • Part of subcall function 00417D93: _memset.LIBCMT ref: 00417DBB
                                                      • Part of subcall function 00417D93: IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 00417E6F
                                                      • Part of subcall function 00417D93: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000314), ref: 00417E79
                                                      • Part of subcall function 00417D93: UnhandledExceptionFilter.KERNEL32(?,?,?,00000314), ref: 00417E86
                                                      • Part of subcall function 00417D93: GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 00417EA1
                                                      • Part of subcall function 00417D93: TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 00417EA8
                                                    • __get_daylight.LIBCMT ref: 004203B0
                                                    • __invoke_watson.LIBCMT ref: 004203BF
                                                    • __get_daylight.LIBCMT ref: 004203CB
                                                    • __invoke_watson.LIBCMT ref: 004203DA
                                                    • ____lc_codepage_func.LIBCMT ref: 004203E2
                                                    • _strlen.LIBCMT ref: 00420442
                                                    • __malloc_crt.LIBCMT ref: 00420449
                                                    • _strlen.LIBCMT ref: 0042045F
                                                    • _strcpy_s.LIBCMT ref: 0042046D
                                                    • __invoke_watson.LIBCMT ref: 00420482
                                                    • GetTimeZoneInformation.KERNEL32(00496C28), ref: 004204AA
                                                    • WideCharToMultiByte.KERNEL32(?,?,00496C2C,?,?,0000003F,?,?), ref: 00420528
                                                    • WideCharToMultiByte.KERNEL32(?,?,00496C80,000000FF,?,0000003F,?,?,?,00496C2C,?,?,0000003F,?,?), ref: 0042055C
                                                      • Part of subcall function 00413A88: __lock.LIBCMT ref: 00413AA6
                                                      • Part of subcall function 00413A88: ___sbh_find_block.LIBCMT ref: 00413AB1
                                                      • Part of subcall function 00413A88: ___sbh_free_block.LIBCMT ref: 00413AC0
                                                      • Part of subcall function 00413A88: RtlFreeHeap.NTDLL(00000000,00411739,0048C758,0000000C,004183E8,00000000,0048CA38,0000000C,00418422,00411739,?,?,004224D3,00000004,0048CCA0,0000000C), ref: 00413AF0
                                                      • Part of subcall function 00413A88: GetLastError.KERNEL32(?,004224D3,00000004,0048CCA0,0000000C,00417011,00411739,?,00000000,00000000,00000000,?,00416C24,00000001,00000214), ref: 00413B01
                                                    • __invoke_watson.LIBCMT ref: 004205CC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __invoke_watson$ByteCharExceptionFilterMultiProcessUnhandledWide__get_daylight_strlen$CurrentDebuggerErrorFreeHeapInformationLastPresentTerminateTimeZone____lc_codepage_func___sbh_find_block___sbh_free_block__lock__malloc_crt_memset_strcpy_s
                                                    • String ID: S\
                                                    • API String ID: 4084823496-393906132
                                                    • Opcode ID: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                                    • Instruction ID: b357f19af7064e56bcdb8625987f67de7edc2332d57e558cb2e7b84f91b73af7
                                                    • Opcode Fuzzy Hash: dc5610741a0148f7786b6b9dfa96f50a6ae589fbdbcd52e429fe3139d0279a48
                                                    • Instruction Fuzzy Hash: 6A91D371E00125AFDB20EF65EC819AE7BE9EF55300B95003BF540A7253DA3C89828F5C
                                                    APIs
                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00434D75
                                                    • __swprintf.LIBCMT ref: 00434D91
                                                    • _wcslen.LIBCMT ref: 00434D9B
                                                    • _wcslen.LIBCMT ref: 00434DB0
                                                    • _wcslen.LIBCMT ref: 00434DC5
                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00434DD7
                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00434E0A
                                                    • _memset.LIBCMT ref: 00434E27
                                                    • _wcslen.LIBCMT ref: 00434E3C
                                                    • _wcsncpy.LIBCMT ref: 00434E6F
                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00434EA9
                                                    • CloseHandle.KERNEL32(00000000), ref: 00434EB4
                                                    • RemoveDirectoryW.KERNEL32(?), ref: 00434EBB
                                                    • CloseHandle.KERNEL32(00000000), ref: 00434ECE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                    • String ID: :$\$\??\%s
                                                    • API String ID: 302090198-3457252023
                                                    • Opcode ID: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                                    • Instruction ID: 730b2dca1b6b09bd6b76555d3316dee95f4818bcffb97f26f8f03165767cfd2f
                                                    • Opcode Fuzzy Hash: 1623bec2b974bb3ee5261838648fb58b2a9d6db5aa255760d49714c370e47f4e
                                                    • Instruction Fuzzy Hash: 30416676604340ABE330EB64DC49FEF73E8AFD8714F00891EF649921D1E7B4A645876A
                                                    APIs
                                                      • Part of subcall function 00444233: _wcslen.LIBCMT ref: 0044424E
                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0046449E
                                                    • GetLastError.KERNEL32 ref: 004644B4
                                                    • GetCurrentThread.KERNEL32 ref: 004644C8
                                                    • OpenThreadToken.ADVAPI32(00000000), ref: 004644CF
                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004644E0
                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004644E7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
                                                    • String ID: SeDebugPrivilege
                                                    • API String ID: 1312810259-2896544425
                                                    • Opcode ID: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                                    • Instruction ID: c3f5e6af55eb0da9fa74db60d4f5a84adac3a89a74612fbe59a223ef38337450
                                                    • Opcode Fuzzy Hash: bb2abcbadcb50e0008f3b1fe3e217bfa736f6ade076d8095da49bf04f95d98f8
                                                    • Instruction Fuzzy Hash: 0E51A171200201AFD710DF65DD85F5BB7A8AB84704F10892EFB44DB2C1D7B8E844CBAA
                                                    APIs
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,00000001,?,00000000), ref: 0040D6E5
                                                      • Part of subcall function 00401F80: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\FSRHC6mB16.exe,00000104,?,?,?,?,00000000), ref: 00401FAD
                                                      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 00402078
                                                      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 0040208E
                                                      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020A4
                                                      • Part of subcall function 00401F80: __wcsicoll.LIBCMT ref: 004020BA
                                                      • Part of subcall function 00401F80: _wcscpy.LIBCMT ref: 004020EF
                                                    • IsDebuggerPresent.KERNEL32(?), ref: 0040D6F1
                                                    • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\FSRHC6mB16.exe,00000104,?,004A7CF8,004A7CFC), ref: 0040D763
                                                      • Part of subcall function 00401440: GetFullPathNameW.KERNEL32(?,00000104,?,00000000), ref: 00401483
                                                    • SetCurrentDirectoryW.KERNEL32(?,00000001,C:\Users\user\Desktop\FSRHC6mB16.exe,00000004), ref: 0040D7D6
                                                    • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,004846D6,00000010), ref: 00431AAB
                                                    • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\Desktop\FSRHC6mB16.exe,00000004), ref: 00431B0E
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,C:\Users\user\Desktop\FSRHC6mB16.exe,00000004), ref: 00431B3F
                                                    • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 00431B8B
                                                    • ShellExecuteW.SHELL32(00000000), ref: 00431B92
                                                      • Part of subcall function 004101F0: GetSysColorBrush.USER32(0000000F), ref: 004101F9
                                                      • Part of subcall function 004101F0: LoadCursorW.USER32(00000000,00007F00), ref: 00410209
                                                      • Part of subcall function 004101F0: LoadIconW.USER32(?,00000063), ref: 0041021F
                                                      • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A4), ref: 00410232
                                                      • Part of subcall function 004101F0: LoadIconW.USER32(?,000000A2), ref: 00410245
                                                      • Part of subcall function 004101F0: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041026A
                                                      • Part of subcall function 004101F0: RegisterClassExW.USER32 ref: 004102C6
                                                      • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 00410415
                                                      • Part of subcall function 004103E0: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 0041043E
                                                      • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 00410454
                                                      • Part of subcall function 004103E0: ShowWindow.USER32(?,00000000), ref: 0041045E
                                                      • Part of subcall function 0040E1E0: _memset.LIBCMT ref: 0040E202
                                                      • Part of subcall function 0040E1E0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memset_wcscpy
                                                    • String ID: @GH$@GH$C:\Users\user\Desktop\FSRHC6mB16.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                    • API String ID: 2493088469-3160754664
                                                    • Opcode ID: 69cfb0be49d24e5250ef6e64c59b5ea2b0a961f7c54b5140d3e7fdea8d41d4c7
                                                    • Instruction ID: f6e0ab4c143dd9a1f797559286fb6c41f0380d60009eb7dc722615656bf0e84e
                                                    • Opcode Fuzzy Hash: 69cfb0be49d24e5250ef6e64c59b5ea2b0a961f7c54b5140d3e7fdea8d41d4c7
                                                    • Instruction Fuzzy Hash: 0341F731618341ABD320F7A19C49BAF3BA4AB96704F04493FF941672D1DBBC9949C72E
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403871
                                                    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403887
                                                    • __wsplitpath.LIBCMT ref: 004038B2
                                                      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                    • _wcscpy.LIBCMT ref: 004038C7
                                                    • _wcscat.LIBCMT ref: 004038DC
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 004038EC
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                      • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,0040397D,?,?,00000010), ref: 00403F54
                                                      • Part of subcall function 00403F40: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,00000010), ref: 00403F8B
                                                    • _wcscpy.LIBCMT ref: 004039C2
                                                    • _wcslen.LIBCMT ref: 00403A53
                                                    • _wcslen.LIBCMT ref: 00403AAA
                                                    Strings
                                                    • Unterminated string, xrefs: 0042B9BA
                                                    • _, xrefs: 00403B48
                                                    • #include depth exceeded. Make sure there are no recursive includes, xrefs: 0042B87B
                                                    • Error opening the file, xrefs: 0042B8AC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpy$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_wcscatstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                    • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                                    • API String ID: 4115725249-188983378
                                                    • Opcode ID: 9d3cc106af837a0ba3a302398e1680714f0cc5ac52ed53ec90940b3ab90f08f5
                                                    • Instruction ID: dca64db042171ec5605b2d10b6a92a42a2076cc25022adee7b8115af8a15fc96
                                                    • Opcode Fuzzy Hash: 9d3cc106af837a0ba3a302398e1680714f0cc5ac52ed53ec90940b3ab90f08f5
                                                    • Instruction Fuzzy Hash: 16D1D5B15083019AD710EF65C841AEB77E8AF95308F04492FF5C563292DB78DA49C7AB
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00434C12
                                                    • GetFileAttributesW.KERNEL32(?), ref: 00434C4F
                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 00434C65
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00434C77
                                                    • FindClose.KERNEL32(00000000), ref: 00434C88
                                                    • FindClose.KERNEL32(00000000), ref: 00434C9C
                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00434CB7
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00434CFE
                                                    • SetCurrentDirectoryW.KERNEL32(0048A090), ref: 00434D22
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00434D2A
                                                    • FindClose.KERNEL32(00000000), ref: 00434D35
                                                    • FindClose.KERNEL32(00000000), ref: 00434D43
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                    • String ID: *.*
                                                    • API String ID: 1409584000-438819550
                                                    • Opcode ID: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                                    • Instruction ID: 399dbb17912f16e5170155dcc5475d9346bc7ba5aa4a4c8a0ea4d4714b2c7a66
                                                    • Opcode Fuzzy Hash: 55a9fa3bdb603958be151e0ad833d8004315071fb05557dfda8e1c4e562a15c1
                                                    • Instruction Fuzzy Hash: 4141D8726042086BD710EF64DC45AEFB3A8AAC9311F14592FFD54C3280EB79E915C7B9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Timetime$Sleep
                                                    • String ID: BUTTON
                                                    • API String ID: 4176159691-3405671355
                                                    • Opcode ID: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                                    • Instruction ID: 32c89cc89acb3c111fc3cc5f781edb0c57d51ec263d79eeef99f8852f1a29925
                                                    • Opcode Fuzzy Hash: c9fcf2e0d9fa6a0073e84c27d550d5c6e5d49d4b0adb2218bf3fff485548fdb5
                                                    • Instruction Fuzzy Hash: CB21B7723843016BE330DB74FD4DF5A7B94A7A5B51F244876F600E6290D7A5D442876C
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(?,74DE8FB0,74DE8FB0,?,?,00000000), ref: 00442E40
                                                    • FindNextFileW.KERNEL32(00000000,?,?,00000000), ref: 00442EA4
                                                    • FindClose.KERNEL32(00000000,?,00000000), ref: 00442EB5
                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00442ED1
                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00442EF0
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00442F3B
                                                    • SetCurrentDirectoryW.KERNEL32(0048A090,?,?,?,00000000), ref: 00442F6D
                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00442F75
                                                    • FindClose.KERNEL32(00000000), ref: 00442F80
                                                      • Part of subcall function 00436D2D: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000,74DF3220,00000000,00000000,00442E95,?,?,?), ref: 00436D4F
                                                    • FindClose.KERNEL32(00000000,?,?,?,00000000), ref: 00442F92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                    • String ID: *.*
                                                    • API String ID: 2640511053-438819550
                                                    • Opcode ID: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
                                                    • Instruction ID: 5fd3b3f399b1dfd6b0a62b5043663bf11a2259675d3c80dc16c90576bc2ddb84
                                                    • Opcode Fuzzy Hash: 9379a40a392f11a7e453a238fddec55769e51d026bd73d4c4d0da232c8837110
                                                    • Instruction Fuzzy Hash: 0F41E8326083046BD620FA64DD85BEFB3A89BC5311F54492FF95483280E7FEA50D8779
                                                    APIs
                                                      • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 004392DE
                                                      • Part of subcall function 004392BC: GetLastError.KERNEL32 ref: 004392E4
                                                      • Part of subcall function 004392BC: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0043930B
                                                      • Part of subcall function 0043928B: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004392A5
                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,00000004,?,?,?,?), ref: 00445E4B
                                                    • _memset.LIBCMT ref: 00445E61
                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00445E83
                                                    • GetLengthSid.ADVAPI32(?), ref: 00445E92
                                                    • GetAce.ADVAPI32(?,00000000,?,?,00000018), ref: 00445EDE
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00445EFB
                                                    • GetLengthSid.ADVAPI32(?,?,00000018), ref: 00445F11
                                                    • GetLengthSid.ADVAPI32(?,00000008,?,?,00000000,?,00000000), ref: 00445F39
                                                    • CopySid.ADVAPI32(00000000,?,00000000,?,00000000), ref: 00445F40
                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?,?,00000000,?,00000000), ref: 00445F6E
                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000000,?,00000000), ref: 00445F8B
                                                    • SetUserObjectSecurity.USER32(?,?,?), ref: 00445FA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                    • String ID:
                                                    • API String ID: 3490752873-0
                                                    • Opcode ID: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                                    • Instruction ID: 491154c1e478dcf6c9ac3cbca3c2c9e2645d4ee7bbdc2abf5fae4ada557f6fe4
                                                    • Opcode Fuzzy Hash: b11fc48791dee11005ef1ac308328aec1e94b5ee495351b15ab77ecbbd68b2cc
                                                    • Instruction Fuzzy Hash: 85519D71108301ABD610DF61CD84E6FB7E9AFC9B04F04491EFA869B242D778E909C76B
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 0047AA03
                                                    • CLSIDFromProgID.OLE32(00000000,?), ref: 0047AA27
                                                    • CoCreateInstance.OLE32(?,00000000,00000005,004829C0,?), ref: 0047AAAA
                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0047AB6B
                                                    • _memset.LIBCMT ref: 0047AB7C
                                                    • _wcslen.LIBCMT ref: 0047AC68
                                                    • _memset.LIBCMT ref: 0047ACCD
                                                    • CoCreateInstanceEx.OLE32 ref: 0047AD06
                                                    • CoSetProxyBlanket.OLE32(004829D0,?,?,?,?,?,?,00000800), ref: 0047AD53
                                                    Strings
                                                    • NULL Pointer assignment, xrefs: 0047AD84
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstance_memset$BlanketFromProgProxySecurity_wcslen
                                                    • String ID: NULL Pointer assignment
                                                    • API String ID: 1588287285-2785691316
                                                    • Opcode ID: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                                                    • Instruction ID: 16786b45dbc5194aa398acfc0f0ff3b91b98a178c64a073a91da7f4e0cb75f58
                                                    • Opcode Fuzzy Hash: 40e9c8eb680feb4042e694522f3113d29542bf103086fe34e1494599e09369de
                                                    • Instruction Fuzzy Hash: 54B10DB15083409FD320EF65C881B9FB7E8BBC8744F108E2EF58997291D7759948CB66
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004364B9
                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004364C0
                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004364D6
                                                    • AdjustTokenPrivileges.ADVAPI32 ref: 004364FE
                                                    • GetLastError.KERNEL32 ref: 00436504
                                                    • ExitWindowsEx.USER32(?,00000000), ref: 00436527
                                                    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000001), ref: 00436557
                                                    • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 0043656A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 2938487562-3733053543
                                                    • Opcode ID: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                                    • Instruction ID: b625d7910520021a286729d09db348b3c4b0b131b75d5259d4bd29649b467962
                                                    • Opcode Fuzzy Hash: 9f228ad1da6a4c81f8cb5394189ecc1147849337ed66d96e43b1ced3868a671c
                                                    • Instruction Fuzzy Hash: E021D5B02803017FF7149B64DD4AF6B3398EB48B10F948829FE09852D2D6BDE844973D
                                                    APIs
                                                    • __swprintf.LIBCMT ref: 00436162
                                                    • __swprintf.LIBCMT ref: 00436176
                                                      • Part of subcall function 0041353A: __woutput_l.LIBCMT ref: 0041358F
                                                    • __wcsicoll.LIBCMT ref: 00436185
                                                    • FindResourceW.KERNEL32(?,?,0000000E), ref: 004361A6
                                                    • LoadResource.KERNEL32(?,00000000), ref: 004361AE
                                                    • LockResource.KERNEL32(00000000), ref: 004361B5
                                                    • FindResourceW.KERNEL32(?,?,00000003), ref: 004361DA
                                                    • LoadResource.KERNEL32(?,00000000), ref: 004361E4
                                                    • SizeofResource.KERNEL32(?,00000000), ref: 004361F0
                                                    • LockResource.KERNEL32(?), ref: 004361FD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll__woutput_l
                                                    • String ID:
                                                    • API String ID: 2406429042-0
                                                    • Opcode ID: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                                    • Instruction ID: 79d88324f8a28cdfdddc37bd7103cac5134eefaeeaedb246b69d205017f9fa0d
                                                    • Opcode Fuzzy Hash: c1b2c305ea449a9eaa2c50be24a6d356ee30b865a6e7eb3c9e4c44cc17d92184
                                                    • Instruction Fuzzy Hash: 82313432104210BFD700EF64ED88EAF77A9FB89304F00882BFA4196150E778D940CB68
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D522
                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D593
                                                    • GetLastError.KERNEL32 ref: 0045D59D
                                                    • SetErrorMode.KERNEL32(?), ref: 0045D629
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                    • API String ID: 4194297153-14809454
                                                    • Opcode ID: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                                    • Instruction ID: 49a1caac5541b587bc648ef7caa6256b54369420b38b3993b587487a6931f65b
                                                    • Opcode Fuzzy Hash: 49e0e17e9479d30b414134c7f78092e00673ae1a45d158f41d80208550ba4cb8
                                                    • Instruction Fuzzy Hash: BA31AD75A083009FC310EF55D98090BB7E1AF89315F448D6FF94997362D778E9068B6A
                                                    APIs
                                                    • MkParseDisplayName.OLE32(?,00000000,?,?), ref: 0047AF0F
                                                      • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                    • OleInitialize.OLE32(00000000), ref: 0047AE06
                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                    • _wcslen.LIBCMT ref: 0047AE18
                                                    • CreateBindCtx.OLE32(00000000,?), ref: 0047AEC2
                                                    • CLSIDFromProgID.OLE32(00000000,?,?), ref: 0047AFCC
                                                    • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0047AFF9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CopyVariant$_wcslen$ActiveBindCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcscpy
                                                    • String ID: HH
                                                    • API String ID: 1915432386-2761332787
                                                    • Opcode ID: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                                                    • Instruction ID: 7e3b4e38c6064d991530b19baaff212313fd3e9d55f264e0ba959e8ba912c45c
                                                    • Opcode Fuzzy Hash: e5cc958d5f324366fbee3d2ecbe33304f19c15b46d8e68c756c5eb73bbadfcb0
                                                    • Instruction Fuzzy Hash: 6C915C71604301ABD710EB65CC85F9BB3E8AFC8714F10892EF64597291EB78E909CB5A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: DEFINE$`$h$h
                                                    • API String ID: 0-4194577831
                                                    • Opcode ID: 53b7279d5b659778b651e94439d899c69cc4b33ac19e6b5c077e56500386ae31
                                                    • Instruction ID: b1cbab3e2140d6a963e4b85c5b61650905c2e88cbb7a9c7ccaf19de07e543520
                                                    • Opcode Fuzzy Hash: 53b7279d5b659778b651e94439d899c69cc4b33ac19e6b5c077e56500386ae31
                                                    • Instruction Fuzzy Hash: 9802A1715083818FE725CF29C88076BBBE2BFD5304F28896EE89587342D779D849CB56
                                                    APIs
                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000000), ref: 004648B0
                                                    • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,?,00000000), ref: 004648BE
                                                    • bind.WSOCK32(00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648DA
                                                    • WSAGetLastError.WSOCK32(00000000,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 004648E6
                                                    • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000005,00000000,?,00000010,00000002,00000001,00000006,?,00000000), ref: 0046492D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$bindclosesocketsocket
                                                    • String ID:
                                                    • API String ID: 2609815416-0
                                                    • Opcode ID: c745fc0386eefc9461b0625fcf5f9e880147eba2f1499b917674c09f315cfe6e
                                                    • Instruction ID: d240999dee57073d64b91b26c15bb406cb7727aead8f71c00845428af50f987f
                                                    • Opcode Fuzzy Hash: c745fc0386eefc9461b0625fcf5f9e880147eba2f1499b917674c09f315cfe6e
                                                    • Instruction Fuzzy Hash: C731CB712002009BD710FF2ADC81B6BB3E8EF85724F144A5FF594A72D2D779AC85876A
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00437043
                                                    • Process32FirstW.KERNEL32(00000000,00000002), ref: 00437050
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 00437075
                                                    • __wsplitpath.LIBCMT ref: 004370A5
                                                      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                    • _wcscat.LIBCMT ref: 004370BA
                                                    • __wcsicoll.LIBCMT ref: 004370C8
                                                    • CloseHandle.KERNEL32(00000000,?), ref: 00437105
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                    • String ID:
                                                    • API String ID: 2547909840-0
                                                    • Opcode ID: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                                    • Instruction ID: d866d71778569fbbd99b025f777f77cc3db9ba9c83dfb601fa45888e96c7797d
                                                    • Opcode Fuzzy Hash: fd838752e9d0606085fad0ec29118efadb7b5f17250a81beb0a2f2c9513d2e10
                                                    • Instruction Fuzzy Hash: 9C21A7B20083819BD735DB55C881BEFB7E8BB99304F00491EF5C947241EB79A589CB6A
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,00000000), ref: 0045217E
                                                    • Sleep.KERNEL32(0000000A,?,?,00000000), ref: 004521B2
                                                    • FindNextFileW.KERNEL32(?,?,?,00000000), ref: 004522AC
                                                    • FindClose.KERNEL32(?,?,00000000), ref: 004522C3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNextSleep_wcslen
                                                    • String ID: *.*
                                                    • API String ID: 2693929171-438819550
                                                    • Opcode ID: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                                    • Instruction ID: e6452ff64139cddd5fd774ab19bf2199aa97b2a19dc0f7115334900b47d689b2
                                                    • Opcode Fuzzy Hash: 17936c38af85c1dbfc3d1ebbd0b26446ca2a596e07a4ad84d79ac0689e190811
                                                    • Instruction Fuzzy Hash: BD419D756083409FC314DF25C984A9FB7E4BF86305F04491FF98993291DBB8E949CB5A
                                                    APIs
                                                    • __wcsicoll.LIBCMT ref: 0043643C
                                                    • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 00436452
                                                    • __wcsicoll.LIBCMT ref: 00436466
                                                    • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043647C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __wcsicollmouse_event
                                                    • String ID: DOWN
                                                    • API String ID: 1033544147-711622031
                                                    • Opcode ID: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                                    • Instruction ID: 8a73d33e481528181e274ae5662561dddcd8f7088196b39fde8242b6fe69d79f
                                                    • Opcode Fuzzy Hash: 8e71a22f1bb6dc727f393f419cee3c46fab46d9365d91d475c80ba63e0095046
                                                    • Instruction Fuzzy Hash: 75E0927558872039FC4036253C02FFB174CAB66796F018116FE00D1291EA586D865BBD
                                                    APIs
                                                      • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                                    • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 00474213
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00474233
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 4170576061-0
                                                    • Opcode ID: cabea8b38002fa781011b5f0595ab941099387897a9684b67fae1790c0a48004
                                                    • Instruction ID: 44a7e99483396e6262e636993c5e510db402c36a24f0b6146f21617b09e75fab
                                                    • Opcode Fuzzy Hash: cabea8b38002fa781011b5f0595ab941099387897a9684b67fae1790c0a48004
                                                    • Instruction Fuzzy Hash: B6412C7164030067E720BB3A8C83F5A72D89F40728F144D5EF954BB2C3D6BAAD45475D
                                                    APIs
                                                    • GetCursorPos.USER32(004A83D8), ref: 0045636A
                                                    • ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                                    • GetAsyncKeyState.USER32(?), ref: 004563D0
                                                    • GetAsyncKeyState.USER32(?), ref: 004563DC
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456430
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AsyncState$ClientCursorLongScreenWindow
                                                    • String ID:
                                                    • API String ID: 3539004672-0
                                                    • Opcode ID: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                                    • Instruction ID: 0eacbf52c9ff4b21db6d2500407d28a57be55752a0539e191fb639d8ee6a043b
                                                    • Opcode Fuzzy Hash: 8b6f1a7d11e91e3692d621cb91ecba55955a7a9a0de246f0cd2a62484a80ce0b
                                                    • Instruction Fuzzy Hash: 8E416071108341ABD724DF55CD84EBBB7E9EF86725F540B0EB8A543281C734A848CB6A
                                                    APIs
                                                      • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                    • IsWindowVisible.USER32 ref: 00477314
                                                    • IsWindowEnabled.USER32 ref: 00477324
                                                    • GetForegroundWindow.USER32(?,?,?,00000001,?,?), ref: 00477331
                                                    • IsIconic.USER32 ref: 0047733F
                                                    • IsZoomed.USER32 ref: 0047734D
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                    • String ID:
                                                    • API String ID: 292994002-0
                                                    • Opcode ID: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                                    • Instruction ID: c753cb395bd8887e5e04db90522a3107d7308fd2cfa588f53a4db7a4177bc043
                                                    • Opcode Fuzzy Hash: 1c24098bd8cb9da3f496229370c910df04dc27541171caa4f2956f9c30b83eee
                                                    • Instruction Fuzzy Hash: 351172327041119BE3209B26DD05B9FB7A8AF91310F05882EFC49E7250D7B8EC42D7A9
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000,74DF3220,00000000,00000000,00442E95,?,?,?), ref: 00436D4F
                                                    • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00000000), ref: 00436D8C
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 00436D93
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: File$CloseCreateHandleTime
                                                    • String ID:
                                                    • API String ID: 3397143404-0
                                                    • Opcode ID: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                                    • Instruction ID: bce1a9391340f9688fe0750810cd2cb1b104417d8b3c1e96578cdf6de8724fbd
                                                    • Opcode Fuzzy Hash: 17e11168520f802dddbe8c477e19047108492bf153e6cd976562f268bfda3e60
                                                    • Instruction Fuzzy Hash: A4F0C83634132077E5301A69AC8DFCF276CABDAB32F20452EF741A61C083D51445977D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _strncmp
                                                    • String ID: ACCEPT$^$h
                                                    • API String ID: 909875538-4263704089
                                                    • Opcode ID: a6541d7913cd7701a75e3a8dc778404717b64597fc065691f0327c8a2e2ba149
                                                    • Instruction ID: 72a2cba82410d8b1d90f72ff5cad5771b474d57714a55a9933f2c727144888ce
                                                    • Opcode Fuzzy Hash: a6541d7913cd7701a75e3a8dc778404717b64597fc065691f0327c8a2e2ba149
                                                    • Instruction Fuzzy Hash: AE22A0746083818FE725CF29C48076BBBE2BFC9304F24896EE8D587351D779984ACB56
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045C9BE
                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0045CA1B
                                                    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CA4A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID:
                                                    • API String ID: 3541575487-0
                                                    • Opcode ID: 14602e3ddb85434cb4a191148b4ac58dc13c9e22f939418703ff5d8e88b69fcb
                                                    • Instruction ID: 18858b47483a38653cd59612877c1399ad483e9f26b014a4aa46912757e3bc7b
                                                    • Opcode Fuzzy Hash: 14602e3ddb85434cb4a191148b4ac58dc13c9e22f939418703ff5d8e88b69fcb
                                                    • Instruction Fuzzy Hash: EC41CE756003009FC720EF79D880A9BB3E4FF89315F208A6EED698B391D775A844CB95
                                                    APIs
                                                    • GetFileAttributesW.KERNEL32(00000001,00000000), ref: 00436AEF
                                                    • FindFirstFileW.KERNEL32(00000001,?), ref: 00436B00
                                                    • FindClose.KERNEL32(00000000), ref: 00436B13
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: FileFind$AttributesCloseFirst
                                                    • String ID:
                                                    • API String ID: 48322524-0
                                                    • Opcode ID: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                                    • Instruction ID: 417b6d6de692ea6945bae3bf725251b28653fd5bce93257cef0f58e2a105c1b1
                                                    • Opcode Fuzzy Hash: 9dc85b775151a348b3ed896f2b5842869c214baa03f23a1e311506cc1954de59
                                                    • Instruction Fuzzy Hash: 23E02236804418678600AB7CAC0C4EE779CDB0A335F100B96FE38C21D0D775A9408FEA
                                                    APIs
                                                    • __time64.LIBCMT ref: 004433A2
                                                      • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                                      • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Time$FileSystem__aulldiv__time64
                                                    • String ID: rJ
                                                    • API String ID: 2893107130-1865492326
                                                    • Opcode ID: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                                    • Instruction ID: ebc1a5536eae3429eadb0b33e849de59894c076497330b79c1ff8485d89898ec
                                                    • Opcode Fuzzy Hash: e603e75d0767fd135478995c8e8d26e9f594f0c4df67822259ddb38eb763753e
                                                    • Instruction Fuzzy Hash: B721A2336205108BF321CF36CC41652B7E7EBE0314F268A6AE4A5973C5CA797906CB98
                                                    APIs
                                                    • __time64.LIBCMT ref: 004433A2
                                                      • Part of subcall function 00414CEF: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,004341DB,00000000,?,0044248A,?,?,?,0048B850), ref: 00414CFA
                                                      • Part of subcall function 00414CEF: __aulldiv.LIBCMT ref: 00414D1A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Time$FileSystem__aulldiv__time64
                                                    • String ID: rJ
                                                    • API String ID: 2893107130-1865492326
                                                    • Opcode ID: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                                    • Instruction ID: 4b4e0c3debee0a45c2bc781276f994e79ac96c452fb6cf924f1e6ade5adf298d
                                                    • Opcode Fuzzy Hash: e8e365b2ab883cc854990c78a2143569adcb81f7322f31e235de15ec19987b7e
                                                    • Instruction Fuzzy Hash: E82187336345108BF321CF36CC4165277E3EBE0314B258B6AD4A5973C5CA797906CB88
                                                    APIs
                                                    • InternetQueryDataAvailable.WININET(?,?,?,?,00000000,00000000), ref: 004428C2
                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 004428F9
                                                      • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                                    • String ID:
                                                    • API String ID: 901099227-0
                                                    • Opcode ID: c5651eff999419169b46b76971b5abcb261cf656e183e849eb3ab7268b4b60d7
                                                    • Instruction ID: 2c15810e60b1cb59304632cc8162977c32d0240baa2dcf3c2cd6ef22f942a6bb
                                                    • Opcode Fuzzy Hash: c5651eff999419169b46b76971b5abcb261cf656e183e849eb3ab7268b4b60d7
                                                    • Instruction Fuzzy Hash: 452174B12043016BF220EF56DD45FAFB3E8ABD4715F40492EF285A6180D7B8E949C76A
                                                    APIs
                                                    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DDA1
                                                    • FindClose.KERNEL32(00000000), ref: 0045DDDD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseFileFirst
                                                    • String ID:
                                                    • API String ID: 2295610775-0
                                                    • Opcode ID: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                                    • Instruction ID: 3577cc1601137e614a3334ffa73c6d258275d41fe8d72aaca367a27ef3e2a016
                                                    • Opcode Fuzzy Hash: eac1d012b3ae473636f11b903683455954ec17c127a785734040b224e9a5f79e
                                                    • Instruction Fuzzy Hash: DE11E5766002049FD710EF6ADC89A5AF7E5EF84325F10892EF958D7281CB75E8048B94
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0vH$HH
                                                    • API String ID: 0-728391547
                                                    • Opcode ID: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                                    • Instruction ID: 538a6706abcc28c04bdc151be30d2aa4e2083a8dfdfa6c30a7857f36827e6882
                                                    • Opcode Fuzzy Hash: 96d535d6e61c6cd6e5d21badf476ce2a2faa32e114d6f0ae27a3d334794412dd
                                                    • Instruction Fuzzy Hash: 60E1BE725143109FC310EF25C881A9FB7E5AFC4708F108D2EF589AB281D779E946CB9A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _memset
                                                    • String ID:
                                                    • API String ID: 2102423945-0
                                                    • Opcode ID: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                                    • Instruction ID: fac722ae1e10b3ad9494cda40f9fb3e9e62b3c26aea04ddfc6562ea9d2065ebb
                                                    • Opcode Fuzzy Hash: b8def19716de174921965326585c8a0a0c2eba4d3f226f62ebfac136bfb84777
                                                    • Instruction Fuzzy Hash: C512B4B7B983194FDB48DEE4DCC169573E1FB98304F09A43C9A15C7306F6E8AA094794
                                                    APIs
                                                    • DefDlgProcW.USER32(?,?,?,?,004A83D8,?), ref: 0047E22C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Proc
                                                    • String ID:
                                                    • API String ID: 2346855178-0
                                                    • Opcode ID: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                                    • Instruction ID: e1c03c818efbd3cbf3664a0c3e659178dbc9a05004c0f073233894ce1d713c90
                                                    • Opcode Fuzzy Hash: 4f476b527310cd4595d6f2246be334f82b87c4d4a511bc9a4ae10ad49a3a576c
                                                    • Instruction Fuzzy Hash: 4EB1E63330602429E114916BBC88EBFBB9CD7D677BB208B7FF142C1582DB5B6425A179
                                                    APIs
                                                    • BlockInput.USER32(00000001), ref: 0045A272
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: BlockInput
                                                    • String ID:
                                                    • API String ID: 3456056419-0
                                                    • Opcode ID: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                                    • Instruction ID: 5d782454ef4d0180448527013755d2523f66e5fc327f68786c1d80a86620ac83
                                                    • Opcode Fuzzy Hash: f8b7596c9daf0cf449ec099d4cdbafb4be693b9bdeaa48314d03f681346fce8b
                                                    • Instruction Fuzzy Hash: D2E04F752043019BC700EF71C545A5BB7E4AF94314F108C6EF845A7351D775AC45CB66
                                                    APIs
                                                    • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 0043918E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: LogonUser
                                                    • String ID:
                                                    • API String ID: 1244722697-0
                                                    • Opcode ID: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                                    • Instruction ID: 63114e5cfb2c4979e73f5d19eacf740c811f86df1a08bc2cb556a5e36cce81ff
                                                    • Opcode Fuzzy Hash: 365ca9639b26e9c6c56151d88f527b1e4ffaee0f54dfd66c8778d151900be7f4
                                                    • Instruction Fuzzy Hash: 8DD0ECB52686066FD204CB24D846E2B77E9A7C4701F008A0CB196D2280C670D805CA32
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                                    • Instruction ID: 8011c19b6c32d183c263453b2018abc548473ce9ed5616c99acac4896e71f792
                                                    • Opcode Fuzzy Hash: b783c70369e54a54257db95ea8fbffa2a0b511f3d9d58af1a6b6f1143851980f
                                                    • Instruction Fuzzy Hash: F6E08C322083058FC310EF55F8405ABB390EB94311F004C3FE64AA2191DA79920EDFAB
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00021FEC), ref: 00422033
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                                    • Instruction ID: 3275b40964251646410af8875a24301f93fa315c26af6adae0ca3d0f7a721f84
                                                    • Opcode Fuzzy Hash: 299f58dbcf75cd09f1fee721c9404e411c3f17cf80a1a40ae63587de51767455
                                                    • Instruction Fuzzy Hash: CD9002743511144A4A011BB16E5D90925D46A586067920875B411C4064DB9840019619
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                    • Instruction ID: b3f199f19983f506b623bfe7955a95149e6efe4e98ce3416cc40fa12ddcf4508
                                                    • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                    • Instruction Fuzzy Hash: 46D19073C0A9B30A8735812D42582BFEE626FD578131EC3E29CD07F38AD26B5DA195D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                    • Instruction ID: c47bdb3f9c9e38c5d46ddb9e43dedaf70276048770aeb58bd274f21c588a824b
                                                    • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                    • Instruction Fuzzy Hash: 1CD19073D1A9B30A8735852D42581AFEE626FD578031EC3E2CCD07F38AD16B5DA191D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                    • Instruction ID: ac15b8da1a4b082d71a0b082c8349c97121379a14580263daf363e6ab8f75410
                                                    • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                    • Instruction Fuzzy Hash: 87C18173C0A9B30A8736812D42641AFEE626FD579031FC3E2CCD47F38A91AB5DA195D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                    • Instruction ID: aa957cafbedeae1199dea6a597ba911d219650f283d164fb65797e90308ef47b
                                                    • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                    • Instruction Fuzzy Hash: 5FC18E73D0A9B30A8735812D42581AFEE626FD578031EC3E28CE46F38ED26F5DA195D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                    • Instruction ID: fd8fc306a18f558151fba89f46f465dd9f8632da940391bb551d829fa2267bee
                                                    • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                    • Instruction Fuzzy Hash: 4541A271D1051CEBCF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB50
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                    • Instruction ID: b93707a88cfd2218023e9dd7acc93e3eaa772e1b37c681d956ee615cedd6068a
                                                    • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                    • Instruction Fuzzy Hash: 0E018078A00209EFCB45DF98C5909AEF7B5FB48250F24859AED09A7701D730EE41DB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                    • Instruction ID: 0cc7c608d80828c3732d27217c80ce584251b1bc410e251eb313e10bb1531264
                                                    • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                    • Instruction Fuzzy Hash: A3018078E00209EFCB45DF98C5909AEF7B5FB48350F24859AED09A7701D730AE41DB80
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                                    • Instruction ID: b8cfd58d412160527e66ace840abba843d94ac3f5b06779728c9fe736b8606cc
                                                    • Opcode Fuzzy Hash: 304d221b5688423ebfa6c473264aec07cdb78ae451f757bdd5acbbf2c1e92ad4
                                                    • Instruction Fuzzy Hash: ECD012F621844146F33144D866C0BD100437344310FB58C276005CEBC1C0DDECD6C229
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1697458563.0000000003F50000.00000040.00000020.00020000.00000000.sdmp, Offset: 03F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_3f50000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                    • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                    • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                    • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                    APIs
                                                    • DeleteObject.GDI32(?), ref: 004593D7
                                                    • DeleteObject.GDI32(?), ref: 004593F1
                                                    • DestroyWindow.USER32(?), ref: 00459407
                                                    • GetDesktopWindow.USER32 ref: 0045942A
                                                    • GetWindowRect.USER32(00000000), ref: 00459431
                                                    • SetRect.USER32(50000001,00000000,00000000,000001F4,?), ref: 00459568
                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00459577
                                                    • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,?,?,50000001,?,?,00000000,00000000), ref: 004595BB
                                                    • GetClientRect.USER32(00000000,?), ref: 004595C8
                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 00459615
                                                    • CreateFileW.KERNEL32(00000000,?,80000000,00000000,00000000,00000003,00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459635
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459654
                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 0045965F
                                                    • GlobalLock.KERNEL32(00000000), ref: 00459668
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459678
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0045967F
                                                    • CloseHandle.KERNEL32(00000000,?,50000001,?,?,00000000,00000000,00000000), ref: 00459686
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,50000001,?,?,00000000,00000000,00000000), ref: 00459694
                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,000001F4), ref: 004596AD
                                                    • GlobalFree.KERNEL32(00000000), ref: 004596C0
                                                    • CopyImage.USER32(000000FF,00000000,00000000,00000000,00002000), ref: 004596EF
                                                    • SendMessageW.USER32(00000000,00000172,00000000,000000FF), ref: 00459712
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,50000001,?,?,00000000,00000000,00000000), ref: 0045973D
                                                    • ShowWindow.USER32(?,00000004,?,50000001,?,?,00000000,00000000,00000000), ref: 0045974B
                                                    • CreateWindowExW.USER32(00000000,static,00000000,?,?,0000000B,0000000B,?,?,?,00000000,00000000), ref: 0045979C
                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004597AD
                                                    • GetStockObject.GDI32(00000011), ref: 004597B7
                                                    • SelectObject.GDI32(00000000,00000000), ref: 004597BF
                                                    • GetTextFaceW.GDI32(00000000,00000040,00000190,?,50000001,?,?,00000000,00000000,00000000), ref: 004597CD
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004597D6
                                                    • DeleteDC.GDI32(00000000), ref: 004597E1
                                                    • _wcslen.LIBCMT ref: 00459800
                                                    • _wcscpy.LIBCMT ref: 0045981F
                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 004598BB
                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004598D0
                                                    • GetDC.USER32(?), ref: 004598DE
                                                    • SelectObject.GDI32(00000000,?), ref: 004598EE
                                                    • SelectObject.GDI32(00000000,?), ref: 00459919
                                                    • ReleaseDC.USER32(?,00000000), ref: 00459925
                                                    • MoveWindow.USER32(?,0000000B,?,?,?,00000001), ref: 00459943
                                                    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,00000190), ref: 00459951
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                    • API String ID: 4040870279-2373415609
                                                    • Opcode ID: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                                    • Instruction ID: fce7466cc8f2b4b34a2e278d60cb4f704f90ff1017bfb666dbfc83d8aba9d67a
                                                    • Opcode Fuzzy Hash: d6fd8d7be04635d93ea84c38fc4cb072183cdb5133bdcfdddae5d23db1010fc6
                                                    • Instruction Fuzzy Hash: 3F028C70204301EFD714DF64DE89F2BB7A8AB84705F104A2DFA45AB2D2D7B4E805CB69
                                                    APIs
                                                    • GetSysColor.USER32(00000012), ref: 00441E64
                                                    • SetTextColor.GDI32(?,?), ref: 00441E6C
                                                    • GetSysColorBrush.USER32(0000000F), ref: 00441E83
                                                    • GetSysColor.USER32(0000000F), ref: 00441E8F
                                                    • SetBkColor.GDI32(?,?), ref: 00441EAA
                                                    • SelectObject.GDI32(?,?), ref: 00441EBA
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00441EF0
                                                    • GetSysColor.USER32(00000010), ref: 00441EF8
                                                    • CreateSolidBrush.GDI32(00000000), ref: 00441EFF
                                                    • FrameRect.USER32(?,?,00000000), ref: 00441F10
                                                    • DeleteObject.GDI32(?), ref: 00441F1B
                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 00441F75
                                                    • FillRect.USER32(?,?,?), ref: 00441FB6
                                                      • Part of subcall function 00433D5C: GetSysColor.USER32(0000000E), ref: 00433D81
                                                      • Part of subcall function 00433D5C: SetTextColor.GDI32(?,00000000), ref: 00433D89
                                                      • Part of subcall function 00433D5C: GetSysColorBrush.USER32(0000000F), ref: 00433DBF
                                                      • Part of subcall function 00433D5C: GetSysColor.USER32(0000000F), ref: 00433DCB
                                                      • Part of subcall function 00433D5C: GetSysColor.USER32(00000011), ref: 00433DEB
                                                      • Part of subcall function 00433D5C: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                                      • Part of subcall function 00433D5C: SelectObject.GDI32(?,00000000), ref: 00433E0D
                                                      • Part of subcall function 00433D5C: SetBkColor.GDI32(?,?), ref: 00433E19
                                                      • Part of subcall function 00433D5C: SelectObject.GDI32(?,?), ref: 00433E29
                                                      • Part of subcall function 00433D5C: InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
                                                      • Part of subcall function 00433D5C: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                                      • Part of subcall function 00433D5C: GetWindowLongW.USER32 ref: 00433E8A
                                                      • Part of subcall function 00433D5C: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                                    • String ID:
                                                    • API String ID: 69173610-0
                                                    • Opcode ID: 63a2be33accb074b4178bb2d7a96f271ea41f5903b36f57aa3a0bb7ff7b8698e
                                                    • Instruction ID: 0b0c06e318eae1aa70623bc76f746578ebcda4f465cb69034399d4c57c44293d
                                                    • Opcode Fuzzy Hash: 63a2be33accb074b4178bb2d7a96f271ea41f5903b36f57aa3a0bb7ff7b8698e
                                                    • Instruction Fuzzy Hash: BBB14D71508300AFD314DF64DD88A6FB7F8FB88720F504A2DF996922A0D774E845CB66
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp
                                                    • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                    • API String ID: 1038674560-3360698832
                                                    • Opcode ID: c74d0d52908dbbec4f5022c33a9c4844136c2b84c95de0bb8b15b994b6f8f789
                                                    • Instruction ID: b6083b7aed1673b33e689ff2aa7e8f17f47d7310e90ec65f4167159f85ee96f3
                                                    • Opcode Fuzzy Hash: c74d0d52908dbbec4f5022c33a9c4844136c2b84c95de0bb8b15b994b6f8f789
                                                    • Instruction Fuzzy Hash: 5A611471B4071076EA306A229C46FAB735CDF14345F50052FFC01A628BE7ADDA4A86EE
                                                    APIs
                                                    • GetSysColor.USER32(0000000E), ref: 00433D81
                                                    • SetTextColor.GDI32(?,00000000), ref: 00433D89
                                                    • GetSysColor.USER32(00000012), ref: 00433DA3
                                                    • SetTextColor.GDI32(?,?), ref: 00433DAB
                                                    • GetSysColorBrush.USER32(0000000F), ref: 00433DBF
                                                    • GetSysColor.USER32(0000000F), ref: 00433DCB
                                                    • CreateSolidBrush.GDI32(?), ref: 00433DD4
                                                    • GetSysColor.USER32(00000011), ref: 00433DEB
                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00433DFD
                                                    • SelectObject.GDI32(?,00000000), ref: 00433E0D
                                                    • SetBkColor.GDI32(?,?), ref: 00433E19
                                                    • SelectObject.GDI32(?,?), ref: 00433E29
                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00433E54
                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00433E73
                                                    • GetWindowLongW.USER32 ref: 00433E8A
                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00433EAC
                                                    • GetWindowTextW.USER32(00000000,00000000,00000105), ref: 00433EE1
                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00433F13
                                                    • DrawFocusRect.USER32(?,?), ref: 00433F1F
                                                    • GetSysColor.USER32(00000011), ref: 00433F2E
                                                    • SetTextColor.GDI32(?,00000000), ref: 00433F36
                                                    • DrawTextW.USER32(?,?,000000FF,?,?), ref: 00433F4E
                                                    • SelectObject.GDI32(?,?), ref: 00433F63
                                                    • DeleteObject.GDI32(?), ref: 00433F70
                                                    • SelectObject.GDI32(?,?), ref: 00433F78
                                                    • DeleteObject.GDI32(00000000), ref: 00433F7B
                                                    • SetTextColor.GDI32(?,?), ref: 00433F83
                                                    • SetBkColor.GDI32(?,?), ref: 00433F8F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                    • String ID:
                                                    • API String ID: 1582027408-0
                                                    • Opcode ID: e151e7129dedd9b649cf5279759d6c8ca4f2d2edd5ec07a1e2c3294b07796789
                                                    • Instruction ID: aa454ab644ffbff4d2185aee23397a25bdbdaef3ad5a75b83a3ebbbeed3afe32
                                                    • Opcode Fuzzy Hash: e151e7129dedd9b649cf5279759d6c8ca4f2d2edd5ec07a1e2c3294b07796789
                                                    • Instruction Fuzzy Hash: 53710570508340AFD304DF68DD88A6FBBF9FF89711F104A2DFA5592290D7B4E9418B6A
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 00456692
                                                    • GetDesktopWindow.USER32 ref: 004566AA
                                                    • GetWindowRect.USER32(00000000), ref: 004566B1
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0045670D
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00456720
                                                    • DestroyWindow.USER32(?), ref: 00456731
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456779
                                                    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00456797
                                                    • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567C0
                                                    • SendMessageW.USER32(?,00000421,?,?), ref: 004567D8
                                                    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 004567EE
                                                    • IsWindowVisible.USER32(?), ref: 00456812
                                                    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 0045682E
                                                    • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 00456843
                                                    • GetWindowRect.USER32(?,?), ref: 0045685C
                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00456880
                                                    • GetMonitorInfoW.USER32 ref: 00456894
                                                    • CopyRect.USER32(?,?), ref: 004568A8
                                                    • SendMessageW.USER32(?,00000412,00000000), ref: 0045690A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$MessageSend$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                                    • String ID: ($,$tooltips_class32
                                                    • API String ID: 541082891-3320066284
                                                    • Opcode ID: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                                    • Instruction ID: 3987ef5f26dee50c6234681dd74380f3ee0746d74ffcadc96223edc745891050
                                                    • Opcode Fuzzy Hash: 25380f5391d2fe641591a116f81b43842710cc101ecbbf85cfa067c854d9f55a
                                                    • Instruction Fuzzy Hash: 33B18EB0604341AFD714DF64C984B6BB7E5EF88704F408D2DF989A7292D778E848CB5A
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00454DCF
                                                    • _wcslen.LIBCMT ref: 00454DE2
                                                    • __wcsicoll.LIBCMT ref: 00454DEF
                                                    • _wcslen.LIBCMT ref: 00454E04
                                                    • __wcsicoll.LIBCMT ref: 00454E11
                                                    • _wcslen.LIBCMT ref: 00454E24
                                                    • __wcsicoll.LIBCMT ref: 00454E31
                                                      • Part of subcall function 004115D0: __wcsicmp_l.LIBCMT ref: 00411657
                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00454E65
                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,?,?,?,?,?,?,?,00000000), ref: 00454E79
                                                    • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454EB7
                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00454EFB
                                                    • LoadImageW.USER32(00000000,00000000,?,00000001,?,?), ref: 00454F2C
                                                    • FreeLibrary.KERNEL32(00000000), ref: 00454F37
                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,?,00000001), ref: 00454F94
                                                    • DestroyIcon.USER32(?), ref: 00454FA2
                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00454FC0
                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00454FCC
                                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00454FF1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
                                                    • String ID: .dll$.exe$.icl
                                                    • API String ID: 2511167534-1154884017
                                                    • Opcode ID: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                                    • Instruction ID: 777b7c61fe84a0ac0f88e3bb9536c5d4e291b97e4b5026f6b39318954af55ba4
                                                    • Opcode Fuzzy Hash: 3f138871eb6b7f703bfd118eaab481945a2915db6d26b5ab3e2ea40d00a2935e
                                                    • Instruction Fuzzy Hash: D461D9711043016AE620DF659D85F7B73ECEF84B0AF00481EFE81D5182E7B9A989C77A
                                                    APIs
                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00436B4E
                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000), ref: 00436B73
                                                    • _wcslen.LIBCMT ref: 00436B79
                                                    • _wcscpy.LIBCMT ref: 00436B9F
                                                    • _wcscat.LIBCMT ref: 00436BC0
                                                    • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00436BE7
                                                    • _wcscat.LIBCMT ref: 00436C2A
                                                    • _wcscat.LIBCMT ref: 00436C31
                                                    • __wcsicoll.LIBCMT ref: 00436C4B
                                                    • _wcsncpy.LIBCMT ref: 00436C62
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                    • API String ID: 1503153545-1459072770
                                                    • Opcode ID: 8f115a8dcca366765dccafad874a9911a33c709b0333e454bef2361e27f7839d
                                                    • Instruction ID: f4118b49cd66f9fee818cdfc0bae26735a4a754b0a3131160812af9443992caa
                                                    • Opcode Fuzzy Hash: 8f115a8dcca366765dccafad874a9911a33c709b0333e454bef2361e27f7839d
                                                    • Instruction Fuzzy Hash: B54115B264020137D200B7269C83EFF735CDE99715F54091FFE45A2253FA2EA69642BE
                                                    APIs
                                                      • Part of subcall function 004431E0: __time64.LIBCMT ref: 004431EA
                                                    • _fseek.LIBCMT ref: 004527FC
                                                    • __wsplitpath.LIBCMT ref: 0045285C
                                                    • _wcscpy.LIBCMT ref: 00452871
                                                    • _wcscat.LIBCMT ref: 00452886
                                                    • __wsplitpath.LIBCMT ref: 004528B0
                                                    • _wcscat.LIBCMT ref: 004528C8
                                                    • _wcscat.LIBCMT ref: 004528DD
                                                    • __fread_nolock.LIBCMT ref: 00452914
                                                    • __fread_nolock.LIBCMT ref: 00452925
                                                    • __fread_nolock.LIBCMT ref: 00452944
                                                    • __fread_nolock.LIBCMT ref: 00452955
                                                    • __fread_nolock.LIBCMT ref: 00452976
                                                    • __fread_nolock.LIBCMT ref: 00452987
                                                    • __fread_nolock.LIBCMT ref: 00452998
                                                    • __fread_nolock.LIBCMT ref: 004529A9
                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004523ED
                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 00452432
                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045244F
                                                      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 0045247D
                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 0045248E
                                                      • Part of subcall function 004523CE: __fread_nolock.LIBCMT ref: 004524AB
                                                      • Part of subcall function 004523CE: _wcscpy.LIBCMT ref: 004524D9
                                                    • __fread_nolock.LIBCMT ref: 00452A39
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                                    • String ID:
                                                    • API String ID: 2054058615-0
                                                    • Opcode ID: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                                    • Instruction ID: 66779ec6e5012556871fefb3c18d5d4f0449fb8b445ab61f685bb60241e2a5ae
                                                    • Opcode Fuzzy Hash: 983239acf030dd5dbcb525efe1f3094d5bf78e470c43ee0c462dc16c64ee25c2
                                                    • Instruction Fuzzy Hash: 16C14EB2508340ABD320DF65C881EEBB7E8EFC9714F444D2FF68987241E6799544CBA6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0
                                                    • API String ID: 0-4108050209
                                                    • Opcode ID: 3341d5ccd3f52121a0b9d5f5b9edb9a4c3413db68c9c5c7597b80800bbf161ae
                                                    • Instruction ID: a4e6889c8706d2a682ad3cc8acca51b009283e1ae9b51da70db0806919efebf9
                                                    • Opcode Fuzzy Hash: 3341d5ccd3f52121a0b9d5f5b9edb9a4c3413db68c9c5c7597b80800bbf161ae
                                                    • Instruction Fuzzy Hash: 95C104723403416BF3209B64DC46FBBB794EB95321F04453FFA45D62C1EBBA9409876A
                                                    APIs
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                    • GetWindowRect.USER32(?,?), ref: 004701EA
                                                    • GetClientRect.USER32(?,?), ref: 004701FA
                                                    • GetSystemMetrics.USER32(00000007), ref: 00470202
                                                    • GetSystemMetrics.USER32(00000008), ref: 00470216
                                                    • GetSystemMetrics.USER32(00000004), ref: 00470238
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047026B
                                                    • GetSystemMetrics.USER32(00000007), ref: 00470273
                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004702A0
                                                    • GetSystemMetrics.USER32(00000008), ref: 004702A8
                                                    • GetSystemMetrics.USER32(00000004), ref: 004702CF
                                                    • SetRect.USER32(?,00000000,00000000,?,?), ref: 004702F1
                                                    • AdjustWindowRectEx.USER32(?,?,00000000,000000FF), ref: 00470304
                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 0047033E
                                                    • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00470356
                                                    • GetClientRect.USER32(?,?), ref: 00470371
                                                    • GetStockObject.GDI32(00000011), ref: 00470391
                                                    • SendMessageW.USER32(?,00000030,00000000), ref: 0047039D
                                                    • SetTimer.USER32(00000000,00000000,00000028,Function_00061E7F), ref: 004703C4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                                    • String ID: AutoIt v3 GUI
                                                    • API String ID: 867697134-248962490
                                                    • Opcode ID: 0d702e1f111dc4b461eb7f98f3a5a74387d5f37c8fb6fd827a42ca67ae032642
                                                    • Instruction ID: 96ed3905d942d8c5c267f8207effb08aff50268186fc7250a269a1908d1679c9
                                                    • Opcode Fuzzy Hash: 0d702e1f111dc4b461eb7f98f3a5a74387d5f37c8fb6fd827a42ca67ae032642
                                                    • Instruction Fuzzy Hash: 27B19F71205301AFD324DF68DD45B6BB7E4FB88710F108A2EFA9587290DBB5E844CB5A
                                                    APIs
                                                    • SetWindowPos.USER32(004A83D8,00000000,00000000,00000000,00000000,00000000,00000013,004A83D8,?,?), ref: 0044880A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window
                                                    • String ID: 0
                                                    • API String ID: 2353593579-4108050209
                                                    • Opcode ID: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                                    • Instruction ID: 13976ff69904029c6bcd7d6129a783336058688c161485e0dcc644b2654616cc
                                                    • Opcode Fuzzy Hash: ca380a5f1b7b22306afb7d181ee8588f63c71b92ae7430e038360cbc2591eaeb
                                                    • Instruction Fuzzy Hash: 94B19DB02443419FF324CF14C889BABBBE4EB89744F14491EF991972D1DBB8E845CB5A
                                                    APIs
                                                    • GetSysColor.USER32 ref: 0044A11D
                                                    • GetClientRect.USER32(?,?), ref: 0044A18D
                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A1A6
                                                    • GetWindowDC.USER32(?), ref: 0044A1B3
                                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A1C6
                                                    • ReleaseDC.USER32(?,00000000), ref: 0044A1D6
                                                    • GetSysColor.USER32(0000000F), ref: 0044A1EC
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0044A207
                                                    • GetSysColor.USER32(0000000F), ref: 0044A216
                                                    • GetSysColor.USER32(00000005), ref: 0044A21E
                                                    • GetWindowDC.USER32 ref: 0044A277
                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A28A
                                                    • GetPixel.GDI32(00000000,?,00000000), ref: 0044A29F
                                                    • GetPixel.GDI32(00000000,00000000,?), ref: 0044A2B4
                                                    • GetPixel.GDI32(00000000,?,?), ref: 0044A2D0
                                                    • ReleaseDC.USER32(?,00000000), ref: 0044A2D8
                                                    • SetTextColor.GDI32(00000000,?), ref: 0044A2F6
                                                    • SetBkMode.GDI32(00000000,00000001), ref: 0044A30A
                                                    • GetStockObject.GDI32(00000005), ref: 0044A312
                                                    • SetBkColor.GDI32(00000000,00000000), ref: 0044A328
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                                    • String ID:
                                                    • API String ID: 1744303182-0
                                                    • Opcode ID: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                                    • Instruction ID: f407f88e1fc9bdd08975b2e96734b256c85d8f08b0ead5e1f8dbf5832e348edb
                                                    • Opcode Fuzzy Hash: c697551d262e08263a45fd1ab6b47457a8b4de30e4a023901e5f3e03e0b3260a
                                                    • Instruction Fuzzy Hash: AD6148315442016BE3209B388C88BBFB7A4FB49324F54079EF9A8973D0D7B99C51D76A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$__wcsnicmp
                                                    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                    • API String ID: 790654849-1810252412
                                                    • Opcode ID: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                                    • Instruction ID: 1b62209f2aa4de5792947d5a3aa61dcd1c874d3672784017b8f4b2c72f71c34c
                                                    • Opcode Fuzzy Hash: 3ef763bd77a89c14e9ef14da431a542ecfa9ee53dca0875bc5fd58ba0035de2e
                                                    • Instruction Fuzzy Hash: 7A3193B1644301A7CA00FA61DC83F5B73A85F54759F100A3FB955B61D6FA6CEA0C862F
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: InitVariant
                                                    • String ID:
                                                    • API String ID: 1927566239-0
                                                    • Opcode ID: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                                    • Instruction ID: b17386a2766a1a739d91313a8bf0106a5dd250ff49ec0cac6ee5761d63536315
                                                    • Opcode Fuzzy Hash: 0ce8a0180f427c6633dd7a645a706da8f2470da33a28fd12fcc8bbcffff15558
                                                    • Instruction Fuzzy Hash: 87A1F5766146019FC300EF65D88499FB7AAFF85315F408D3EFA49C3211D77AD4098BAA
                                                    APIs
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    • GetForegroundWindow.USER32(?,?), ref: 0046D7C1
                                                    • GetForegroundWindow.USER32 ref: 0046DBA4
                                                    • IsWindow.USER32(?), ref: 0046DBDE
                                                    • GetDesktopWindow.USER32 ref: 0046DCB5
                                                    • EnumChildWindows.USER32(00000000), ref: 0046DCBC
                                                    • EnumWindows.USER32(00460772,?), ref: 0046DCC4
                                                      • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop
                                                    • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                    • API String ID: 1322021666-1919597938
                                                    • Opcode ID: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                                    • Instruction ID: 252cd24da08a8cddfda52e39780f3f39bafd894638fb43d2866a45805a666b3e
                                                    • Opcode Fuzzy Hash: f0ae0bd5c84c8fbd9fa80e8b17a650ade3f6139d63811c55da114ce2128ba9af
                                                    • Instruction Fuzzy Hash: 96F1C571D143409BCB00EF61C881EAB73A4BF95308F44496FF9456B286E77DE909CB6A
                                                    APIs
                                                    • GetLocalTime.KERNEL32(?), ref: 0045DED4
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045DEE4
                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0045DEF0
                                                    • _wcsncpy.LIBCMT ref: 0045DF0F
                                                    • __wsplitpath.LIBCMT ref: 0045DF54
                                                    • _wcscat.LIBCMT ref: 0045DF6C
                                                    • _wcscat.LIBCMT ref: 0045DF7E
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0045DF93
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFA7
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFE5
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045DFFB
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E00D
                                                    • _wcscpy.LIBCMT ref: 0045E019
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0045E05F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$Time$File$Local_wcscat$System__wsplitpath_wcscpy_wcsncpy
                                                    • String ID: *.*
                                                    • API String ID: 3201719729-438819550
                                                    • Opcode ID: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                                                    • Instruction ID: 9ef8ac46b2ec3f8a2b66e183c5d6435db2730cdd54c1860218fefef83dfd89d7
                                                    • Opcode Fuzzy Hash: 89541da3f554ebb8d42e95f45bc66f31ca584aff69b040987f949bd9346ecb30
                                                    • Instruction Fuzzy Hash: D061A7B25043049BC724EF65C881E9FB3E8AF94704F048E1EF98987241DB79E949CB96
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$IconLoad
                                                    • String ID: blank$info$question$stop$warning
                                                    • API String ID: 2485277191-404129466
                                                    • Opcode ID: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                                    • Instruction ID: 3fdcc892c2a25cebf9aff257507665a297d4e16c4260cb8f6e9492a672fb13e0
                                                    • Opcode Fuzzy Hash: 5bed60ec3368b378429e4d7d86c3e9ed6cb6a0c6f582f3c961ebbe10ae210b10
                                                    • Instruction Fuzzy Hash: CB2128B6B08301A7D610A725BC05FDF27489FA8365F004C2BF941E2283F3A8A45583BD
                                                    APIs
                                                    • CompareStringW.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428611
                                                    • GetLastError.KERNEL32(?,?,004832AC,00000001,004832AC,00000001), ref: 00428627
                                                    • strncnt.LIBCMT ref: 00428646
                                                    • strncnt.LIBCMT ref: 0042865A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: strncnt$CompareErrorLastString
                                                    • String ID:
                                                    • API String ID: 1776594460-0
                                                    • Opcode ID: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                                    • Instruction ID: 056e5a993d73ec50dc3c8e072878bb631c9b69e1f80941a2a69bbd8adeb14d7f
                                                    • Opcode Fuzzy Hash: 16ce8c3a65625fd7540c51b5c1254bfa478756f7f63d0819a38d9cd03b2976a4
                                                    • Instruction Fuzzy Hash: 0DA1B131B01225AFDF219F61EC41AAF7BB6AF94340FA4402FF81196251DF3D8891CB58
                                                    APIs
                                                    • LoadIconW.USER32(?,00000063), ref: 004545DA
                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004545EC
                                                    • SetWindowTextW.USER32(?,?), ref: 00454606
                                                    • GetDlgItem.USER32(?,000003EA), ref: 0045461F
                                                    • SetWindowTextW.USER32(00000000,?), ref: 00454626
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00454637
                                                    • SetWindowTextW.USER32(00000000,?), ref: 0045463E
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00454663
                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 0045467D
                                                    • GetWindowRect.USER32(?,?), ref: 00454688
                                                    • SetWindowTextW.USER32(?,?), ref: 004546FD
                                                    • GetDesktopWindow.USER32 ref: 00454708
                                                    • GetWindowRect.USER32(00000000), ref: 0045470F
                                                    • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 00454760
                                                    • GetClientRect.USER32(?,?), ref: 0045476F
                                                    • PostMessageW.USER32(?,00000005,00000000,?), ref: 0045479E
                                                    • SetTimer.USER32(?,0000040A,?,00000000), ref: 004547E9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                    • String ID:
                                                    • API String ID: 3869813825-0
                                                    • Opcode ID: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                                    • Instruction ID: 4e77de65cc6986e78e6be143d0a4b9e7f39e78804b6f4fc71fe9e35dfcfd5046
                                                    • Opcode Fuzzy Hash: d6d25c813e590b752cbfd9858452ff05e3d443d6a6ce6916d89e520ab15b373f
                                                    • Instruction Fuzzy Hash: 8C616D71604701AFD320DF68CD88F2BB7E8AB88709F004E1DF98697691D7B8E849CB55
                                                    APIs
                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 00458D2D
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00458D3A
                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 00458D47
                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 00458D54
                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 00458D61
                                                    • LoadCursorW.USER32(00000000,00007F81), ref: 00458D6E
                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 00458D7B
                                                    • LoadCursorW.USER32(00000000,00007F80), ref: 00458D88
                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 00458D95
                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 00458DA2
                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 00458DAF
                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 00458DBC
                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 00458DC9
                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 00458DD6
                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00458DE3
                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 00458DF0
                                                    • GetCursorInfo.USER32 ref: 00458E03
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Cursor$Load$Info
                                                    • String ID:
                                                    • API String ID: 2577412497-0
                                                    • Opcode ID: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                                    • Instruction ID: 36b4ee280ed0253346847529aeb00c95e660e1b7f2a6688567eec4957a26740b
                                                    • Opcode Fuzzy Hash: 0c78b259ae472df09145ddf792cd37f85d2c816b82f1d484569203a38ef646a1
                                                    • Instruction Fuzzy Hash: D9311671E4C3156AE7509F758C5AB1BBEE0AF40B54F004D2FF2889F2D1DAB9E4448B86
                                                    APIs
                                                    • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 004696CC
                                                    • GetFocus.USER32 ref: 004696E0
                                                    • GetDlgCtrlID.USER32(00000000), ref: 004696EB
                                                    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046973F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$CtrlFocus
                                                    • String ID: 0
                                                    • API String ID: 1534620443-4108050209
                                                    • Opcode ID: 833d13db40ec40dec0483232b6284f8533ca83f9805c84b893a2fb0fb577edd9
                                                    • Instruction ID: 7d80af5808d25915b866e76daf530f36ef8b085de22dc1c7fc8dbb607ae8adb7
                                                    • Opcode Fuzzy Hash: 833d13db40ec40dec0483232b6284f8533ca83f9805c84b893a2fb0fb577edd9
                                                    • Instruction Fuzzy Hash: 1591E1B1604301ABD710DF14D884BABB7A8FB89714F004A1EF99497391E7B4DC49CBAB
                                                    APIs
                                                    • _memset.LIBCMT ref: 00468107
                                                    • GetMenuItemInfoW.USER32(?,00000007,00000000,?), ref: 00468190
                                                    • GetMenuItemCount.USER32(?), ref: 00468227
                                                    • DeleteMenu.USER32(?,00000005,00000000), ref: 004682B8
                                                    • DeleteMenu.USER32(?,00000004,00000000), ref: 004682C1
                                                    • DeleteMenu.USER32(?,00000006,00000000,?,00000004,00000000), ref: 004682CA
                                                    • DeleteMenu.USER32(00000000,00000003,00000000,?,00000006,00000000,?,00000004,00000000), ref: 004682D3
                                                    • GetMenuItemCount.USER32 ref: 004682DC
                                                    • SetMenuItemInfoW.USER32 ref: 00468317
                                                    • GetCursorPos.USER32(00000000), ref: 00468322
                                                    • SetForegroundWindow.USER32(?), ref: 0046832D
                                                    • TrackPopupMenuEx.USER32(?,00000000,00000000,00000006,?,00000000,?,?,00000006,00000000,?,00000004,00000000), ref: 00468345
                                                    • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468352
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                    • String ID: 0
                                                    • API String ID: 3993528054-4108050209
                                                    • Opcode ID: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                                                    • Instruction ID: a450cccb4b36e122d1eca3afa35c85d1e57e2007e4dd5bc50ce81cada7f4397f
                                                    • Opcode Fuzzy Hash: d5573be1ba1a613c106f8e764602a2d45d8b266f51cd1eb04f60dea375430468
                                                    • Instruction Fuzzy Hash: 3C71C070648301ABE3309B14CC49F5BB7E8BF86724F244B0EF5A5563D1DBB9A8458B1B
                                                    APIs
                                                    • DragQueryPoint.SHELL32(?,?), ref: 0046F2DA
                                                      • Part of subcall function 00441CB4: ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                                      • Part of subcall function 00441CB4: GetWindowRect.USER32(?,?), ref: 00441D5A
                                                      • Part of subcall function 00441CB4: PtInRect.USER32(?,?,?), ref: 00441D6F
                                                    • SendMessageW.USER32(?), ref: 0046F34C
                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0046F355
                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0046F37F
                                                    • _wcscat.LIBCMT ref: 0046F3BC
                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0046F3D1
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 0046F3E3
                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F3F1
                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 0046F40E
                                                    • DragFinish.SHELL32(?), ref: 0046F414
                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0046F4FC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                    • API String ID: 4085615965-3440237614
                                                    • Opcode ID: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                                    • Instruction ID: d92027b63b9478c52a8b17f069484fb886a707b260a555cedefccfc898d4b85d
                                                    • Opcode Fuzzy Hash: e6dc8860684545ee98a9b737372e313d8034606243f87d3f07a4344f64e9a130
                                                    • Instruction Fuzzy Hash: 596170716043009BD700EF54D885E5FB7A8FFC9714F104A2EF99097291D7B8A949CBAA
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll
                                                    • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                    • API String ID: 3832890014-4202584635
                                                    • Opcode ID: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                                    • Instruction ID: bf73cd225697d97a5a257e466bf5c8c79b4efa22739c650e03c6b1f9c6e9338c
                                                    • Opcode Fuzzy Hash: 3f0b73fdde0a53fb0a00575eab05b85141dd4a2dcfcc4ab19f269ee93bd0b8a8
                                                    • Instruction Fuzzy Hash: 1D01616160562122FE11322A7C03BDF15898F5139AF14447BFC05F1282FF4DDA8692EE
                                                    APIs
                                                    • _memset.LIBCMT ref: 004669C4
                                                    • _wcsncpy.LIBCMT ref: 00466A21
                                                    • _wcsncpy.LIBCMT ref: 00466A4D
                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                    • _wcstok.LIBCMT ref: 00466A90
                                                      • Part of subcall function 004142A3: __getptd.LIBCMT ref: 004142A9
                                                    • _wcstok.LIBCMT ref: 00466B3F
                                                    • _wcscpy.LIBCMT ref: 00466BC8
                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00466CFE
                                                    • _wcslen.LIBCMT ref: 00466D1D
                                                    • _memset.LIBCMT ref: 00466BEE
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    • _wcslen.LIBCMT ref: 00466D4B
                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00466D9E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$FileName_memset_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                                    • String ID: X$HH
                                                    • API String ID: 3021350936-1944015008
                                                    • Opcode ID: 148ffd08a53066c169799d7010fd2328abbb1436974d200da898f01e024381e3
                                                    • Instruction ID: 73e83d7ea4d12cbe09e247b0b8120e99e9ae8af51722f6ce2f45a1bbad6557a4
                                                    • Opcode Fuzzy Hash: 148ffd08a53066c169799d7010fd2328abbb1436974d200da898f01e024381e3
                                                    • Instruction Fuzzy Hash: D1C1B2715043408BC714EF65C981A9FB3E4BF84304F15892FF949AB292EB78E905CB9B
                                                    APIs
                                                    • _memset.LIBCMT ref: 0045F4AE
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F519
                                                    • SetMenuItemInfoW.USER32(00000008,00000004,00000000,?), ref: 0045F556
                                                    • Sleep.KERNEL32(000001F4,?,?,00000000,?), ref: 0045F568
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: InfoItemMenu$Sleep_memset
                                                    • String ID: 0
                                                    • API String ID: 1504565804-4108050209
                                                    • Opcode ID: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                                                    • Instruction ID: 9e8996cb251b45e9fd8013479734a73363ce4640cf951279a7d2fdadd0934edb
                                                    • Opcode Fuzzy Hash: b2eb264578549714347dca4c6cc1c63db220fd8d89572d1a81e0d1d82c6caf25
                                                    • Instruction Fuzzy Hash: E171E3711043406BD3109F54DD48FABBBE8EBD5306F04086FFD8587252D6B9A94EC76A
                                                    APIs
                                                    • DestroyWindow.USER32(?,004A83D8,?), ref: 00455800
                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 00455847
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateDestroy
                                                    • String ID: ,$tooltips_class32
                                                    • API String ID: 1109047481-3856767331
                                                    • Opcode ID: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                                    • Instruction ID: af4df8b80438f92fd5356fe82daba85812243c44dff517d7eb602cf52e2cfce3
                                                    • Opcode Fuzzy Hash: 0ca5ab61cf6a2cad142a114e1c8ac043728d1bef212d4075191e352a737c6d07
                                                    • Instruction Fuzzy Hash: BF719075244704AFE320DB28CC85F7B77E4EB89700F50491EFA8197391E6B5E905CB59
                                                    APIs
                                                    • _wcsncpy.LIBCMT ref: 0045CCFA
                                                    • __wsplitpath.LIBCMT ref: 0045CD3C
                                                    • _wcscat.LIBCMT ref: 0045CD51
                                                    • _wcscat.LIBCMT ref: 0045CD63
                                                    • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,00000104,?), ref: 0045CD78
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,00000104,?), ref: 0045CD8C
                                                      • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                    • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDD0
                                                    • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDE6
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CDF8
                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045CE08
                                                    • _wcscpy.LIBCMT ref: 0045CE14
                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CE5A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                                    • String ID: *.*
                                                    • API String ID: 1153243558-438819550
                                                    • Opcode ID: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                                    • Instruction ID: 4b7f18f3392d5c51d0b0bcfc25b88d1348604f1c1aa494fd035d881d108a9fe9
                                                    • Opcode Fuzzy Hash: 5bfa431d4ef7075d2dc920e4199facb1e2714bc7465ef22df03346902ac9b5e5
                                                    • Instruction Fuzzy Hash: 0561E5B61043419FD731EF54C885AEBB7E4EB84305F44882FED8983242D67D998E879E
                                                    APIs
                                                    • _memset.LIBCMT ref: 00455127
                                                    • GetMenuItemInfoW.USER32 ref: 00455146
                                                    • DeleteMenu.USER32(?,?,00000000), ref: 004551B2
                                                    • DeleteMenu.USER32(?,?,00000000), ref: 004551C8
                                                    • GetMenuItemCount.USER32(?), ref: 004551D9
                                                    • SetMenu.USER32(?,00000000), ref: 004551E7
                                                    • DestroyMenu.USER32(?,?,00000000), ref: 004551F4
                                                    • DrawMenuBar.USER32 ref: 00455207
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow_memset
                                                    • String ID: 0
                                                    • API String ID: 1663942905-4108050209
                                                    • Opcode ID: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                                    • Instruction ID: b4bdd7d0bd4ee66815c45afb4cba49e6688c1fb7c5fb2b704b87d0eb3faa17d4
                                                    • Opcode Fuzzy Hash: 9367fca2e423954c8e95e5664296e443175f4f0a3dc8af8de701f007cae6aaa4
                                                    • Instruction Fuzzy Hash: F4413B70600A01AFD715DF24D9A8B6B77A8BF44302F40891DFD49CB292DB78EC44CBA9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __get_daylight__invoke_watson$__gmtime64_s$__getptd_noexit
                                                    • String ID:
                                                    • API String ID: 1481289235-0
                                                    • Opcode ID: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                                    • Instruction ID: 11750150b5911b8a2d77b888e51b7102539fbc40f42687a9f62e69b5342e6946
                                                    • Opcode Fuzzy Hash: 0c2ddcf2cfad548662a25bd64df7f8cdb197bd458fe0989c9b03f034f06c5664
                                                    • Instruction Fuzzy Hash: 8461B372B00B15DBD724AB69DC81AEB73E99F84324F14452FF011D7682EB78DA808B58
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 0046FB61
                                                    • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 0046FB7A
                                                    • SendMessageW.USER32 ref: 0046FBAF
                                                    • SendMessageW.USER32 ref: 0046FBE2
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001), ref: 0046FC1B
                                                    • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0046FC3E
                                                    • ImageList_Create.COMCTL32(00000020,00000020,00000021,?,00000001), ref: 0046FC51
                                                    • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 0046FC73
                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FC97
                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 0046FCA5
                                                    • SendMessageW.USER32 ref: 0046FD00
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$IconImageList_$CreateExtractReplace
                                                    • String ID:
                                                    • API String ID: 2632138820-0
                                                    • Opcode ID: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                                    • Instruction ID: f8b2170a3f6480226351c2682443129a31dd3945ebd2779c8b18a40e734619f9
                                                    • Opcode Fuzzy Hash: 84d296b218fe0245d687438722339ecf4745b7249032fe4bb2113eafbff2dc59
                                                    • Instruction Fuzzy Hash: A461BF70208305AFD320DF14DC85F5BB7E4FB89B14F10492EFA85972D1E7B4A8498B66
                                                    APIs
                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 00433BC7
                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 00433BDE
                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 00433BF5
                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 00433C0C
                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 00433C23
                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 00433C3A
                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 00433C51
                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 00433C68
                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 00433C7F
                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 00433C96
                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 00433CAD
                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 00433CC4
                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00433CDB
                                                    • LoadCursorW.USER32(00000000,00000000), ref: 00433CEF
                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00433D06
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CursorLoad
                                                    • String ID:
                                                    • API String ID: 3238433803-0
                                                    • Opcode ID: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                                    • Instruction ID: acd63d7325575073817552101614e6badc0a76bef24473f745c9da0ba21645f6
                                                    • Opcode Fuzzy Hash: a9ae3fa102d058121485b558102ae55493db0c8a3ed3723cc80ee02977cbc66e
                                                    • Instruction Fuzzy Hash: 6D310E3058C302FFE7504F50EE0AB1C36A0BB48B47F008C7DF64AA62E0E6F055009B9A
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00460AF5
                                                    • _wcslen.LIBCMT ref: 00460B00
                                                    • __swprintf.LIBCMT ref: 00460B9E
                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00460C11
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00460C8E
                                                    • GetDlgCtrlID.USER32(?), ref: 00460CE6
                                                    • GetWindowRect.USER32(?,?), ref: 00460D21
                                                    • GetParent.USER32(?), ref: 00460D40
                                                    • ScreenToClient.USER32(00000000), ref: 00460D47
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00460DBE
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00460DFB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                                    • String ID: %s%u
                                                    • API String ID: 1899580136-679674701
                                                    • Opcode ID: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                                    • Instruction ID: ed0b46c26cbb3f928a943cd91895a09858176ee0e89b0f6962e21683ef9d2041
                                                    • Opcode Fuzzy Hash: 263ba601bdfcacdbc09c0537f08939095875f2576dae1f9512caffb95b688f0a
                                                    • Instruction Fuzzy Hash: 3AA1CD722043019BDB14DF54C884BEB73A8FF84714F04892EFD889B245E778E946CBA6
                                                    APIs
                                                    • CoTaskMemFree.OLE32(?), ref: 0047D6D3
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    • StringFromCLSID.OLE32(?,?), ref: 0047D6B5
                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                    • StringFromIID.OLE32(?,?), ref: 0047D7F0
                                                    • CoTaskMemFree.OLE32(?), ref: 0047D80A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: FreeFromStringTask_wcslen$_wcscpy
                                                    • String ID: 0vH$CLSID\$Interface\$ProgID$ToolBoxBitmap32$inprocserver32$localserver32$HH
                                                    • API String ID: 2485709727-934586222
                                                    • Opcode ID: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                                    • Instruction ID: 9b1d76abf7044590dd80f2c514dab21f357569e7696d0ed80310904c07b122bf
                                                    • Opcode Fuzzy Hash: 94ff36e8c5adf47d5d15ad8c3baf2c81511e2686fb9cf3bb874d512fd4cd8d9e
                                                    • Instruction Fuzzy Hash: 63714BB5614201AFC304EF25C981D5BB3F8BF88704F108A2EF5599B351DB78E905CB6A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$Folder_memset$BrowseDesktopFromInitializeListMallocPathUninitialize
                                                    • String ID: HH
                                                    • API String ID: 3381189665-2761332787
                                                    • Opcode ID: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                                    • Instruction ID: 9856a5a3be2a6f4b6f15ab218c20ab076772672eb14c4daba281b2e598c2a196
                                                    • Opcode Fuzzy Hash: cbd34bb05af2b60d6becc686f20e38c9c02ad4ea561bbadf99ecd2e28994155d
                                                    • Instruction Fuzzy Hash: E1619AB59043009FC320EF65C88499BB7E9BFC8704F048E1EF98987252D775E849CB6A
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 00434585
                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00434590
                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0043459B
                                                    • SelectObject.GDI32(00000000,?), ref: 004345A9
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00434618
                                                    • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00434665
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                                    • String ID: (
                                                    • API String ID: 3300687185-3887548279
                                                    • Opcode ID: 850e4e4f4a3144c0c65e94ebd0f1e451ef245c66964f5ba666016bedf541cb72
                                                    • Instruction ID: a007e7ec8c3f390601fcb6226b5fc218b62818acb39bbc9fe8cd9ddeb27b86ed
                                                    • Opcode Fuzzy Hash: 850e4e4f4a3144c0c65e94ebd0f1e451ef245c66964f5ba666016bedf541cb72
                                                    • Instruction Fuzzy Hash: E4514871508345AFD310CF69C884B6BBBE9EF8A310F14881DFA9687390D7B5E844CB66
                                                    APIs
                                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E463
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E480
                                                    • __swprintf.LIBCMT ref: 0045E4D9
                                                    • _printf.LIBCMT ref: 0045E595
                                                    • _printf.LIBCMT ref: 0045E5B7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: LoadString_printf$__swprintf_wcslen
                                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR $HH
                                                    • API String ID: 3590180749-2894483878
                                                    • Opcode ID: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                                    • Instruction ID: 42a5c2f6345f2e10047da6565a111f96cfad8617a22bea28fc44504b1d19b7ce
                                                    • Opcode Fuzzy Hash: ef66654f81976a0e6a78d75721240b4b5dad2d0c7f05b7bb9659983eace5fa73
                                                    • Instruction Fuzzy Hash: 9F51A171518345ABD324EF91CC41DAF77A8AF84754F04093FF94463292EB78EE488B6A
                                                    APIs
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0046F911
                                                    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 0046F929
                                                    • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 0046F942
                                                    • DeleteObject.GDI32(?), ref: 0046F950
                                                    • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,00000000,00000000,00000000,00002010,?,000000F0), ref: 0046F95E
                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9A8
                                                    • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 0046F9C1
                                                    • DeleteObject.GDI32(?), ref: 0046F9CF
                                                    • DestroyIcon.USER32(?,?,000000F7,00000001,00000000,?,00000001,00000000,00000000,00002010), ref: 0046F9DD
                                                    • ExtractIconExW.SHELL32(?,?,?,000000FF,00000001), ref: 0046FA1D
                                                    • DestroyIcon.USER32(?), ref: 0046FA4F
                                                    • SendMessageW.USER32(?,000000F7,00000001,?), ref: 0046FA5A
                                                    • DeleteObject.GDI32(?), ref: 0046FA68
                                                    • DestroyIcon.USER32(?,?,000000F7,00000001,?), ref: 0046FA76
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Icon$Destroy$DeleteMessageObjectSend$ImageLoad$ExtractLongWindow
                                                    • String ID:
                                                    • API String ID: 3412594756-0
                                                    • Opcode ID: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                                    • Instruction ID: 2b127e2e725f503062080ad48664a75956f0b49bd2ac624c91da1236fc619d99
                                                    • Opcode Fuzzy Hash: f692dd120a8e9e8c350368ee646f6d7ebba10fee5470a76da8eaf9bc85602db5
                                                    • Instruction Fuzzy Hash: BD41B575344301ABE7209B65ED45B6B7398EB44711F00083EFA85A7381DBB9E809C76A
                                                    APIs
                                                      • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
                                                      • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                    • GetDriveTypeW.KERNEL32 ref: 0045DA30
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DA76
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DAAB
                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DADF
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: SendString$_wcslen$BuffCharDriveLowerType
                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                    • API String ID: 4013263488-4113822522
                                                    • Opcode ID: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                                    • Instruction ID: 78e8968fe3d68f28a61334a0544e46eb3ade7c09d07056eb4a028b8014bab4f9
                                                    • Opcode Fuzzy Hash: b9e44105478404289108567262d296c88e7101013f7783f6c7bd148379995db0
                                                    • Instruction Fuzzy Hash: 86516E71604300ABD710EF55CC85F5EB3E4AF88714F14496EF985AB2D2D7B8E908CB5A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcsncpy$LocalTime__wcstoi64
                                                    • String ID:
                                                    • API String ID: 228034949-0
                                                    • Opcode ID: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                                    • Instruction ID: c9113392db11e6d0b84b7dcaf0f9983ae7bcdcfbf3325debe08446cd55f13bc3
                                                    • Opcode Fuzzy Hash: d55b35800c2a6f74fd0df3de6656c0821778ac1c15f087543c4dc83ec7dd6154
                                                    • Instruction Fuzzy Hash: 874194B181435066DA10FF6AC8479DFB3A8EF89314F84495FF945D3162E378E64883AA
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,?,0046FAD5), ref: 004334F4
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043350F
                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043351A
                                                    • GlobalLock.KERNEL32(00000000), ref: 00433523
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433533
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0043353A
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,0046FAD5,?,?,?,?), ref: 00433541
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0046FAD5,?,?,?,?), ref: 0043354F
                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00482A20,?), ref: 00433568
                                                    • GlobalFree.KERNEL32(00000000), ref: 0043357B
                                                    • GetObjectW.GDI32(?,00000018,?), ref: 004335A6
                                                    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004335DB
                                                    • DeleteObject.GDI32(?), ref: 00433603
                                                    • SendMessageW.USER32(?,00000172,00000000,?), ref: 0043361B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                    • String ID:
                                                    • API String ID: 3969911579-0
                                                    • Opcode ID: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                                    • Instruction ID: 5aed18668fdc988692497ed4484016cc97142e8c7c748bcd34b77a3330007e11
                                                    • Opcode Fuzzy Hash: c8af0a6d34b3156cf5dea3d494721158f709963105dd3e2632bd1b1f7de041f4
                                                    • Instruction Fuzzy Hash: 70410471204210AFD710DF64DC88F6BBBE8FB89711F10492DFA45972A0D7B5A941CBAA
                                                    APIs
                                                    • GetParent.USER32 ref: 00445A8D
                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00445AA0
                                                    • __wcsicoll.LIBCMT ref: 00445AC4
                                                    • __wcsicoll.LIBCMT ref: 00445AE0
                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445B3D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll$ClassMessageNameParentSend
                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                    • API String ID: 3125838495-3381328864
                                                    • Opcode ID: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                                    • Instruction ID: 9ea7b4bfd8e333fc3d4c3d1cc69785ca983c3453aa66f955cff8de8c622a02b1
                                                    • Opcode Fuzzy Hash: 6f6f70247b4827d2a410ddc22f410c306ecb8b2e46d0c95c17204de523c723c4
                                                    • Instruction Fuzzy Hash: F011E9B1B40301BBFF10B6659C46EAF739CDF94759F00081BFD44E6182F6ACA9458769
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CopyVariant$ErrorLast
                                                    • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
                                                    • API String ID: 2286883814-4206948668
                                                    • Opcode ID: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                                                    • Instruction ID: 5c76bcf0434180a49ef26f8382d3619d889c8a8ee3f63882ad125ac36acecb62
                                                    • Opcode Fuzzy Hash: 2f6e4bc4aaf8f7a3794965dba448b56a5b6575b3b05f264a778baa01eb75d6f6
                                                    • Instruction Fuzzy Hash: 4EA1F0B1644300ABD620EB25CC81EABB3E9FBC4704F10891EF65987251D779E945CBAA
                                                    APIs
                                                      • Part of subcall function 0045335B: CharLowerBuffW.USER32(?,?,?,0045D9DB,?,?,?), ref: 0045336E
                                                      • Part of subcall function 00445975: _wcslen.LIBCMT ref: 00445984
                                                    • GetDriveTypeW.KERNEL32(?,?,00000061), ref: 00475EEC
                                                    • _wcscpy.LIBCMT ref: 00475F18
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                                    • String ID: a$all$cdrom$fixed$network$ramdisk$removable$unknown$HH
                                                    • API String ID: 3052893215-4176887700
                                                    • Opcode ID: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                                    • Instruction ID: 30c0e749cffa51fc832ec364bb88d57898ea161693411a08ebb212f54f1b1ce2
                                                    • Opcode Fuzzy Hash: 531685fb0cf90d6ae2ec3f9560420c3d557b818d2d0e5f32259ad5e7ccb69ffd
                                                    • Instruction Fuzzy Hash: E951E5716047009BC710EF51D981B9BB3D4AB85705F108C2FF948AB382D7B9DE09879B
                                                    APIs
                                                    • StringFromIID.OLE32(?,?,00000003,?,?,00000000), ref: 004582E5
                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    • CoTaskMemFree.OLE32(?,00000000), ref: 00458335
                                                    • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 00458351
                                                    • RegQueryValueExW.ADVAPI32 ref: 00458381
                                                    • CLSIDFromString.OLE32(00000000,?), ref: 004583AF
                                                    • RegQueryValueExW.ADVAPI32 ref: 004583E8
                                                    • LoadRegTypeLib.OLEAUT32(?,?), ref: 00458486
                                                      • Part of subcall function 00413F97: __wtof_l.LIBCMT ref: 00413FA1
                                                    • RegCloseKey.ADVAPI32(?), ref: 004584BA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: FromQueryStringValue_wcslen$CloseFreeLoadOpenTaskType__wtof_l_wcscpy
                                                    • String ID: Version$\TypeLib$interface\
                                                    • API String ID: 656856066-939221531
                                                    • Opcode ID: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                                    • Instruction ID: 73379605cfaaf105ee685c6daddaf2c4824f5dc828714578f474d0d05c7db838
                                                    • Opcode Fuzzy Hash: fae0be2ce993580ee9701cb6b1f6a998fde8705fa16d3e1feab2af977247b743
                                                    • Instruction Fuzzy Hash: 19513B715083059BD310EF55D944A6FB3E8FFC8B08F004A2DF985A7251EA78DD09CB9A
                                                    APIs
                                                    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E676
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E69A
                                                    • __swprintf.LIBCMT ref: 0045E6EE
                                                    • _printf.LIBCMT ref: 0045E7A9
                                                    • _printf.LIBCMT ref: 0045E7D2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: LoadString_printf$__swprintf_wcslen
                                                    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                    • API String ID: 3590180749-2354261254
                                                    • Opcode ID: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                                    • Instruction ID: 835382aeb01427732dc6b750cf2ba574ed77461063debdd42288bdc21f9728b4
                                                    • Opcode Fuzzy Hash: fd3ade05fede2dfa3d14bccfacac15f81e3d16141c85e45952f832d3a26197ce
                                                    • Instruction Fuzzy Hash: B051D5715143019BD324FB51CC41EAF77A8AF84354F14093FF94563292DB78AE49CB6A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __swprintf_wcscpy$__i64tow__itow
                                                    • String ID: %.15g$0x%p$False$True
                                                    • API String ID: 3038501623-2263619337
                                                    • Opcode ID: 7e05bcd9e2404d5900448c0fd088cae6e51159eb800a8f0db5a010da26838fc3
                                                    • Instruction ID: 2d826072eebb3cc9b8b6a8fde8b9da0ebc7f558755c715a4a51c402ed3db85ba
                                                    • Opcode Fuzzy Hash: 7e05bcd9e2404d5900448c0fd088cae6e51159eb800a8f0db5a010da26838fc3
                                                    • Instruction Fuzzy Hash: 5741E5B2504204ABD700EF35EC06EAB73A4EB95304F04892FFD0997282F67DD619976E
                                                    APIs
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    • _memset.LIBCMT ref: 00458194
                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004581D6
                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,00000000), ref: 004581F4
                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,00000000), ref: 00458219
                                                    • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,?), ref: 00458248
                                                    • CLSIDFromString.OLE32(00000000,?), ref: 00458279
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0045828F
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00458296
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset_wcslen
                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                    • API String ID: 2255324689-22481851
                                                    • Opcode ID: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                                    • Instruction ID: 0916ae95de1959dc40878de41837780f7e862baf069d4d5c3429810960799c2e
                                                    • Opcode Fuzzy Hash: 40f125b4ffe5f12493adc0cb93ab67eb911e8c28f62e3d79c4190a4fe5521cad
                                                    • Instruction Fuzzy Hash: 4A4190725083019BD320EF54C845B5FB7E8AF84714F044D2EFA8577291DBB8E949CB9A
                                                    APIs
                                                    • RegOpenKeyExW.ADVAPI32(80000000,interface,00000000,00020019,?), ref: 00458513
                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00458538
                                                    • RegCloseKey.ADVAPI32(?), ref: 00458615
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,000001FE,interface\), ref: 0045858A
                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,00000028), ref: 004585A8
                                                    • __wcsicoll.LIBCMT ref: 004585D6
                                                    • IIDFromString.OLE32(?,?,?,?), ref: 004585EB
                                                    • RegCloseKey.ADVAPI32(?), ref: 004585F8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen$EnumFromQueryStringValue__wcsicoll_wcslen
                                                    • String ID: ($interface$interface\
                                                    • API String ID: 2231185022-3327702407
                                                    • Opcode ID: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                                    • Instruction ID: 2ed788c9a442d2de66cb2a0eaf665167c450c6ff9570aaff4df7cfaf3afbbce1
                                                    • Opcode Fuzzy Hash: f3ba987632fb2ab980929a1e8c26c1d4f1068388d2a95cb25d4e52b6d927b3fe
                                                    • Instruction Fuzzy Hash: CE317271204305ABE710DF54DD85F6BB3E8FB84744F10492DF685A6191EAB8E908C76A
                                                    APIs
                                                    • WSAStartup.WSOCK32(00000101,?), ref: 004365A5
                                                    • gethostname.WSOCK32(00000100,00000100,00000101,?), ref: 004365BC
                                                    • gethostbyname.WSOCK32(00000101,00000100,00000100,00000101,?), ref: 004365C6
                                                    • _wcscpy.LIBCMT ref: 004365F5
                                                    • WSACleanup.WSOCK32 ref: 004365FD
                                                    • inet_ntoa.WSOCK32(00000100,?), ref: 00436624
                                                    • _strcat.LIBCMT ref: 0043662F
                                                    • _wcscpy.LIBCMT ref: 00436644
                                                    • WSACleanup.WSOCK32(?,?,?,?,?,?,00000100,?), ref: 00436652
                                                    • _wcscpy.LIBCMT ref: 00436666
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$Cleanup$Startup_strcatgethostbynamegethostnameinet_ntoa
                                                    • String ID: 0.0.0.0
                                                    • API String ID: 2691793716-3771769585
                                                    • Opcode ID: 4b0b642d101985f70d6cdd6c7558d2647848e1b39832a20c11015ca7ea879481
                                                    • Instruction ID: 29d249c793a1599df1911ffab6ed89036a29d54f41df1114d8fa63e2d2305339
                                                    • Opcode Fuzzy Hash: 4b0b642d101985f70d6cdd6c7558d2647848e1b39832a20c11015ca7ea879481
                                                    • Instruction Fuzzy Hash: 5C21D4726003016BD620FB269C42FFF33A89FD4318F54492FF64456242EABDD58983AB
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048C968,0000000C,00416C4D,00000000,00000000,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416B24
                                                    • __crt_waiting_on_module_handle.LIBCMT ref: 00416B2F
                                                      • Part of subcall function 0041177F: Sleep.KERNEL32(000003E8,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 0041178B
                                                      • Part of subcall function 0041177F: GetModuleHandleW.KERNEL32(00411739,?,?,00416A38,KERNEL32.DLL,?,00411B0C,?,00413973,00411739,?,?,00411739,?,00401C0B), ref: 00411794
                                                    • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00416B58
                                                    • GetProcAddress.KERNEL32(00411739,DecodePointer), ref: 00416B68
                                                    • __lock.LIBCMT ref: 00416B8A
                                                    • InterlockedIncrement.KERNEL32(00EA60FF), ref: 00416B97
                                                    • __lock.LIBCMT ref: 00416BAB
                                                    • ___addlocaleref.LIBCMT ref: 00416BC9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                    • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                    • API String ID: 1028249917-2843748187
                                                    • Opcode ID: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                                    • Instruction ID: dfb830706c011728ae11a8c0f52cb2fa371409e71f4acd403326aacb15a29bdd
                                                    • Opcode Fuzzy Hash: 149215eb9963fdce733e6eee9b7d54027110d9b9ecd285c2a82fe369659baa59
                                                    • Instruction Fuzzy Hash: 4E119671944701AFD720EF76C905B9EBBE0AF00714F10495FE469A6391DB78A580CB1D
                                                    APIs
                                                    • SendMessageW.USER32(?,00000000,000000FF,?), ref: 0044931D
                                                    • SendMessageW.USER32(?,0045BBB0,00000000,00000000), ref: 0044932D
                                                    • CharNextW.USER32(?,?,?,?,0045BBB0,00000000,00000000,?,?), ref: 00449361
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449375
                                                    • SendMessageW.USER32(?,00000402,?), ref: 0044941C
                                                    • SendMessageW.USER32(004A83D8,000000C2,00000001,?), ref: 004494A0
                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449515
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CharNext
                                                    • String ID:
                                                    • API String ID: 1350042424-0
                                                    • Opcode ID: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                                    • Instruction ID: cf19a455924c4199ae2d31ef2e344bdd2865620a2145bd440d1f5c61272ee54d
                                                    • Opcode Fuzzy Hash: 5fd89deb92f75c0e0d7406111af65340a6b95ffecf1ba9c2db83920ef449de6e
                                                    • Instruction Fuzzy Hash: 5D81B5312083019BE720DF15DC85FBBB7E4EBD9B20F00492EFA54962C0D7B99946D766
                                                    APIs
                                                    • GetKeyboardState.USER32(?,?,00000000), ref: 00453C0D
                                                    • SetKeyboardState.USER32(?), ref: 00453C5A
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00453C82
                                                    • GetKeyState.USER32(000000A0), ref: 00453C99
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00453CC9
                                                    • GetKeyState.USER32(000000A1), ref: 00453CDA
                                                    • GetAsyncKeyState.USER32(00000011), ref: 00453D07
                                                    • GetKeyState.USER32(00000011), ref: 00453D15
                                                    • GetAsyncKeyState.USER32(00000012), ref: 00453D3F
                                                    • GetKeyState.USER32(00000012), ref: 00453D4D
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00453D77
                                                    • GetKeyState.USER32(0000005B), ref: 00453D85
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                                    • Instruction ID: 09d2c23b2f41f951af40c960ff4fa7a39ed3d74d48f5bb091813d5d41b5bf946
                                                    • Opcode Fuzzy Hash: 439544d7db57c6269f5a832870b7215b314e2d5ec2fc8731d7b6f8ebe45629c5
                                                    • Instruction Fuzzy Hash: BD5108311497C42AF731EF6048217A7BBE45F52782F488D5EE9C107283E619AB0C976B
                                                    APIs
                                                    • GetDlgItem.USER32(?,00000001), ref: 00437DD7
                                                    • GetWindowRect.USER32(00000000,?), ref: 00437DE9
                                                    • MoveWindow.USER32(00000000,0000000A,?,?,?,00000000), ref: 00437E5C
                                                    • GetDlgItem.USER32(?,00000002), ref: 00437E70
                                                    • GetWindowRect.USER32(00000000,?), ref: 00437E82
                                                    • MoveWindow.USER32(00000000,?,00000000,?,?,00000000), ref: 00437EDB
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00437EEA
                                                    • GetWindowRect.USER32(00000000,?), ref: 00437EFC
                                                    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00437F46
                                                    • GetDlgItem.USER32(?,000003EA), ref: 00437F55
                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 00437F6E
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00437F78
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                    • String ID:
                                                    • API String ID: 3096461208-0
                                                    • Opcode ID: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                                    • Instruction ID: 6334a21bf5495bf578199e0a0c43900503e40640961724061e29feeedb49a886
                                                    • Opcode Fuzzy Hash: 85b2574db82c4a067caaf632f6dab2f3668a9f7fdedc9eb4d1c33f4a9692aa02
                                                    • Instruction Fuzzy Hash: 46511CB16083069FC318DF68DD85A2BB7E9ABC8300F144A2DF985D3391E6B4ED058B95
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                    • String ID:
                                                    • API String ID: 136442275-0
                                                    • Opcode ID: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                                    • Instruction ID: e47e2093bf76b35e8f1fec89578fc46911e8a4506192668d3a16ce6d5165f020
                                                    • Opcode Fuzzy Hash: 8bb1124220d8f68122d0f1a8633f784f40ed2a0c71bdd1f95919e960fb23027d
                                                    • Instruction Fuzzy Hash: 744124B2408345ABC235E754C885EEF73ECABD8314F44891EB68D42141EB796688C7A7
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B479
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ConnectRegistry_wcslen
                                                    • String ID: HH
                                                    • API String ID: 535477410-2761332787
                                                    • Opcode ID: dd977f09bea9308b610c7238e96fb584538275b520f46e9374bb1ad9d3878166
                                                    • Instruction ID: 7a368be733395892e28f24b11b3b05e85d853a2cd395d98498a1c99032eed9d9
                                                    • Opcode Fuzzy Hash: dd977f09bea9308b610c7238e96fb584538275b520f46e9374bb1ad9d3878166
                                                    • Instruction Fuzzy Hash: 63E171B1604200ABC714EF28C981F1BB7E4EF88704F148A1EF685DB381D779E945CB9A
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 004604B5
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 004604F1
                                                    • _wcslen.LIBCMT ref: 00460502
                                                    • CharUpperBuffW.USER32(?,00000000), ref: 00460510
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00460589
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 004605C2
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00460606
                                                    • GetClassNameW.USER32(?,?,00000400), ref: 0046063E
                                                    • GetWindowRect.USER32(?,?), ref: 004606AD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen
                                                    • String ID: ThumbnailClass
                                                    • API String ID: 4123061591-1241985126
                                                    • Opcode ID: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                                    • Instruction ID: b645ef8d54a60b7d8a856e9fdf4d8999e4c56e3b903fe9b51be5921097eabf2a
                                                    • Opcode Fuzzy Hash: d81b9eb1014bf0c552f647121340d293adfb5e43e55e37c5a686eb3c785bede7
                                                    • Instruction Fuzzy Hash: 3F91B0715043019FDB14DF24C884BAB77A8EF84715F04896FFD85AA281E778E905CBAB
                                                    APIs
                                                      • Part of subcall function 00456354: GetCursorPos.USER32(004A83D8), ref: 0045636A
                                                      • Part of subcall function 00456354: ScreenToClient.USER32(004A83D8,?), ref: 0045638A
                                                      • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563D0
                                                      • Part of subcall function 00456354: GetAsyncKeyState.USER32(?), ref: 004563DC
                                                    • DefDlgProcW.USER32(?,00000205,?,?,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F55F
                                                    • ImageList_DragLeave.COMCTL32(00000000,004A83D8,00000000,00000001,004A83D8,?), ref: 0046F57D
                                                    • ImageList_EndDrag.COMCTL32 ref: 0046F583
                                                    • ReleaseCapture.USER32 ref: 0046F589
                                                    • SetWindowTextW.USER32(?,00000000), ref: 0046F620
                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0046F630
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID$HH
                                                    • API String ID: 2483343779-2060113733
                                                    • Opcode ID: 5127d0ffcd17cb1bef4f2f1971358f36b919fc832d8745dd5c7fc1032c5585dd
                                                    • Instruction ID: 4b94e37398fb4c0e8bf176de98e3888209b69965db7f8e5b86c8cb252d1f017b
                                                    • Opcode Fuzzy Hash: 5127d0ffcd17cb1bef4f2f1971358f36b919fc832d8745dd5c7fc1032c5585dd
                                                    • Instruction Fuzzy Hash: EB5106716043119BD700DF18DC85FAF77A5EB89310F04492EF941973A2DB789D49CBAA
                                                    APIs
                                                    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 0046FD8A
                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,004A83D8,?), ref: 0046FDF0
                                                    • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 0046FE0E
                                                    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,004A83D8,?), ref: 0046FE20
                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 0046FEA5
                                                    • SendMessageW.USER32(?,0000113F,00000000,?), ref: 0046FEDF
                                                    • GetClientRect.USER32(?,?), ref: 0046FEF2
                                                    • RedrawWindow.USER32(?,?,00000000,00000000), ref: 0046FF02
                                                    • DestroyIcon.USER32(?), ref: 0046FFCC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                                    • String ID: 2
                                                    • API String ID: 1331449709-450215437
                                                    • Opcode ID: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                                    • Instruction ID: e79942d1a0196d9b5e30c5c178d8ccafd59c9ae1e7fac48b8759c586c5a3b44e
                                                    • Opcode Fuzzy Hash: 0839cb131ab93339cce718f32a9fb856b385d6e902e652cc812f2dbbb554e4d7
                                                    • Instruction Fuzzy Hash: EB51AC702043019FD320CF44D885BAABBE5FB88700F04487EE684872A2D7B5A849CB5A
                                                    APIs
                                                    • DestroyWindow.USER32(?,?,?,?,?,?,00000000,static,00000000,00000000,?,?,00000000,00000000,?,00000000), ref: 00450EE1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow
                                                    • String ID: static
                                                    • API String ID: 3375834691-2160076837
                                                    • Opcode ID: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                                                    • Instruction ID: 4605c95b1b006c90d65e271c0fdf07f62d21d56273c2870bf7f2e3decf5281c5
                                                    • Opcode Fuzzy Hash: 88f11647011456fbb04f7235260bd1d02a964e72c1c4e3b3fb6640230c73d37f
                                                    • Instruction Fuzzy Hash: 4531B572200300BBD7109B64DC45F6BB3A8EBC9711F204A2EFA50D72C0D7B4E8048B69
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000008,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439409
                                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 0043940C
                                                    • GetCurrentProcess.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?), ref: 0043941D
                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?), ref: 00439420
                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 0043945B
                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00439474
                                                    • _memcmp.LIBCMT ref: 004394A9
                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004394F8
                                                    Strings
                                                    • SeAssignPrimaryTokenPrivilege, xrefs: 00439455
                                                    • SeIncreaseQuotaPrivilege, xrefs: 0043946A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
                                                    • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
                                                    • API String ID: 1446985595-805462909
                                                    • Opcode ID: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                                    • Instruction ID: 628aaead06b6f58e004e5b45c2ed9710a22b4d2b921ab75b424857e8fd72c9d6
                                                    • Opcode Fuzzy Hash: 7b5964ebc210eec24af21402e2b7f40e95def761f5b1447ed6d44f65f7ea18b7
                                                    • Instruction Fuzzy Hash: DB31A371508312ABC710DF21CD41AAFB7E8FB99704F04591EF98193240E7B8DD4ACBAA
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D848
                                                    • GetDriveTypeW.KERNEL32(?,?), ref: 0045D8A3
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D94A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$DriveType
                                                    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$HH
                                                    • API String ID: 2907320926-41864084
                                                    • Opcode ID: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                                    • Instruction ID: d4cab332979e247f8c2da9788294718902473fa09eb5ff996f03d25688ce9cbb
                                                    • Opcode Fuzzy Hash: f2537af69be7bdfb8cd077d5fba63d09357e4425d7c4eca9e5473fe3d57dd33a
                                                    • Instruction Fuzzy Hash: C7318B75A083008FC310EF65E48481EB7A1AFC8315F648D2FF945A7362C779D9068BAB
                                                    APIs
                                                    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 004672E6
                                                    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046735D
                                                    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467375
                                                    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004673ED
                                                    • SafeArrayGetVartype.OLEAUT32(CE8B7824,?), ref: 00467418
                                                    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467445
                                                    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 0046746A
                                                    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 00467559
                                                    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 0046748A
                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                    • SafeArrayAccessData.OLEAUT32(CE8B7824,?), ref: 00467571
                                                    • SafeArrayUnaccessData.OLEAUT32(CE8B7824), ref: 004675E4
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ArraySafe$Data$AccessUnaccess$Exception@8ThrowVartype_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                    • String ID:
                                                    • API String ID: 1932665248-0
                                                    • Opcode ID: 16f99e80be173eecdd1bb573f6b7f825babaa5351af7cc3efc94bb11c862a2f8
                                                    • Instruction ID: 42a0e90c8bf2b482c85e144861ec280134e9fb1dbd9e00a0d693b148f8e5f150
                                                    • Opcode Fuzzy Hash: 16f99e80be173eecdd1bb573f6b7f825babaa5351af7cc3efc94bb11c862a2f8
                                                    • Instruction Fuzzy Hash: E8B1BF752082009FD304DF29C884B6B77E5FF98318F14496EE98587362E779E885CB6B
                                                    APIs
                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00448182
                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00448185
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 004481A7
                                                    • _memset.LIBCMT ref: 004481BA
                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481CC
                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0044824E
                                                    • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482A4
                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482BE
                                                    • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482E3
                                                    • SendMessageW.USER32(?,0000101E,00000001,00000000), ref: 004482FC
                                                    • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448317
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow_memset
                                                    • String ID:
                                                    • API String ID: 830647256-0
                                                    • Opcode ID: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                                    • Instruction ID: 69fd08a602074ed3d664547bad3ac5a94a9e6c02d61aa1d07dc3907ec7ad0976
                                                    • Opcode Fuzzy Hash: 45db6e2e50868ce621a7577b0335e91e45f99dc9c013701cc26792922a244152
                                                    • Instruction Fuzzy Hash: 41616F70208341AFE310DF54C881FABB7A4FF89704F14465EFA909B2D1DBB5A945CB56
                                                    APIs
                                                      • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                                    • DestroyAcceleratorTable.USER32(?), ref: 0046EA9F
                                                    • ImageList_Destroy.COMCTL32(?), ref: 0046EB04
                                                    • ImageList_Destroy.COMCTL32(?), ref: 0046EB18
                                                    • ImageList_Destroy.COMCTL32(?), ref: 0046EB24
                                                    • DeleteObject.GDI32(00740000), ref: 0046EB4F
                                                    • DestroyIcon.USER32(0049006F), ref: 0046EB67
                                                    • DeleteObject.GDI32(85EE5973), ref: 0046EB7F
                                                    • DestroyWindow.USER32(0041005C), ref: 0046EB97
                                                    • DestroyIcon.USER32(?), ref: 0046EBBF
                                                    • DestroyIcon.USER32(?), ref: 0046EBCD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateRectTableWindow
                                                    • String ID:
                                                    • API String ID: 802431696-0
                                                    • Opcode ID: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                                    • Instruction ID: 42d633cefbe7d7192e7a113645d0a532909e6831d49db23f2259be933aabe8c6
                                                    • Opcode Fuzzy Hash: 294737084f3018da842919bbfa865d3a976cdf3ad66c8c89ec2250206a47d952
                                                    • Instruction Fuzzy Hash: 17513178600202DFDB14DF26D894E2A77E9FB4AB14B54446EE502CB361EB38EC41CB5E
                                                    APIs
                                                    • GetKeyboardState.USER32(?,?,?), ref: 00444D8A
                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00444E0F
                                                    • GetKeyState.USER32(000000A0), ref: 00444E26
                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00444E40
                                                    • GetKeyState.USER32(000000A1), ref: 00444E51
                                                    • GetAsyncKeyState.USER32(00000011), ref: 00444E69
                                                    • GetKeyState.USER32(00000011), ref: 00444E77
                                                    • GetAsyncKeyState.USER32(00000012), ref: 00444E8F
                                                    • GetKeyState.USER32(00000012), ref: 00444E9D
                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00444EB5
                                                    • GetKeyState.USER32(0000005B), ref: 00444EC3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: State$Async$Keyboard
                                                    • String ID:
                                                    • API String ID: 541375521-0
                                                    • Opcode ID: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                                    • Instruction ID: c605e69a62dfc64c618b97cb3a1930d242a0674024be490a091b983f03ece729
                                                    • Opcode Fuzzy Hash: d4a73a67db12bad31d9fb613c99c8778707defbe90317bf640d05d8e99de570f
                                                    • Instruction Fuzzy Hash: 6A41C3646087C52DFB31966484017E7FFD16FA2708F58844FD1C5067C2DBAEA9C8C7AA
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004508CB
                                                    • SendMessageW.USER32(?,00001036,00000000,?), ref: 004508DB
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,00001036,00000000,?,000000FF,?,SysListView32,004848E8,00000000), ref: 004508FC
                                                    • _wcslen.LIBCMT ref: 00450944
                                                    • _wcscat.LIBCMT ref: 00450955
                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045096C
                                                    • SendMessageW.USER32(?,00001061,?,?), ref: 0045099B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window_wcscat_wcslen
                                                    • String ID: -----$SysListView32
                                                    • API String ID: 4008455318-3975388722
                                                    • Opcode ID: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                                    • Instruction ID: 786a3889ee88f98d9b0e9b4b0e1dacf7018a6923f31dd28eeaa3c07ad082d1a6
                                                    • Opcode Fuzzy Hash: 1aeeed20face43e167d1a5b6966347104c1855cbe0e780de9d31d79ee612f7fa
                                                    • Instruction Fuzzy Hash: 17519470504340ABE330DB65C885FABB3E4AF84714F104E1EFA94972D3D6B99989CB65
                                                    APIs
                                                    • _memset.LIBCMT ref: 00448625
                                                    • CreateMenu.USER32 ref: 0044863C
                                                    • SetMenu.USER32(?,00000000), ref: 0044864C
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 004486D6
                                                    • IsMenu.USER32(?), ref: 004486EB
                                                    • CreatePopupMenu.USER32 ref: 004486F5
                                                    • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 00448739
                                                    • DrawMenuBar.USER32 ref: 00448742
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                    • String ID: 0
                                                    • API String ID: 176399719-4108050209
                                                    • Opcode ID: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                                    • Instruction ID: 98f94d81d6847d6484dd50bbdc77a0bd9f9f2d632c710d3394220f00cc789bef
                                                    • Opcode Fuzzy Hash: 4add02930eb798c2c2cb68413aedc402262f89096725e95a36bc963f45c6c407
                                                    • Instruction Fuzzy Hash: 86417675604201AFD700CF68D894A9BBBE4FF89314F14891EFA488B350DBB5A845CFA6
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469277
                                                    • GetDlgCtrlID.USER32(00000000), ref: 00469289
                                                    • GetParent.USER32 ref: 004692A4
                                                    • SendMessageW.USER32(00000000,?,00000111), ref: 004692A7
                                                    • GetDlgCtrlID.USER32(00000000), ref: 004692AE
                                                    • GetParent.USER32 ref: 004692C7
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 004692CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CtrlParent$_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 2040099840-1403004172
                                                    • Opcode ID: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                                    • Instruction ID: ef07326ddff4210f4741e87947fad3c2ec39ee11b6619cfdf8cc81125e1c6f8c
                                                    • Opcode Fuzzy Hash: d7a46b5f720fef199203ad69d051b39deebb3b2451f9d950c399d088bcf038a9
                                                    • Instruction Fuzzy Hash: BC21D6716002147BD600AB65CC45DBFB39CEB85324F044A1FF954A73D1DAB8EC0947B9
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469471
                                                    • GetDlgCtrlID.USER32(00000000), ref: 00469483
                                                    • GetParent.USER32 ref: 0046949E
                                                    • SendMessageW.USER32(00000000,?,00000111), ref: 004694A1
                                                    • GetDlgCtrlID.USER32(00000000), ref: 004694A8
                                                    • GetParent.USER32 ref: 004694C1
                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 004694C4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CtrlParent$_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 2040099840-1403004172
                                                    • Opcode ID: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                                    • Instruction ID: 434b10a17d45167e777e8ea6e726dd6ee4e01267e4a119798c8aa60e835c5cdc
                                                    • Opcode Fuzzy Hash: 2e10f5a1695edfae3743bbe69767f09e04e95ab32c83142982b04f1cb5eb07ed
                                                    • Instruction Fuzzy Hash: CA21D7756002147BD600BB29CC45EBFB39CEB85314F04492FF984A7291EABCEC0A4779
                                                    APIs
                                                      • Part of subcall function 004419ED: DeleteObject.GDI32(?), ref: 00441A53
                                                    • SendMessageW.USER32(75C123D0,00001001,00000000,00000000), ref: 00448E73
                                                    • SendMessageW.USER32(75C123D0,00001026,00000000,00000000), ref: 00448E7E
                                                      • Part of subcall function 00441A7A: CreateSolidBrush.GDI32 ref: 00441ACB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                                    • String ID:
                                                    • API String ID: 3771399671-0
                                                    • Opcode ID: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                                    • Instruction ID: ebbecaf0548398ae771b9aa28ebf0b72f134f9ffbbfb28b2279bd799396bd9e3
                                                    • Opcode Fuzzy Hash: 51f09a1d655476e15b4ab454a85655f186203ac899921849c361721d54d31972
                                                    • Instruction Fuzzy Hash: F4510930208300AFE2209F25DD85F6F77EAEB85B14F14091EF994E72D0CBB9E9458769
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: InitVariant$_malloc_wcscpy_wcslen
                                                    • String ID:
                                                    • API String ID: 3413494760-0
                                                    • Opcode ID: afb533e23b19910be0c027df8fa87fd227b592e7e5a0e6e969ae1a59b8da4157
                                                    • Instruction ID: 77b59fa0745152fd1b6386ccdd9ca850b9b7f4abb66e551d88b584249de3d357
                                                    • Opcode Fuzzy Hash: afb533e23b19910be0c027df8fa87fd227b592e7e5a0e6e969ae1a59b8da4157
                                                    • Instruction Fuzzy Hash: F83150B2600746AFC714DF7AC880996FBA8FF88310B44892EE64983641D735F554CBA5
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 004377D7
                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,0045FDE0,?,?,00000001), ref: 004377EB
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 004377F8
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 00437809
                                                    • GetWindowThreadProcessId.USER32(?,00000001), ref: 00437819
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043782E
                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,0045FDE0,?,?,00000001), ref: 0043783D
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 0043788D
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378A1
                                                    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,0045FDE0,?,?,00000001), ref: 004378AC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                    • String ID:
                                                    • API String ID: 2156557900-0
                                                    • Opcode ID: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                                    • Instruction ID: cf5237ead9178137421241ba4763476990ac919c12b5de4495d1c20f4e3090f4
                                                    • Opcode Fuzzy Hash: f5203a8e23f024bead7fa0256802a4b49a7a8dce25e7908e04b44143f6d1477f
                                                    • Instruction Fuzzy Hash: B0316FB1504341AFD768EF28DC88A7BB7A9EF9D310F14182EF44197250D7B89C44CB69
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll
                                                    • String ID: 0%d$DOWN$OFF
                                                    • API String ID: 3832890014-468733193
                                                    • Opcode ID: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                                    • Instruction ID: 3901981f80fa7430cd77b89167089bc3925961a07aad88d0cc2f25a35af8916b
                                                    • Opcode Fuzzy Hash: b886d43e96c57de01ffb669c6ba173cdd7012b944398daffbb17888043fd80c7
                                                    • Instruction Fuzzy Hash: B7F1D8614083856DEB21EB21C845BAF7BE85F95309F08092FF98212193D7BCD68DC76B
                                                    APIs
                                                    • VariantInit.OLEAUT32(00000000), ref: 0045E959
                                                    • VariantCopy.OLEAUT32(00000000), ref: 0045E963
                                                    • VariantClear.OLEAUT32 ref: 0045E970
                                                    • VariantTimeToSystemTime.OLEAUT32 ref: 0045EAEB
                                                    • __swprintf.LIBCMT ref: 0045EB1F
                                                    • VarR8FromDec.OLEAUT32(?,?), ref: 0045EB61
                                                    • VariantInit.OLEAUT32(00000000), ref: 0045EBE7
                                                    Strings
                                                    • %4d%02d%02d%02d%02d%02d, xrefs: 0045EB19
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Variant$InitTime$ClearCopyFromSystem__swprintf
                                                    • String ID: %4d%02d%02d%02d%02d%02d
                                                    • API String ID: 43541914-1568723262
                                                    • Opcode ID: 37b26c3e130c1a31af09048bf95897f87bf3bde4777f47a21ee6b10bd43e23e8
                                                    • Instruction ID: db8708ae94f177a13b26e6bf0e0b18ed2eb17208bc27bd00c320e315e6f9d40a
                                                    • Opcode Fuzzy Hash: 37b26c3e130c1a31af09048bf95897f87bf3bde4777f47a21ee6b10bd43e23e8
                                                    • Instruction Fuzzy Hash: ABC1F4BB1006019BC704AF06D480666F7A1FFD4322F14896FED984B341DB3AE95ED7A6
                                                    APIs
                                                    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FE66
                                                    • Sleep.KERNEL32(0000000A), ref: 0042FE6E
                                                    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 0042FF5D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: DecrementInterlocked$Sleep
                                                    • String ID: 0vH$0vH$4RH0vH$@COM_EVENTOBJ
                                                    • API String ID: 2250217261-3412429629
                                                    • Opcode ID: 8325fdbff6a5a70f34a83206db20ac719b31378d050460014c720838f554db1b
                                                    • Instruction ID: 990b5f35a06538e4ae7b6c94f393f4a5fafaaf51bfa382c75dcb300f2d234fa3
                                                    • Opcode Fuzzy Hash: 8325fdbff6a5a70f34a83206db20ac719b31378d050460014c720838f554db1b
                                                    • Instruction Fuzzy Hash: E0B1C0715083009FC714EF54C990A5FB3E4AF98304F508A2FF495972A2DB78ED4ACB9A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                    • API String ID: 0-1603158881
                                                    • Opcode ID: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                                    • Instruction ID: 1d39c91c6ba170ccd8bd44326015c92659356e06a413e753493f98454e3169a0
                                                    • Opcode Fuzzy Hash: b68d94a9d6a5d87f13f0fb5a725928f8f142c37ef967d8f11e3e615729381ce2
                                                    • Instruction Fuzzy Hash: 49A1D3B14043459BCB20EF50CC81BDE37A4AF94348F44891FF9896B182EF79A64DC76A
                                                    APIs
                                                    • _memset.LIBCMT ref: 00479D1F
                                                    • VariantInit.OLEAUT32(?), ref: 00479F06
                                                    • VariantClear.OLEAUT32(?), ref: 00479F11
                                                    • VariantInit.OLEAUT32(?), ref: 00479DF7
                                                      • Part of subcall function 00467626: VariantInit.OLEAUT32(00000000), ref: 00467666
                                                      • Part of subcall function 00467626: VariantCopy.OLEAUT32(00000000,00479BD3), ref: 00467670
                                                      • Part of subcall function 00467626: VariantClear.OLEAUT32 ref: 0046767D
                                                    • VariantClear.OLEAUT32(?), ref: 00479F9C
                                                      • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Variant$Copy$ClearInit$ErrorLast_memset
                                                    • String ID: F$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                    • API String ID: 665237470-60002521
                                                    • Opcode ID: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                                                    • Instruction ID: 799f1794578ead7d01377608c22e1fb401aa4fc5ffca8a64c02b8280356d09a3
                                                    • Opcode Fuzzy Hash: d48da594d57f6aadbcc7a695fec4cf75dc39f6aec1ddb07572db38b207896a5c
                                                    • Instruction Fuzzy Hash: 6091B272204341AFD720DF64D880EABB7E9EFC4314F50891EF28987291D7B9AD45C766
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046A84D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ConnectRegistry_wcslen
                                                    • String ID: HH
                                                    • API String ID: 535477410-2761332787
                                                    • Opcode ID: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                                    • Instruction ID: 68d8ff7817732ac0dd8275009c421e29eb5870de2046e22f9b94a35ba54c9d9f
                                                    • Opcode Fuzzy Hash: 95544a26956fe54eb2a8636236a3b10fc217bfdb2bff17811b2f45cb9df4731a
                                                    • Instruction Fuzzy Hash: FE617FB56083009FD304EF65C981F6BB7E4AF88704F14891EF681A7291D678ED09CB97
                                                    APIs
                                                    • _memset.LIBCMT ref: 0045F317
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0045F367
                                                    • IsMenu.USER32(?), ref: 0045F380
                                                    • CreatePopupMenu.USER32 ref: 0045F3C5
                                                    • GetMenuItemCount.USER32(?), ref: 0045F42F
                                                    • InsertMenuItemW.USER32(?,?,00000001,?), ref: 0045F45B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                    • String ID: 0$2
                                                    • API String ID: 3311875123-3793063076
                                                    • Opcode ID: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                                    • Instruction ID: 6c7ab59355789d00cbd42ef361c1bd9312a1bc9220e92816940967e3bd29aecc
                                                    • Opcode Fuzzy Hash: fbdd9a11e44187a4bf70f7de18f8631e861f84fad9f8f26dcc1fb12baf34abbc
                                                    • Instruction Fuzzy Hash: E451CF702043409FD710CF69D888B6BBBE4AFA5319F104A3EFD9586292D378994DCB67
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,004A8E80,00000100,00000100,?,C:\Users\user\Desktop\FSRHC6mB16.exe), ref: 0043719E
                                                    • LoadStringW.USER32(00000000), ref: 004371A7
                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004371BD
                                                    • LoadStringW.USER32(00000000), ref: 004371C0
                                                    • _printf.LIBCMT ref: 004371EC
                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00437208
                                                    Strings
                                                    • C:\Users\user\Desktop\FSRHC6mB16.exe, xrefs: 00437189
                                                    • %s (%d) : ==> %s: %s %s, xrefs: 004371E7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModuleString$Message_printf
                                                    • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\FSRHC6mB16.exe
                                                    • API String ID: 220974073-1788232494
                                                    • Opcode ID: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                                    • Instruction ID: cc9e6972dbc5209964c20f0f7d1f7455a13934f6c555fd98bc0bf92a0502fb90
                                                    • Opcode Fuzzy Hash: 94d1ddb87e9fdddd1f0eb85761e890ae026325719f266e56d7856026e6b64315
                                                    • Instruction Fuzzy Hash: F7014FB2A543447AE620EB549D06FFB365CABC4B01F444C1EB794A60C0AAF865548BBA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                                    • Instruction ID: 20732dcab93056f759d0b04a6df1a57780e33876730225f1fefd21ccf2a16f59
                                                    • Opcode Fuzzy Hash: b00adbc1ea9d53563bb8a7982d93c3fa4b8356126e06b3aad1cc727703ca6f1a
                                                    • Instruction Fuzzy Hash: 36519070200301ABD320DF29CC85F5BB7E8EB48715F540A1EF995E7292D7B4E949CB29
                                                    APIs
                                                      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\FSRHC6mB16.exe,?,C:\Users\user\Desktop\FSRHC6mB16.exe,004A8E80,C:\Users\user\Desktop\FSRHC6mB16.exe,0040F3D2), ref: 0040FFCA
                                                      • Part of subcall function 00436AC4: GetFileAttributesW.KERNEL32(?,0044BD82,?,?,?), ref: 00436AC9
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0045355E
                                                    • MoveFileW.KERNEL32(?,?), ref: 0045358E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                                    • String ID:
                                                    • API String ID: 978794511-0
                                                    • Opcode ID: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                                    • Instruction ID: dcad70f49e32ae1adaf0c812d378eb0bba467e0a617048934f4a65f03e3a0b24
                                                    • Opcode Fuzzy Hash: 905b41a6b5f1f1e7811aa1c06e555ad1605d40905c9a381d53b63ac73f12040d
                                                    • Instruction Fuzzy Hash: 665162B25043406AC724EF61D885ADFB3E8AFC8305F44992EB94992151E73DD34DC767
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                                    • Instruction ID: b1e2397247e50d0c7000acf5a2db8631a214b417b603bec0598d849dd48054e0
                                                    • Opcode Fuzzy Hash: 2697ea5a26a9fc7488a3d070abad83f7d669ddccf749f4bfc66ff3ac1f4b4023
                                                    • Instruction Fuzzy Hash: E54128332402806BE320A75DB8C4ABBFB98E7A2362F50443FF18196520D76678C5D339
                                                    APIs
                                                      • Part of subcall function 0044593E: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 0044595D
                                                      • Part of subcall function 0044593E: GetCurrentThreadId.KERNEL32 ref: 00445964
                                                      • Part of subcall function 0044593E: AttachThreadInput.USER32(00000000,?,00000001,00478FA7), ref: 0044596B
                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D15
                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00445D35
                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445D3F
                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D45
                                                    • PostMessageW.USER32(00000000,00000100,00000027,00000000), ref: 00445D66
                                                    • Sleep.KERNEL32(00000000), ref: 00445D70
                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445D76
                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00445D8B
                                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445D8F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                    • String ID:
                                                    • API String ID: 2014098862-0
                                                    • Opcode ID: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                                    • Instruction ID: b085f3065cf9cd100f04f322da00d4b037e108fc79bf5967fdabce1cd6d2e74b
                                                    • Opcode Fuzzy Hash: 621277f82d70151dd5f553487d646ea3797e8fa9e9e6e4ab5ab83039983e6254
                                                    • Instruction Fuzzy Hash: 7B116971790704B7F620AB958C8AF5A7399EF88B11F20080DF790AB1C1C9F5E4418B7C
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AddressProc_malloc$_strcat_strlen
                                                    • String ID: AU3_FreeVar
                                                    • API String ID: 2184576858-771828931
                                                    • Opcode ID: 111e65442873bd7cbffe48700b84114c079de58427b558a04ef4a5d95244f0f0
                                                    • Instruction ID: c940ad03d776ce5ee908f8b881b33357b51647545ffc53e819ca791e1fdac2da
                                                    • Opcode Fuzzy Hash: 111e65442873bd7cbffe48700b84114c079de58427b558a04ef4a5d95244f0f0
                                                    • Instruction Fuzzy Hash: EDA18DB5604205DFC300DF59C480A2AB7E5FFC8319F1489AEE9554B362D739ED89CB8A
                                                    APIs
                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D5A
                                                    • DestroyWindow.USER32(?), ref: 0042A751
                                                    • UnregisterHotKey.USER32(?), ref: 0042A778
                                                    • FreeLibrary.KERNEL32(?), ref: 0042A822
                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0042A854
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                                    • String ID: close all
                                                    • API String ID: 4174999648-3243417748
                                                    • Opcode ID: ddf39f1eda455a1c63d5a7d3271f56cd3ed42d138f3b783cbb3ca1597947a384
                                                    • Instruction ID: e23b5dd52123a376b0379481fe8be5d2f02d07e70979f80a1c72d587d5a24a2c
                                                    • Opcode Fuzzy Hash: ddf39f1eda455a1c63d5a7d3271f56cd3ed42d138f3b783cbb3ca1597947a384
                                                    • Instruction Fuzzy Hash: FFA17075A102248FCB20EF55CC85B9AB3B8BF44304F5044EEE90967291D779AE85CF9D
                                                    APIs
                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AA5A
                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AA8D
                                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0044AAF9
                                                    • InternetSetOptionW.WININET(00000000,0000001F,?,00000004), ref: 0044AB11
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB20
                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,00000000,00000000), ref: 0044AB61
                                                      • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                                    • String ID:
                                                    • API String ID: 1291720006-3916222277
                                                    • Opcode ID: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                                    • Instruction ID: 782b6278bf246bef60821ca34847c3ce69a0d92f774604c9678bedd135ce19ea
                                                    • Opcode Fuzzy Hash: fd0d9a71f1b9f9aed2e07c44adb1cce69882d59a8a6dee97d1abd644e851efd9
                                                    • Instruction Fuzzy Hash: 9C51E6B12803016BF320EB65CD85FBBB7A8FB89704F00091EF74196181D7B9A548C76A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastselect
                                                    • String ID: HH
                                                    • API String ID: 215497628-2761332787
                                                    • Opcode ID: ff1936eb32129df0a81bb6878b4e085d819e9574a0390ee8e332862918087a10
                                                    • Instruction ID: a252b81ccbce03d1e7b1b0efababa2c0a0929072778302a7b1202b90a7697d70
                                                    • Opcode Fuzzy Hash: ff1936eb32129df0a81bb6878b4e085d819e9574a0390ee8e332862918087a10
                                                    • Instruction Fuzzy Hash: BF51E4726043005BD320EB65DC42F9BB399EB94324F044A2EF558E7281EB79E944C7AA
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __snwprintf__wcsicoll_wcscpy
                                                    • String ID: , $$0vH$AUTOITCALLVARIABLE%d$CALLARGARRAY
                                                    • API String ID: 1729044348-3708979750
                                                    • Opcode ID: e5856c69d37335927e932bb259c431c810e65197c095b32473e915812f67d75c
                                                    • Instruction ID: 823d0c4529048d9f890bbf28e75db1a658c609af9319d28fcdda535ef0d13f31
                                                    • Opcode Fuzzy Hash: e5856c69d37335927e932bb259c431c810e65197c095b32473e915812f67d75c
                                                    • Instruction Fuzzy Hash: E651A571514300ABD610EF65C882ADFB3A4EFC4348F048D2FF54967291D779E949CBAA
                                                    APIs
                                                      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\FSRHC6mB16.exe,?,C:\Users\user\Desktop\FSRHC6mB16.exe,004A8E80,C:\Users\user\Desktop\FSRHC6mB16.exe,0040F3D2), ref: 0040FFCA
                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0044BC04
                                                    • MoveFileW.KERNEL32(?,?), ref: 0044BC38
                                                    • _wcscat.LIBCMT ref: 0044BCAA
                                                    • _wcslen.LIBCMT ref: 0044BCB7
                                                    • _wcslen.LIBCMT ref: 0044BCCB
                                                    • SHFileOperationW.SHELL32 ref: 0044BD16
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                                    • String ID: \*.*
                                                    • API String ID: 2326526234-1173974218
                                                    • Opcode ID: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                                    • Instruction ID: 9e4979448571685848097db6772507fbfe8bfb8d1337cd0032b1ea927bdad9db
                                                    • Opcode Fuzzy Hash: 79917c867e5dc746cbfe3ebb0135d92afbab4952e7fca4f485a184e9ce72b521
                                                    • Instruction Fuzzy Hash: 4B3183B14083019AD724EF21C5D5ADFB3E4EFC8304F444D6EB98993251EB39E608D7AA
                                                    APIs
                                                      • Part of subcall function 00436328: _wcsncpy.LIBCMT ref: 0043633C
                                                    • _wcslen.LIBCMT ref: 004366DD
                                                    • GetFileAttributesW.KERNEL32(?), ref: 00436700
                                                    • GetLastError.KERNEL32 ref: 0043670F
                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00436727
                                                    • _wcsrchr.LIBCMT ref: 0043674C
                                                      • Part of subcall function 004366BE: CreateDirectoryW.KERNEL32(?,00000000,?,00000000,00000000), ref: 0043678F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                                    • String ID: \
                                                    • API String ID: 321622961-2967466578
                                                    • Opcode ID: 3d3187412736f1559758a6cd6e40f0a594bd5d43c4c9ea1cccac3023e941b0f8
                                                    • Instruction ID: 68cadaa88695c7c006562ade17844284f7fc34f8e7e15af3b97584e331f528d6
                                                    • Opcode Fuzzy Hash: 3d3187412736f1559758a6cd6e40f0a594bd5d43c4c9ea1cccac3023e941b0f8
                                                    • Instruction Fuzzy Hash: 3C2148765003017ADB20A724EC47AFF33989F95764F90993EFD14D6281E779950882AE
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __wcsnicmp
                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                    • API String ID: 1038674560-2734436370
                                                    • Opcode ID: dc7e98e38d8725b7134af3b864f32bf76aed1b78794146943df9d66deb8fb3e7
                                                    • Instruction ID: f72ce1d64a5a3b865947b719243e4701f1ba8c8209579f194a7ae3ad15c73224
                                                    • Opcode Fuzzy Hash: dc7e98e38d8725b7134af3b864f32bf76aed1b78794146943df9d66deb8fb3e7
                                                    • Instruction Fuzzy Hash: 1B21F87261161067E730B659DCC2BDB63985F65305F04406BF800AA247D6ADA98A83AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fec3643cca3ff1845a5d750544dd574bba968d1ed5ac835adc13dd2c8a8c9520
                                                    • Instruction ID: 650af14def374fe6fd11052fbef22cb8aa6c894e3601bf285572d08ae3c4fed9
                                                    • Opcode Fuzzy Hash: fec3643cca3ff1845a5d750544dd574bba968d1ed5ac835adc13dd2c8a8c9520
                                                    • Instruction Fuzzy Hash: 439192726043009BD710EF65DC82BABB3E9AFD4714F004D2EF548E7291D779E944875A
                                                    APIs
                                                    • DeleteObject.GDI32(?), ref: 0044157D
                                                    • GetDC.USER32(00000000), ref: 00441585
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00441590
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0044159B
                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,000000FF,000000FF,000000FF,00000001,00000004,00000000,?,00000000,00000000), ref: 004415E9
                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00441601
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00441639
                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00441659
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                    • String ID:
                                                    • API String ID: 3864802216-0
                                                    • Opcode ID: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                                    • Instruction ID: 4e191e68d33858d232da06d8f8bca50b2e2c885119a5133d865ec5329e905ca2
                                                    • Opcode Fuzzy Hash: ea0a3e179a2db4f205f3d0bf310cedd64f619745dcd59731a2847991c922bb1b
                                                    • Instruction Fuzzy Hash: 1531C172240344BBE7208B14CD49FAB77EDEB88B15F08450DFB44AA2D1DAB4ED808B64
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                                      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                    • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                                      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                    • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                                      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                                    • ExitThread.KERNEL32 ref: 0041410F
                                                    • GetCurrentThreadId.KERNEL32 ref: 00414115
                                                    • __freefls@4.LIBCMT ref: 00414135
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                    • String ID:
                                                    • API String ID: 1925773019-0
                                                    • Opcode ID: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                                    • Instruction ID: d0499dd1a11a7aa3f5f6b81cdb2be0183561266298d4129ec5ef95b8f2f1ff50
                                                    • Opcode Fuzzy Hash: 78c5a7e04feddb60afef3bdf2204f5ea6d2fca564e255d6fa6df859771c1ea47
                                                    • Instruction Fuzzy Hash: 12018430000200ABC704BFB2DD0D9DE7BA9AF95345722886EF90497212DA3CC9C28B5C
                                                    APIs
                                                    • VariantClear.OLEAUT32(00000038), ref: 004357C3
                                                    • VariantClear.OLEAUT32(00000058), ref: 004357C9
                                                    • VariantClear.OLEAUT32(00000068), ref: 004357CF
                                                    • VariantClear.OLEAUT32(00000078), ref: 004357D5
                                                    • VariantClear.OLEAUT32(00000088), ref: 004357DE
                                                    • VariantClear.OLEAUT32(00000048), ref: 004357E4
                                                    • VariantClear.OLEAUT32(00000098), ref: 004357ED
                                                    • VariantClear.OLEAUT32(000000A8), ref: 004357F6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ClearVariant
                                                    • String ID:
                                                    • API String ID: 1473721057-0
                                                    • Opcode ID: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                                    • Instruction ID: 4669651a97e20320d925a323ac357da1b1419afffb7c9eb93274aad60c959a81
                                                    • Opcode Fuzzy Hash: 108e33c2045b04221b4df3f02cd388125a51a7e0134505e60bdc817f2fb2f336
                                                    • Instruction Fuzzy Hash: BDF03CB6400B446AC235EB79DC40BD7B7E86F89200F018E1DE58783514DA78F588CB64
                                                    APIs
                                                    • WSAStartup.WSOCK32(00000101,?,?), ref: 00464ADE
                                                      • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                                    • inet_addr.WSOCK32(?,00000000,?,?,00000101,?,?), ref: 00464B1F
                                                    • gethostbyname.WSOCK32(?,?,00000000,?,?,00000101,?,?), ref: 00464B29
                                                    • _memset.LIBCMT ref: 00464B92
                                                    • GlobalAlloc.KERNEL32(00000040,00000040), ref: 00464B9E
                                                    • GlobalFree.KERNEL32(00000000), ref: 00464CDE
                                                    • WSACleanup.WSOCK32 ref: 00464CE4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memsetgethostbynameinet_addr
                                                    • String ID:
                                                    • API String ID: 3424476444-0
                                                    • Opcode ID: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                                    • Instruction ID: 8d90feaebe95447676150adcea4a136074f650e12d33839f26a9dde16614cdb7
                                                    • Opcode Fuzzy Hash: 3a9821fb802cba04523fcb9c1f83c74fd5b22343f7d4654d6e4056c4a41f6a01
                                                    • Instruction Fuzzy Hash: A3A17EB1504300AFD710EF65C982F9BB7E8AFC8714F54491EF64497381E778E9058B9A
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000F), ref: 00440B7B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem
                                                    • String ID:
                                                    • API String ID: 4116985748-0
                                                    • Opcode ID: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                                    • Instruction ID: 1e23dbab6d9439f1299be2c39bdf7de0481ead398f869a6d5eaf0ea33fa99bdf
                                                    • Opcode Fuzzy Hash: eff4c90f3403bcfb76001cffaab33834930133fcb34fa8184a7caea4de8066d9
                                                    • Instruction Fuzzy Hash: 8EA19C70608701DBE314CF68C984B6BBBE1FB88704F14491EFA8593251E778F965CB5A
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AC62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ConnectRegistry_wcslen
                                                    • String ID:
                                                    • API String ID: 535477410-0
                                                    • Opcode ID: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                                    • Instruction ID: 71109d01e6e71572d3d886d5d9f1e4ab699fb1be984f768d753da2f0a00da466
                                                    • Opcode Fuzzy Hash: 37987dacba266e2f7d681c7555595b89ca1c624194ad33880a6965c3691367fb
                                                    • Instruction Fuzzy Hash: BBA18EB1204300AFC710EF65C885B1BB7E4BF85704F14896EF685AB292D779E905CB9B
                                                    APIs
                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                    • _memset.LIBCMT ref: 004538C4
                                                    • GetMenuItemInfoW.USER32(?,?), ref: 004538EF
                                                    • _wcslen.LIBCMT ref: 00453960
                                                    • SetMenuItemInfoW.USER32(00000011,?,00000000,?), ref: 004539C4
                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000,?,?), ref: 004539E0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$Info_wcslen$Default_memset_wcscpy
                                                    • String ID: 0
                                                    • API String ID: 3530711334-4108050209
                                                    • Opcode ID: c8c2b72c749714a23e45c10816ef9459d7fe91b5f095051f547869ed1843acb9
                                                    • Instruction ID: 97d09e0af2b4d046480d7fb626e7fa0667c22e7462995616ff61acde959b3bac
                                                    • Opcode Fuzzy Hash: c8c2b72c749714a23e45c10816ef9459d7fe91b5f095051f547869ed1843acb9
                                                    • Instruction Fuzzy Hash: 747118F15083015AD714DF65C881B6BB7E4EB98396F04491FFD8082292D7BCDA4CC7AA
                                                    APIs
                                                    • GetCurrentProcessId.KERNEL32(?), ref: 00473A00
                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00473A0E
                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00473A34
                                                    • CloseHandle.KERNEL32(00000000,00000000,?,00000028), ref: 00473C01
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                    • String ID: HH
                                                    • API String ID: 3488606520-2761332787
                                                    • Opcode ID: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                                    • Instruction ID: 2161edc7e7eefe464b48455ffcea7dd3157e2cbe85e131cccd8837112284b0a3
                                                    • Opcode Fuzzy Hash: 12402d889b8d2545f97f81e579d11a3e1d05628ef8a47b4e2ac7d1c45517ac81
                                                    • Instruction Fuzzy Hash: 3581BF71A043019FD320EF69C882B5BF7E4AF84744F108C2EF598AB392D675E945CB96
                                                    APIs
                                                      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                    • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                                    • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                                    • LineTo.GDI32(?,?), ref: 004474BF
                                                    • CloseFigure.GDI32(?), ref: 004474C6
                                                    • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                                    • Rectangle.GDI32(?,?), ref: 004474F3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                    • String ID:
                                                    • API String ID: 4082120231-0
                                                    • Opcode ID: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                                    • Instruction ID: e2e17d079c8faeb919f1a119f9aa9df975eabc7d00289576b12f70c1741c819b
                                                    • Opcode Fuzzy Hash: 3e823f4574af11f26be8c20bd8771cfecf2a7ea1363ae8038588c787c8c49515
                                                    • Instruction Fuzzy Hash: BC713AB11083419FD300DF15C884E6BBBE9EFC9708F148A1EF99497351D778A906CBAA
                                                    APIs
                                                      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                    • Ellipse.GDI32(?,?,?,00000000), ref: 00447463
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447473
                                                    • AngleArc.GDI32(?,?,?,?,?,?), ref: 004474B6
                                                    • LineTo.GDI32(?,?), ref: 004474BF
                                                    • CloseFigure.GDI32(?), ref: 004474C6
                                                    • SetPixel.GDI32(?,?,?,?), ref: 004474D6
                                                    • Rectangle.GDI32(?,?), ref: 004474F3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                                    • String ID:
                                                    • API String ID: 4082120231-0
                                                    • Opcode ID: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                                    • Instruction ID: 71053adf7dd607ae91079c2ca5de7ffea4483cc305881a9741cc2e8bc8d6f2cf
                                                    • Opcode Fuzzy Hash: bd92991fb0a59d5160a547c0af993f50d26037df712543aebae1afc8709768cb
                                                    • Instruction Fuzzy Hash: 55613BB51083419FD300DF55CC84E6BBBE9EBC9308F148A1EF99597351D738A906CB6A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AngleCloseEllipseFigureLineMovePixelRectangle
                                                    • String ID:
                                                    • API String ID: 288456094-0
                                                    • Opcode ID: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                                    • Instruction ID: d3db7697bfba14f4a3ad6627a8a5faa1010559558ae5e3f89cc6b0bd66950af4
                                                    • Opcode Fuzzy Hash: d308d32173f93e4cd5527eec6d709d72f3e0fef6f2bd509874fda6c33d0c9603
                                                    • Instruction Fuzzy Hash: 90514BB51082419FD300DF15CC84E6BBBE9EFC9308F14891EF99497351D734A906CB6A
                                                    APIs
                                                    • GetParent.USER32(?), ref: 004449B0
                                                    • GetKeyboardState.USER32(?), ref: 004449C3
                                                    • SetKeyboardState.USER32(?), ref: 00444A0F
                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 00444A3F
                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 00444A60
                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444AAC
                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444AD1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                                    • Instruction ID: 19c159416ad4887e81d4090d30fbb5c505c675cee05c330e2fd8e115592bd25d
                                                    • Opcode Fuzzy Hash: d47ceab968b999e6d4944081d81f2373d9ea27f049f07d95c13b51a59d3cc885
                                                    • Instruction Fuzzy Hash: B651C5A05487D139F7369234884ABA7BFD55F8A304F08CA4EF1E5156C3D2ECE984C769
                                                    APIs
                                                    • GetParent.USER32(?), ref: 00444BA9
                                                    • GetKeyboardState.USER32(?), ref: 00444BBC
                                                    • SetKeyboardState.USER32(?), ref: 00444C08
                                                    • PostMessageW.USER32(?,00000100,00000010,?), ref: 00444C35
                                                    • PostMessageW.USER32(?,00000100,00000011,?), ref: 00444C53
                                                    • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444C9C
                                                    • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444CBE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$Parent
                                                    • String ID:
                                                    • API String ID: 87235514-0
                                                    • Opcode ID: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                                    • Instruction ID: 4493abccadab05ae7d00f733e1fa63583af0c494729619d74f1516a50adc8d80
                                                    • Opcode Fuzzy Hash: de9aba9e896a2e755c79cba499ec14fd455f1b60db9a9f79a8626ad1a28ad6a0
                                                    • Instruction Fuzzy Hash: A951E4F05097D139F7369364884ABA7BFE46F8A304F088A4EF1D5065C2D2ACE984C769
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                                    • Instruction ID: b3b3da583a0ae8cfa3180eda0e634cae40a493ebdfd517dbec9d2fd4fbd82cb1
                                                    • Opcode Fuzzy Hash: 2552f041a71837ba3affbc4ec308d2b7aa0755a9e2dfe05148a880b05b5b76bf
                                                    • Instruction Fuzzy Hash: 1E513A315082909FE321CF14DC89FABBB64FB46320F18456FF895AB2D1D7649C06D7AA
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046AA77
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ConnectRegistry_wcslen
                                                    • String ID: HH
                                                    • API String ID: 535477410-2761332787
                                                    • Opcode ID: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                                    • Instruction ID: 7b41397762752e7dec08e47bcdb2cb2f58790b6f4670524580eb9da3090621e6
                                                    • Opcode Fuzzy Hash: a31a44ff546351b1de52d8f34745bf25342c9426a619c9766caf2b0061db1f75
                                                    • Instruction Fuzzy Hash: A2516D71208301AFD304EF65C981F5BB7A9BFC4704F40892EF685A7291D678E905CB6B
                                                    APIs
                                                    • _memset.LIBCMT ref: 00457C34
                                                    • _memset.LIBCMT ref: 00457CE8
                                                    • ShellExecuteExW.SHELL32(?), ref: 00457D34
                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                    • CloseHandle.KERNEL32(?), ref: 00457DDD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _memset$CloseExecuteHandleShell_wcscpy_wcslen
                                                    • String ID: <$@
                                                    • API String ID: 1325244542-1426351568
                                                    • Opcode ID: 669f3797eafbd6ea24f738bceaf78c3ad3f6bdf3b3f8ec2a74c9f7251b65f49f
                                                    • Instruction ID: 09e461bdfc47c8bdd671eddb31188d347eda7c51057725e13e77015b5001baed
                                                    • Opcode Fuzzy Hash: 669f3797eafbd6ea24f738bceaf78c3ad3f6bdf3b3f8ec2a74c9f7251b65f49f
                                                    • Instruction Fuzzy Hash: EA510FB55083009FC710EF61D985A5BB7E4AF84709F00492EFD44AB392DB39ED48CB9A
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32(?,?,?,?,?,?,?,?,?,00000002,00000000,00000014), ref: 0047379B
                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 004737A8
                                                    • __wsplitpath.LIBCMT ref: 004737E1
                                                      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                    • _wcscat.LIBCMT ref: 004737F6
                                                    • __wcsicoll.LIBCMT ref: 00473818
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 00473844
                                                    • CloseHandle.KERNEL32(00000000,00000000,?,?), ref: 00473852
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                                    • String ID:
                                                    • API String ID: 2547909840-0
                                                    • Opcode ID: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                                    • Instruction ID: 8efa427203ffd7a45d167e3a64f6abf3f3640219bb0751621114887cb14f0fc1
                                                    • Opcode Fuzzy Hash: 1dcf289f501924a5df592eae16a0ec0030d5246948486ec38c60cdc62178aa5b
                                                    • Instruction Fuzzy Hash: 4751BB71544304A7D720EF61CC86FDBB3E8AF84748F00492EF58957182E775E645C7AA
                                                    APIs
                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 004552B7
                                                    • ImageList_Remove.COMCTL32(?,?,?,?), ref: 004552EB
                                                    • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004553D3
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                                    • String ID:
                                                    • API String ID: 2354583917-0
                                                    • Opcode ID: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                                    • Instruction ID: 19c5dc8500d05a42ca126c51664c70dafe1d1a8ca3b523478e8997b137d6e309
                                                    • Opcode Fuzzy Hash: b44580b005306b3b7f9b1dbab51831616e075f248f5ed84087b7c105bb41b1f9
                                                    • Instruction Fuzzy Hash: 77519D30204A419FC714DF24C4A4B7A77E5FB49301F4486AEFD9ACB392DB78A849CB54
                                                    APIs
                                                      • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                    • GetMenu.USER32 ref: 004776AA
                                                    • GetMenuItemCount.USER32(00000000), ref: 004776CC
                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004776FB
                                                    • _wcslen.LIBCMT ref: 0047771A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Menu$CountItemStringWindow_wcslen
                                                    • String ID:
                                                    • API String ID: 1823500076-0
                                                    • Opcode ID: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                                    • Instruction ID: 4b9e656becebfc5f52f27a1d7ad2c07a58398098864d75d3a5ce1c02cc274359
                                                    • Opcode Fuzzy Hash: 3c1e0179b5075f45df12b398ec391808b8d2f1e7a16a5d1bec5683dd9427006f
                                                    • Instruction Fuzzy Hash: 174117715083019FD320EF25CC45BABB3E8BF88314F10492EF55997252D7B8E9458BA9
                                                    APIs
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0044890A
                                                    • SendMessageW.USER32(?,00000469,?,00000000), ref: 00448920
                                                    • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                    • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                    • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$MessageMoveSend
                                                    • String ID:
                                                    • API String ID: 896007046-0
                                                    • Opcode ID: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                                    • Instruction ID: 0809a8548e22334437b8974569d6adfa08582830463fbdb99c3481629354d751
                                                    • Opcode Fuzzy Hash: 440e8810410bf42a4c8e03fd117b8fd843bde7e89b0e2674ab81ad81c9f8ea0f
                                                    • Instruction Fuzzy Hash: 63419E746043419FF7248B24C884B6FB7A1FB99305F18886EF98197391DA78A845CB59
                                                    APIs
                                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                                    • SendMessageW.USER32(00961A30,000000F1,00000000,00000000), ref: 004414C6
                                                    • SendMessageW.USER32(00961A30,000000F1,00000001,00000000), ref: 004414F1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow
                                                    • String ID:
                                                    • API String ID: 312131281-0
                                                    • Opcode ID: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                                    • Instruction ID: f6a862a32ccfd92e4f153a1965fa7dc80102ffdb8abe4b8a046001f82176c48d
                                                    • Opcode Fuzzy Hash: ed470013e842d905752aa6f8daaa5f1d8e955df317e7b96a507e5c494099af20
                                                    • Instruction Fuzzy Hash: 2F416A347442019FE720CF58DCC4F6A77A5FB8A754F24416AE5519B3B1CB75AC82CB48
                                                    APIs
                                                    • _memset.LIBCMT ref: 004484C4
                                                    • GetMenuItemInfoW.USER32(?,?,00000000,004A83D8), ref: 00448562
                                                    • IsMenu.USER32(?), ref: 0044857B
                                                    • InsertMenuItemW.USER32(?,?,00000001,004A83D8), ref: 004485D0
                                                    • DrawMenuBar.USER32 ref: 004485E4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Menu$Item$DrawInfoInsert_memset
                                                    • String ID: 0
                                                    • API String ID: 3866635326-4108050209
                                                    • Opcode ID: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                                    • Instruction ID: c1b4c65bd9dbf201e14e83578cc8030a3c247867dd5f1e451e409e2153a24926
                                                    • Opcode Fuzzy Hash: 42a201a1e731261e29c9ff9b40de176b55a78da0b06957c9f64dc5096dc7767a
                                                    • Instruction Fuzzy Hash: 9F417F75604341AFE710CF45C984B6BB7E4FB89304F14881EFA554B391DBB4E849CB5A
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32 ref: 0047247C
                                                    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472491
                                                    • Sleep.KERNEL32(0000000A), ref: 00472499
                                                    • InterlockedIncrement.KERNEL32(004A7CAC), ref: 004724A4
                                                    • InterlockedDecrement.KERNEL32(004A7CAC), ref: 00472599
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Interlocked$DecrementIncrement$Sleep
                                                    • String ID: 0vH
                                                    • API String ID: 327565842-3662162768
                                                    • Opcode ID: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                                                    • Instruction ID: 7246262c18bb701d5349304b0e2d21290bf7c9637501dd5a114e6955e8e78370
                                                    • Opcode Fuzzy Hash: bfb173672284e31ba0a3017bb0c7d670cf276827bd066f711b3c3b49063f60eb
                                                    • Instruction Fuzzy Hash: 9631D2329082259BD710DF28DD41A8A77A5EB95324F05483EFD08FB251DB78EC498BED
                                                    APIs
                                                    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448B16
                                                    • GetFocus.USER32 ref: 00448B1C
                                                    • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                    • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                    • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$FocusMessageSend
                                                    • String ID:
                                                    • API String ID: 3429747543-0
                                                    • Opcode ID: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                                    • Instruction ID: 96ed947056310062a3fa6d2350adc65d304252fdbf70c479ab88671ed4e09c2c
                                                    • Opcode Fuzzy Hash: f5aca3f6d68f8169105ace43209457086b036621b25274999c7621d4cb9b91fc
                                                    • Instruction Fuzzy Hash: FC31B4706443819BF7248E14C8C4BAFB7D0EB95745F04492EF981A6291DBA89845C719
                                                    APIs
                                                    • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042A9B0
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    • _memset.LIBCMT ref: 00401C62
                                                    • _wcsncpy.LIBCMT ref: 00401CA1
                                                    • _wcscpy.LIBCMT ref: 00401CBD
                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401CCF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: IconLoadNotifyShell_String_memset_wcscpy_wcslen_wcsncpy
                                                    • String ID: Line:
                                                    • API String ID: 1620655955-1585850449
                                                    • Opcode ID: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                                    • Instruction ID: a4e7cf3abc31881c2b93aaae0beefbbd48c64772eea77d32b53e92a0700a02c6
                                                    • Opcode Fuzzy Hash: b1e388f5f21e32c190c1b7412400e6ffb6374e41c1d48bdcdb7aece10813d053
                                                    • Instruction Fuzzy Hash: 7431D47151C301ABD324EB11DC41BDB77E8AF94314F04493FF989521A1DB78AA49C79B
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D32F
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3B3
                                                    • __swprintf.LIBCMT ref: 0045D3CC
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D416
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume__swprintf
                                                    • String ID: %lu$HH
                                                    • API String ID: 3164766367-3924996404
                                                    • Opcode ID: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                                    • Instruction ID: e4de0c6df68350460ad5232616e5185c9d799459bd1b640414cfcbd8d86849a8
                                                    • Opcode Fuzzy Hash: bd20e614eacc1ec6e7ce8a240dc663141bf9142d6fc10aee8c7bf862d4d2af0b
                                                    • Instruction Fuzzy Hash: 85314A716083019BC310EF55D941A5BB7E4FF88704F40892EFA4597292D774EA09CB9A
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450E24
                                                    • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450E35
                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450E43
                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450E54
                                                    • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450E62
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Msctls_Progress32
                                                    • API String ID: 3850602802-3636473452
                                                    • Opcode ID: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                                    • Instruction ID: b51c377fab27852337593a8f268aff884918310fa347e0537580fa9f3b853d23
                                                    • Opcode Fuzzy Hash: 42656bfbb5a190feb894f1e63281698c22ff60bbec02a0e57f9bf8616b6fd2a5
                                                    • Instruction Fuzzy Hash: 2C2121712543007AE7209A65DC42F5BB3E9AFD8B24F214A0EF754B72D1C6B4F8418B58
                                                    APIs
                                                    • ImageList_Destroy.COMCTL32(?), ref: 00455451
                                                    • ImageList_Destroy.COMCTL32(?), ref: 0045545F
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                                    • String ID:
                                                    • API String ID: 3985565216-0
                                                    • Opcode ID: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                                    • Instruction ID: 02eb1b45cc7e926b76574f27881fb1e8d9d372094f4d7b34cf8607babd6cb63d
                                                    • Opcode Fuzzy Hash: dc022e11ae60a508d3fee16e2099accab07c71a042b18f60c16d9d094d7ead98
                                                    • Instruction Fuzzy Hash: EA213270200A019FCB20DF65CAD4B2A77A9BF45312F50855EED45CB352DB39EC45CB69
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 00415737
                                                    • __calloc_crt.LIBCMT ref: 00415743
                                                    • __getptd.LIBCMT ref: 00415750
                                                    • CreateThread.KERNEL32(00000000,?,0041568B,00000000,00000004,00000000), ref: 00415776
                                                    • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 00415786
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00415791
                                                    • __dosmaperr.LIBCMT ref: 004157A9
                                                      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                                    • String ID:
                                                    • API String ID: 1269668773-0
                                                    • Opcode ID: bb8068f02d799d687f86b9c43e1e9df3108372b57b840b2ce394e22bf251b6d0
                                                    • Instruction ID: 083f1b3d72dc2b4e3073d7627409da2efaae6cca9fbdfa2eb2c15b7cb2a145f7
                                                    • Opcode Fuzzy Hash: bb8068f02d799d687f86b9c43e1e9df3108372b57b840b2ce394e22bf251b6d0
                                                    • Instruction Fuzzy Hash: 4511E672501604EFC720AF76DC868DF7BA4EF80334F21412FF525922D1DB788981966D
                                                    APIs
                                                      • Part of subcall function 00438FE4: GetProcessHeap.KERNEL32(00000008,0000000C,0043910A,00000000,00000000,00000000,0044646E,?,?,?), ref: 00438FE8
                                                      • Part of subcall function 00438FE4: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FEF
                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,0044646E,?,?,?), ref: 00439119
                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439123
                                                    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0043912C
                                                    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00439138
                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00439142
                                                    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00439145
                                                    • CreateThread.KERNEL32(00000000,00000000,004390C2,00000000,00000000,00000000), ref: 0043915E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                    • String ID:
                                                    • API String ID: 1957940570-0
                                                    • Opcode ID: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                                    • Instruction ID: b388a4287fabc35bf2088fa38ebc9459a42e34e8a642192e1b63b89709cb9be3
                                                    • Opcode Fuzzy Hash: ae016cd78919e3da0d3d218cc031d8d4f693afb8d34ff927aa47fd3b6f506194
                                                    • Instruction Fuzzy Hash: 3BF0CD753413007BD220EB65DC86F5BB7A8EBC9B10F118919F6049B1D1C6B4A800CB65
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 00415690
                                                      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                    • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                                      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                    • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                                      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                                    • ExitThread.KERNEL32 ref: 004156BD
                                                    • __freefls@4.LIBCMT ref: 004156D9
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                                    • String ID:
                                                    • API String ID: 4166825349-0
                                                    • Opcode ID: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                                    • Instruction ID: 1015f584654e325efa3cacb901eba7c9ae2b5aefa54885f90b4e6d99173acdac
                                                    • Opcode Fuzzy Hash: 185d0aae8fe32bab84a079219336c355dd614541d1aff55515eff8c05f91681e
                                                    • Instruction Fuzzy Hash: 14F049745007009BD704BF72DD159DE7B69AF85345761C85FB80897222DA3DC9C1CB9C
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(advapi32.dll,p#D,0043415E,p#D,?,00442370,?), ref: 00434134
                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00434146
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: RegDeleteKeyExW$advapi32.dll$p#D$p#D
                                                    • API String ID: 2574300362-3261711971
                                                    • Opcode ID: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                                    • Instruction ID: cb82693085896f9455b4638215a98dd7e3cb824177552166877179ce6000b7c2
                                                    • Opcode Fuzzy Hash: 3da92f374f37a9fa7395fa6ef73d3af1d379715eec5b41da1672ebd70bf57acc
                                                    • Instruction Fuzzy Hash: D8D05EB0400B039FCB105F24D8086AB76F4EB68700F208C2EF989A3750C7B8E8C0CB68
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                                    • Instruction ID: be39947db1ffbcb7075193c31d102fc15fe4f6af8d23ce90efbce3d2b6a77a88
                                                    • Opcode Fuzzy Hash: c82efa3070467c2623ec738b5b2be2cd760763614a3dd1863134219050ad48d5
                                                    • Instruction Fuzzy Hash: 4BF16D71108740AFD210DB59C880EABB7F9EFCA744F10891EF69983261D735AC45CBAA
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 00433724
                                                    • GetWindowRect.USER32(00000000,?), ref: 00433757
                                                    • GetClientRect.USER32(0000001D,?), ref: 004337AC
                                                    • GetSystemMetrics.USER32(0000000F), ref: 00433800
                                                    • GetWindowRect.USER32(?,?), ref: 00433814
                                                    • ScreenToClient.USER32(?,?), ref: 00433842
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Rect$Client$Window$MetricsScreenSystem
                                                    • String ID:
                                                    • API String ID: 3220332590-0
                                                    • Opcode ID: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                                    • Instruction ID: 40e56d112be44df416332e5c874318f33691c6b0c201ea6c9f9086adb5117cf0
                                                    • Opcode Fuzzy Hash: 3d0204db3781b081fd3de6a8efec2d06c6e501bf89adf1cf9fb69463b8de8f3e
                                                    • Instruction Fuzzy Hash: E9A126B42147028AC324CF68C5847ABBBF1FF98715F04991EE9D983360E775E908CB5A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _malloc_wcslen$_strcat_wcscpy
                                                    • String ID:
                                                    • API String ID: 1612042205-0
                                                    • Opcode ID: de2929fcda50375e6e5cb9f1075b8832783a078aa1feca3c1cc6154b42d84a61
                                                    • Instruction ID: 39b6431fb86a1cae222df6ecce28f21653e085caad8de22f1e35678e4483a9b6
                                                    • Opcode Fuzzy Hash: de2929fcda50375e6e5cb9f1075b8832783a078aa1feca3c1cc6154b42d84a61
                                                    • Instruction Fuzzy Hash: CD613B70504202EFCB10EF29D58096AB3E5FF48305B50496EF8859B306D738EE59DB9A
                                                    APIs
                                                    • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C588
                                                    • SetKeyboardState.USER32(00000080), ref: 0044C59B
                                                    • PostMessageW.USER32(?,00000104,?,?), ref: 0044C5EC
                                                    • PostMessageW.USER32(?,00000100,?,?), ref: 0044C610
                                                    • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C637
                                                    • SendInput.USER32 ref: 0044C6E2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessagePost$KeyboardState$InputSend
                                                    • String ID:
                                                    • API String ID: 2221674350-0
                                                    • Opcode ID: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                                    • Instruction ID: 3a634557d1668dba9f4fbb3ffee1259adddcddb7f3fce46f2ce6721246940f3b
                                                    • Opcode Fuzzy Hash: 061e63fcf1402e721e52ee56d2f22f81c2cbe03cfd8f861d8ff00d299370d474
                                                    • Instruction Fuzzy Hash: A24148725053486AF760EF209C80BFFBB98EF95324F04151FFDC412281D66E984987BA
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$_wcscat
                                                    • String ID:
                                                    • API String ID: 2037614760-0
                                                    • Opcode ID: f99e136c889cacb8689bc9f00eee4ad51686cf745bff212a4790763dd87d00cb
                                                    • Instruction ID: 871aa96d6b0d5f43eceffdadd72b032f7becd6ba50fbda5e2bca5dd503650597
                                                    • Opcode Fuzzy Hash: f99e136c889cacb8689bc9f00eee4ad51686cf745bff212a4790763dd87d00cb
                                                    • Instruction Fuzzy Hash: 7D41BD31901A256BDE317F55D880BBB7358DFA1314F84006FF98247313EA6E5892C6BE
                                                    APIs
                                                    • BeginPaint.USER32(00000000,?,004A83D8,?), ref: 00447B9D
                                                    • GetWindowRect.USER32(?,?), ref: 00447C1B
                                                    • ScreenToClient.USER32(?,?), ref: 00447C39
                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                                    • EndPaint.USER32(?,?), ref: 00447CD1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                                    • String ID:
                                                    • API String ID: 4189319755-0
                                                    • Opcode ID: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                                    • Instruction ID: de699fe3e67e71f806f86ee7feca1bcffcb0489daa19151882f3061068cc4b26
                                                    • Opcode Fuzzy Hash: 37bca05dc5f282a43c1c57c3b808f61ec058395b4d713bcb6da44fc2610780a1
                                                    • Instruction Fuzzy Hash: D14182705043019FE320DF15C8C8F7B7BA8EB89724F04466EF9548B391DB74A846CB69
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B490
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4C2
                                                    • EnterCriticalSection.KERNEL32(00000000), ref: 0044B4E3
                                                    • LeaveCriticalSection.KERNEL32(00000000), ref: 0044B5A0
                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B5BB
                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5D1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                    • String ID:
                                                    • API String ID: 1726766782-0
                                                    • Opcode ID: 16d5c57b5e53c2061fc4ac4ded6e87df9b6247511e9ffc13c2dfc8627616166f
                                                    • Instruction ID: bf52b5dc2e344941501510e432fc863898df75637e45487ca8cd05157db66b41
                                                    • Opcode Fuzzy Hash: 16d5c57b5e53c2061fc4ac4ded6e87df9b6247511e9ffc13c2dfc8627616166f
                                                    • Instruction Fuzzy Hash: 09415C75104701AFD320EF26D845EABB3F8EF88708F008E2DF59A92650D774E945CB6A
                                                    APIs
                                                    • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 004410F9
                                                    • EnableWindow.USER32(?,00000000), ref: 0044111A
                                                    • ShowWindow.USER32(?,00000000,?,?,?,?,00448962,004A83D8,?,?), ref: 00441183
                                                    • ShowWindow.USER32(?,00000004,?,?,?,00448962,004A83D8,?,?), ref: 00441192
                                                    • EnableWindow.USER32(?,00000001), ref: 004411B3
                                                    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 004411D5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$Enable$MessageSend
                                                    • String ID:
                                                    • API String ID: 642888154-0
                                                    • Opcode ID: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                                    • Instruction ID: 824eeaafe1f931a994963cd163acc5b0ce47b26168a6fd4ee38d593e4569daee
                                                    • Opcode Fuzzy Hash: c853c7407bbaf9010c68549c691492fdcd401e5b0cb22aeb5446aebbed6f20c9
                                                    • Instruction Fuzzy Hash: 14417770604245DFE725CF14C984FA6B7E5BF89300F1886AEE6859B3B2CB74A881CB55
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 004490E3
                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004490F8
                                                    • SendMessageW.USER32(00000000,0000111E,00000000,?), ref: 0044910D
                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00449124
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0044912F
                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0044913C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow$InvalidateRect
                                                    • String ID:
                                                    • API String ID: 1976402638-0
                                                    • Opcode ID: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                                    • Instruction ID: 8b80d2acd15126bdfc8b54909556444574c0e56a9806921f1e0b477f33817628
                                                    • Opcode Fuzzy Hash: 2b574cf222373ea94a5f8b1e2da5d15417ee742d7ff148607d59a4e94613559a
                                                    • Instruction Fuzzy Hash: F231B476244202AFF224DF04DC89FBBB7A9F785321F14492EF291973D0CA75AC469729
                                                    APIs
                                                    • GetForegroundWindow.USER32 ref: 00442597
                                                      • Part of subcall function 004344B7: GetWindowRect.USER32(?,?), ref: 004344D3
                                                    • GetDesktopWindow.USER32 ref: 004425BF
                                                    • GetWindowRect.USER32(00000000), ref: 004425C6
                                                    • mouse_event.USER32(00008001,?,?,?,?), ref: 004425F5
                                                      • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                    • GetCursorPos.USER32(?), ref: 00442624
                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00442690
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                    • String ID:
                                                    • API String ID: 4137160315-0
                                                    • Opcode ID: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                                    • Instruction ID: 1581b522c3ee05a339ffa1fd07f9e8cd23967deed6539873686ea33d82c69dd2
                                                    • Opcode Fuzzy Hash: 9bf1d5af4d3523281d87c855d40d0150606dc562a9e0308dc2a2f88b36285eae
                                                    • Instruction Fuzzy Hash: 7C31C1B2104306ABD310DF54CD85E6BB7E9FB98304F004A2EF94597281E675E9058BA6
                                                    APIs
                                                    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044886C
                                                    • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                    • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                    • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$Enable$Show$MessageSend
                                                    • String ID:
                                                    • API String ID: 1871949834-0
                                                    • Opcode ID: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                                    • Instruction ID: fbfed122d4da650e42f877d7e8bff2bfe9b33138fa51555fe8345b8bcc16d821
                                                    • Opcode Fuzzy Hash: 703f0702a5e3ae6889c0b2c4cbd553a5347372704319c0c884d711360b5070ea
                                                    • Instruction Fuzzy Hash: A731F3B07443819BF7248E14C8C4BAFB7D0AB95345F08482EF981A63D1DBAC9846872A
                                                    APIs
                                                    • _memset.LIBCMT ref: 0044961A
                                                    • SendMessageW.USER32 ref: 0044964A
                                                      • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 004496AC
                                                    • _wcslen.LIBCMT ref: 004496BA
                                                    • _wcslen.LIBCMT ref: 004496C7
                                                    • SendMessageW.USER32(?,00001074,?,?), ref: 004496FD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$_wcslen$_memset_wcspbrk
                                                    • String ID:
                                                    • API String ID: 1624073603-0
                                                    • Opcode ID: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                                    • Instruction ID: 7e49a266cf7116299f7bc8659d1ce07b00adedb8b3f1b428e1954e4b11147a1e
                                                    • Opcode Fuzzy Hash: 3158986b153f08837b9b71a8f77f3cc169978b1c24ba43a32ffefb24081b9654
                                                    • Instruction Fuzzy Hash: B631CA71508300AAE720DF15DC81BEBB7D4EBD4720F504A1FFA54862D0EBBAD945C7A6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                                    • Instruction ID: 0263b137e1f68684b0dae4bb7f633391a2f723f0f4072b7ce39308acd6c8c458
                                                    • Opcode Fuzzy Hash: 8dc28afdcb3e23db499faf1906c1cec9916ddd90de084288035f36419de8ba35
                                                    • Instruction Fuzzy Hash: 31219272245110ABE7108B68DCC4B6F7798EB96374F240A3AF512C61E1EA7998C1C769
                                                    APIs
                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004555AD
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow$DeleteObject$IconMove
                                                    • String ID:
                                                    • API String ID: 1640429340-0
                                                    • Opcode ID: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                                    • Instruction ID: 2ee25f48dcb0ad8048bc4d9c922f6cac320a9d705fdb810e808868a6102f62dc
                                                    • Opcode Fuzzy Hash: da39536b61dc90218e8938c0c8165bcff49a91d8f884d8405ba8ed69dafdd4fa
                                                    • Instruction Fuzzy Hash: 05312770200A419FD724DF24C998B3A73F9FB44312F4485AAE945CB266E778EC49CB69
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __fileno__setmode$DebugOutputString_fprintf
                                                    • String ID:
                                                    • API String ID: 3354276064-0
                                                    • Opcode ID: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                                                    • Instruction ID: 1e9a75ed7ce68f0ee686932f25d41d1f14ae1a91d469003489e3a0780bce169f
                                                    • Opcode Fuzzy Hash: 44da5cbe136b9a97bfd5e2050e6700f1212f0f901edc4668462b95a159366457
                                                    • Instruction Fuzzy Hash: 6D11F3B2D0830136D500BA366C02AAF7A5C4A91B5CF44056EFD4563293EA2DAA4943FF
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteMenuObject$IconWindow
                                                    • String ID:
                                                    • API String ID: 752480666-0
                                                    • Opcode ID: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                                    • Instruction ID: bf467a0aa8f060071afd9cdae546a2eb92d9c059e8a57ac1e588bb5f3fc3a395
                                                    • Opcode Fuzzy Hash: e2db828b4da75c1988a3618645d7ad87c2567147b1e4a2a373431826dce2281b
                                                    • Instruction Fuzzy Hash: 26215E30200A019FC724DF24D5E8B7AB7A9FB44312F50855EED498B392CB39EC89CB59
                                                    APIs
                                                    • DestroyWindow.USER32(00000000), ref: 0045527A
                                                    • ImageList_Destroy.COMCTL32(?), ref: 0045528C
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                    • String ID:
                                                    • API String ID: 3275902921-0
                                                    • Opcode ID: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                                    • Instruction ID: c357af2a313eda44c34a26cb015c973203dd8f66e4d80e74dc1abfaeb9ce60f9
                                                    • Opcode Fuzzy Hash: 9ca718b8a23ef3076e20a4bf5a66fd8e296fb8dfd37af4e8726ba93a3cadf818
                                                    • Instruction Fuzzy Hash: 2D217E70604A019BC714DF79D99466AB7A5BF44311F40856EF919CB342DB38E849CF68
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(0000000A,?,?,?,?,?,00446540,?,?,?,?,?,?,?,?,?), ref: 0043935D
                                                    • OpenProcessToken.ADVAPI32(00000000,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439364
                                                    • CreateEnvironmentBlock.USERENV(?,?,00000001,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439376
                                                    • CloseHandle.KERNEL32(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 00439383
                                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 004393C0
                                                    • DestroyEnvironmentBlock.USERENV(?,?,00000000,00464227,00000000,?,?,?,?,?,?,?,?), ref: 004393D4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                    • String ID:
                                                    • API String ID: 1413079979-0
                                                    • Opcode ID: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                                    • Instruction ID: 8c652321442b38080740e7d333ba663a52d3460857ef2618669649d87ea194c0
                                                    • Opcode Fuzzy Hash: 1d720b0393062126ad9b64f1bf0a3b497d62ac8a089cd0237a290436ac7c4432
                                                    • Instruction Fuzzy Hash: 7B2150B2208300ABD314CB65D854EABB7EDEBCD754F084E1DF989A3250C7B4E901CB25
                                                    APIs
                                                    • ___set_flsgetvalue.LIBCMT ref: 0041418F
                                                    • __calloc_crt.LIBCMT ref: 0041419B
                                                    • __getptd.LIBCMT ref: 004141A8
                                                    • CreateThread.KERNEL32(?,?,004140DB,00000000,?,?), ref: 004141DF
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 004141E9
                                                    • __dosmaperr.LIBCMT ref: 00414201
                                                      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__decode_pointer__dosmaperr__getptd__getptd_noexit
                                                    • String ID:
                                                    • API String ID: 1803633139-0
                                                    • Opcode ID: 9093ead1b57094de5194e295d789e60ec266b8318c1e976fb280fb1b07ce6f9a
                                                    • Instruction ID: ec3febacf030228bba34671a5a373aa86179f0c9a00f1e1343e4adce14cbcb36
                                                    • Opcode Fuzzy Hash: 9093ead1b57094de5194e295d789e60ec266b8318c1e976fb280fb1b07ce6f9a
                                                    • Instruction Fuzzy Hash: 1311DD72504209BFCB10AFA5DC828DF7BA8EF44368B20446EF50193151EB39C9C18A68
                                                    APIs
                                                    • ImageList_Destroy.COMCTL32(?), ref: 004555E8
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                                    • String ID:
                                                    • API String ID: 3275902921-0
                                                    • Opcode ID: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                                    • Instruction ID: 9e206caaed87a4944845468030bda76e3f946505fe2e652cce1cc100bc4c7c20
                                                    • Opcode Fuzzy Hash: 9bb8e3ba902fb320eab333f0308ec6d2a7ed81620e332b79689394e938adb37d
                                                    • Instruction Fuzzy Hash: BE2141702006409FCB25DF25C994A2B77A9FF44312F80856EED49CB352DB39EC4ACB59
                                                    APIs
                                                    • SendMessageW.USER32 ref: 004554DF
                                                    • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004554FA
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                                    • String ID:
                                                    • API String ID: 3691411573-0
                                                    • Opcode ID: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                                    • Instruction ID: ead105b7aa3a144aa2df3f4c31681f961a0d6b706109639263d1a652a664e8ec
                                                    • Opcode Fuzzy Hash: ffc9a8f4f75f6e2ff6fdc7cc9300f0c908ecc9e004d580c3573be367ed75df53
                                                    • Instruction Fuzzy Hash: A5118F713046419BDB10DF68DD88A2A77A8FB58322F404A2AFE14DB2D1D775DC498B68
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcstok$ExtentPoint32Text
                                                    • String ID:
                                                    • API String ID: 1814673581-0
                                                    • Opcode ID: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                                    • Instruction ID: 25d714350c6a951fb861184d208c8546153e966ae5ec0a2422e5c8358eb53325
                                                    • Opcode Fuzzy Hash: cf50433860b5c5ee623566781d9083cc0ce59c581d7d4fe1355e753f7016059c
                                                    • Instruction Fuzzy Hash: F60125B19053126BC6209F95DC42B5BB7E8EF45760F11842AFD04E3340D7F8E84483EA
                                                    APIs
                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362A7
                                                    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362B2
                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362BA
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 004362C5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                    • String ID:
                                                    • API String ID: 2833360925-0
                                                    • Opcode ID: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                                    • Instruction ID: c21ea81f2c38402705b15ef58ab4919efdb6e4f3ef0ac894e378511a69de5cf2
                                                    • Opcode Fuzzy Hash: ce9720f61a9ee9538873cf1403cb39b7711a51cb3deac7b7aa4b9b4cf2db8b86
                                                    • Instruction Fuzzy Hash: C411D031909306ABC700EF19DA8499FB7E4FFCCB11F828D2DF98592210D734C9498B96
                                                    APIs
                                                      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 0044721F
                                                    • LineTo.GDI32(?,?,?), ref: 00447227
                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447235
                                                    • LineTo.GDI32(?,?,?), ref: 0044723D
                                                    • EndPath.GDI32(?), ref: 0044724E
                                                    • StrokePath.GDI32(?), ref: 0044725C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                    • String ID:
                                                    • API String ID: 372113273-0
                                                    • Opcode ID: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                                    • Instruction ID: cf4011081099dc8586e946db52605055ec0608de7db987eb6b7af15cf0be2a5d
                                                    • Opcode Fuzzy Hash: 902a14e142be2de25a3bb197ce65ea465fb84dbb313772e519df98722d37df37
                                                    • Instruction Fuzzy Hash: B7018F36105264BBE2119750EC4AF9FBBACEF8A710F14451DF70156191C7F42A0587BD
                                                    APIs
                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0041098F
                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410997
                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004109A2
                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004109AD
                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 004109B5
                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004109BD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Virtual
                                                    • String ID:
                                                    • API String ID: 4278518827-0
                                                    • Opcode ID: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                                    • Instruction ID: 14dd698fb88c41d3cb2937c08abaa7ad6cdafd80764dd657d9f2199fb51feb0a
                                                    • Opcode Fuzzy Hash: 067efc0be0420d5e011611900d1cbcbd564411b72165316cb005851f0732894c
                                                    • Instruction Fuzzy Hash: 52112A6118ABC4ADD3329F694854A87FFE45FB6304F484A8ED1D607A43C195A60CCBBA
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 0044CBEF
                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC00
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC09
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0044CC10
                                                    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CC29
                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0044CC37
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CapsDevice$Release
                                                    • String ID:
                                                    • API String ID: 1035833867-0
                                                    • Opcode ID: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                                    • Instruction ID: 50bf861fd692b93b916a63282857a41227f0dfa19545bc4f0a59f576ae553c11
                                                    • Opcode Fuzzy Hash: ae25b50e6df40ac1760f249dbc4ceec79d7598f555d49c24eefaf783d5b8ff63
                                                    • Instruction Fuzzy Hash: 560184B1641314BFF6009BA1DC4AF1BBB9CEF55755F01842EFF44A7241D6B098008BA9
                                                    APIs
                                                    • InterlockedExchange.KERNEL32(0042A369,057401F8), ref: 0044B66E
                                                    • EnterCriticalSection.KERNEL32(0042A321), ref: 0044B67B
                                                    • TerminateThread.KERNEL32(?,000001F6), ref: 0044B689
                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B697
                                                      • Part of subcall function 004356CD: CloseHandle.KERNEL32(00000000,0042A365,0044B6A3,0042A365,?,000003E8,?,000001F6), ref: 004356D9
                                                    • InterlockedExchange.KERNEL32(0042A369,000001F6), ref: 0044B6AC
                                                    • LeaveCriticalSection.KERNEL32(0042A321), ref: 0044B6AF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                    • String ID:
                                                    • API String ID: 3495660284-0
                                                    • Opcode ID: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                                    • Instruction ID: 3e278a896620ffa5fdfd5bcc44ba61fc9bc9ab212b345b13b81bb6ec37c91fca
                                                    • Opcode Fuzzy Hash: 7ab0c325316775d38e8d9aa2ca09049d0c02a968ddf60f226b23d446a35990e5
                                                    • Instruction Fuzzy Hash: E3F0F672141206BBD210AB24EE89DBFB37CFF44315F41096AF60142550CB75F811CBBA
                                                    APIs
                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00437127
                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00437140
                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00437150
                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00437162
                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 0043716D
                                                    • CloseHandle.KERNEL32(00000000), ref: 00437174
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                    • String ID:
                                                    • API String ID: 839392675-0
                                                    • Opcode ID: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                                    • Instruction ID: 38550948ec006cf47bed7574f40cc63f5aae242ba43c895826076912260f23cd
                                                    • Opcode Fuzzy Hash: 9671eea5464782d863345c1ba519a7d6af1158a8c6613e6f42f5b6706bbe0782
                                                    • Instruction Fuzzy Hash: 37F054352813117BE6215B109E4EFEF37A8AF49F02F104828FB41B51D0E7E469458BAE
                                                    APIs
                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000008,004A8E80,BC000000,00431B28,C:\Users\user\Desktop\FSRHC6mB16.exe,00000004), ref: 00436055
                                                    • LockServiceDatabase.ADVAPI32(00000000), ref: 00436062
                                                    • UnlockServiceDatabase.ADVAPI32(00000000), ref: 0043606D
                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00436076
                                                    • GetLastError.KERNEL32 ref: 00436081
                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00436091
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Service$CloseDatabaseHandle$ErrorLastLockManagerOpenUnlock
                                                    • String ID:
                                                    • API String ID: 1690418490-0
                                                    • Opcode ID: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                                    • Instruction ID: 156e5f382d75df54ba3c5c30185d6bb62b1a9e6e0194ec4ef6b9e4a62dbea0b3
                                                    • Opcode Fuzzy Hash: 49e5e78db470eb3b31ed20f2670ed0ea18d225c835d46e40371f5509899a8be7
                                                    • Instruction Fuzzy Hash: 9BE0E5319821216BC6231B30AE4DBCF3B99DB1F311F041827F701D2250CB998404DBA8
                                                    APIs
                                                      • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                                    • CoInitialize.OLE32(00000000), ref: 00475B71
                                                    • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 00475B8A
                                                    • CoUninitialize.OLE32 ref: 00475D71
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                    • String ID: .lnk$HH
                                                    • API String ID: 886957087-3121654589
                                                    • Opcode ID: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                                    • Instruction ID: f4d7caca580305710a2a5ca379fd8543151c5613ecc12b631d1ff665410dc3a0
                                                    • Opcode Fuzzy Hash: 75a96ccae25093af7e6917375c938c281093df7f6cda4de25b1c017a61ab28fd
                                                    • Instruction Fuzzy Hash: B0819D75604300AFD310EF65CC82F5AB3A9EF88704F50892DF658AF2D2D6B5E905CB99
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$InfoItem_memset
                                                    • String ID: 0
                                                    • API String ID: 1173514356-4108050209
                                                    • Opcode ID: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                                    • Instruction ID: b3a4179b3c174fb1a3aa0d908437eb3f68f1f523a6631853a4ee88e897a1c7ed
                                                    • Opcode Fuzzy Hash: e31d5a25326cfad936127cde49464cb56a2d17833d4ec3f4ad79405d5b41ed43
                                                    • Instruction Fuzzy Hash: 31418CB55043019BD710CF19C884B5BBBE5AFC5324F148A6EFCA49B282C375E809CBA6
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469368
                                                    • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00469379
                                                    • SendMessageW.USER32(?,?,00000000,00000000), ref: 004693AB
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 763830540-1403004172
                                                    • Opcode ID: 61f9ca9c5a419efdf5b0fec418701a37d71c48c53c791e94f016d44e45ec48a7
                                                    • Instruction ID: 8c71ebf423f389569590ff88e643f185c263fd61562863516bde62979c95be4e
                                                    • Opcode Fuzzy Hash: 61f9ca9c5a419efdf5b0fec418701a37d71c48c53c791e94f016d44e45ec48a7
                                                    • Instruction Fuzzy Hash: E0210C7160020067C210BB3A9C46FAF77989B85364F09052FF959AB3D1EA7CE94A436E
                                                    APIs
                                                    • GetStdHandle.KERNEL32(?), ref: 004439B4
                                                      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,74DF2EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                                      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                                      • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CurrentHandleProcess$Duplicate
                                                    • String ID: nul
                                                    • API String ID: 2124370227-2873401336
                                                    • Opcode ID: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                                    • Instruction ID: e5202fea31d744cc2812a948a395a4146b23d8233fafbd02014e3d546f800e0b
                                                    • Opcode Fuzzy Hash: 1f0ba76bcec97c73efa3faab39b1dec00fe260a428cb25b20c1b65e4e3d5eb1c
                                                    • Instruction Fuzzy Hash: 8921A070104301ABE320DF28D886B9B77E4AF94B24F504E1EF9D4972D1E3B5DA54CBA6
                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F6), ref: 004438B7
                                                      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(0000002C,00000000,00000000,00000002,74DF2EE0,00000000,004437E2,?,0000002C,00000000,?,?,?), ref: 004356BD
                                                      • Part of subcall function 0043569D: GetCurrentProcess.KERNEL32(?,00000000,?,?,?), ref: 004356C1
                                                      • Part of subcall function 0043569D: DuplicateHandle.KERNEL32(00000000,?,?,?), ref: 004356C4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CurrentHandleProcess$Duplicate
                                                    • String ID: nul
                                                    • API String ID: 2124370227-2873401336
                                                    • Opcode ID: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                                    • Instruction ID: 183321404fa0000a7fb955016a75d3ae5bd0bbc3c7f5d4043dd6f74a8503dfc6
                                                    • Opcode Fuzzy Hash: 1c1504a6ed80816e8cc684f5e798812a6452e5ed6eae5ac994518d836d8835bd
                                                    • Instruction Fuzzy Hash: 4E2182701002019BE210DF28DC45F9BB7E4AF54B34F204A1EF9E4962D0E7759654CB56
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00441333
                                                    • LoadLibraryW.KERNEL32(?,?,?,?,0047B4D0,?,?,?,?,?,?,?,?,?,00000000), ref: 0044133A
                                                    • SendMessageW.USER32(?,00000467,00000000,?), ref: 00441352
                                                    • DestroyWindow.USER32(00000000,?,00000467,00000000,?,?,?,?,0047B4D0,?,?,?,?,?,?), ref: 0044135B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                                    • String ID: SysAnimate32
                                                    • API String ID: 3529120543-1011021900
                                                    • Opcode ID: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                                    • Instruction ID: 28effd0bdeb99d0e0a50349a2d6ccdc4655b9339127a2247ff1827a793b197f6
                                                    • Opcode Fuzzy Hash: 7eb070968e116bc4f0d30e0eba70c7f8d943bdaa5f5f9b6b4db71aa758301bcd
                                                    • Instruction Fuzzy Hash: D0216271204301ABF7209AA5DC84F6B73ECEBD9724F104A1EF651D72E0D6B4DC818729
                                                    APIs
                                                    • PeekMessageW.USER32(00000000,00000000,00000000,00000000,00000001), ref: 0044304E
                                                    • TranslateMessage.USER32(?), ref: 0044308B
                                                    • DispatchMessageW.USER32(?), ref: 00443096
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004430AD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Message$Peek$DispatchTranslate
                                                    • String ID: *.*
                                                    • API String ID: 1795658109-438819550
                                                    • Opcode ID: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                                    • Instruction ID: a39ada88e739a490af96418dc0f35d82e94fc94c1e76e22fe960a83301852fb1
                                                    • Opcode Fuzzy Hash: a5394e60fa5dc12563cec3cf09e66162f870e5be06c650d2d1f2ad27f88770fd
                                                    • Instruction Fuzzy Hash: 9F2138715183419EF720DF289C80FA3B7949B60B05F008ABFF66492191E6B99608C76E
                                                    APIs
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                      • Part of subcall function 004389A1: SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                                      • Part of subcall function 004389A1: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                                      • Part of subcall function 004389A1: GetCurrentThreadId.KERNEL32 ref: 004389DA
                                                      • Part of subcall function 004389A1: AttachThreadInput.USER32(00000000), ref: 004389E1
                                                    • GetFocus.USER32 ref: 004609EF
                                                      • Part of subcall function 004389EB: GetParent.USER32(?), ref: 004389F7
                                                      • Part of subcall function 004389EB: GetParent.USER32(?), ref: 00438A04
                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00460A37
                                                    • EnumChildWindows.USER32(?,00445A31,?), ref: 00460A60
                                                    • __swprintf.LIBCMT ref: 00460A7A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_wcslen
                                                    • String ID: %s%d
                                                    • API String ID: 991886796-1110647743
                                                    • Opcode ID: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                                    • Instruction ID: 20a4aa43144560c0524e92d1094e5dcb4402c89d1d481f65a72662ac57dae138
                                                    • Opcode Fuzzy Hash: 4a64ff5b06e5e341b473abb9bc2bdd7182ed8da111ba9effa567358a3114916c
                                                    • Instruction Fuzzy Hash: 7521A4712403046BD610FB65DC8AFEFB7ACAF98704F00481FF559A7181EAB8A509877A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _memset$_sprintf
                                                    • String ID: %02X
                                                    • API String ID: 891462717-436463671
                                                    • Opcode ID: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                                    • Instruction ID: c3235ccac5cd273424cb9b73a8b9e0f10e05fa8943de770f4571b5c3e9b76774
                                                    • Opcode Fuzzy Hash: 3d61b25fa3990800e5a694d7793c27d494b4b6e65897825e99c1223689708875
                                                    • Instruction Fuzzy Hash: 5B11E97225021167D314FA698C93BEE724CAB45704F50453FF541A75C1EF6CB558839E
                                                    APIs
                                                    • _memset.LIBCMT ref: 0042CD00
                                                    • GetOpenFileNameW.COMDLG32 ref: 0042CD51
                                                      • Part of subcall function 0040FFB0: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\FSRHC6mB16.exe,?,C:\Users\user\Desktop\FSRHC6mB16.exe,004A8E80,C:\Users\user\Desktop\FSRHC6mB16.exe,0040F3D2), ref: 0040FFCA
                                                      • Part of subcall function 00410130: SHGetMalloc.SHELL32(00000000), ref: 0041013A
                                                      • Part of subcall function 00410130: SHGetDesktopFolder.SHELL32(?,004A8E80), ref: 00410150
                                                      • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 00410160
                                                      • Part of subcall function 00410130: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410197
                                                      • Part of subcall function 00410130: _wcscpy.LIBCMT ref: 004101AC
                                                      • Part of subcall function 00410020: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 00410037
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: NamePath$Full_wcscpy$DesktopFileFolderFromListMallocOpen_memset
                                                    • String ID: $OH$@OH$X
                                                    • API String ID: 3491138722-1394974532
                                                    • Opcode ID: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                                    • Instruction ID: e3e81f3fa603e1d093c5df9e9287f390c0398a0e5563e0e16fb911f44c5f658a
                                                    • Opcode Fuzzy Hash: b307b7495d9e484b77ad3edce91dc90ef7c994e26f1a80758083a935cdf7c966
                                                    • Instruction Fuzzy Hash: 2111C2B02043405BC311EF19984175FBBE9AFD5308F14882EF68497292D7FD854DCB9A
                                                    APIs
                                                    • LoadLibraryW.KERNEL32(00000000), ref: 00463DD1
                                                    • GetProcAddress.KERNEL32(?,?), ref: 00463E68
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00463E84
                                                    • GetProcAddress.KERNEL32(?,?), ref: 00463ECE
                                                    • FreeLibrary.KERNEL32(?,?,?,00000000,?), ref: 00463EF0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Library$FreeLoad
                                                    • String ID:
                                                    • API String ID: 2449869053-0
                                                    • Opcode ID: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                                    • Instruction ID: 5a5949aabc30296464acd143044f95cbdcafad8a77d2d24e7d672d776762960f
                                                    • Opcode Fuzzy Hash: fa0419033c450d646a7a4ef883371915f5dff59722895d189eba4af2447b2958
                                                    • Instruction Fuzzy Hash: 9051C1752043409FC300EF25C881A5BB7A4FF89305F00456EF945A73A2DB79EE45CBAA
                                                    APIs
                                                    • GetKeyboardState.USER32(?,?,00000001,00000001,?,00000000), ref: 0044C3DA
                                                    • SetKeyboardState.USER32(00000080), ref: 0044C3ED
                                                    • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C441
                                                    • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C465
                                                    • SendInput.USER32 ref: 0044C509
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: KeyboardMessagePostState$InputSend
                                                    • String ID:
                                                    • API String ID: 3031425849-0
                                                    • Opcode ID: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                                    • Instruction ID: f46f63d78903415e516a46676784f6fcea1caa301ceb581e17347d916cd8316d
                                                    • Opcode Fuzzy Hash: b49b686b41cf8e4dc8898cf8a112ca1a8544ab09a95107e5a7613c5accf95fc9
                                                    • Instruction Fuzzy Hash: DB413B715462446FF760AB24D944BBFBB94AF99324F04061FF9D4122C2D37D9908C77A
                                                    APIs
                                                    • RegEnumKeyExW.ADVAPI32 ref: 004422F0
                                                    • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,?,?), ref: 0044232B
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0044234E
                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00442390
                                                    • RegEnumKeyExW.ADVAPI32(?,00000000), ref: 004423C0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Enum$CloseDeleteOpen
                                                    • String ID:
                                                    • API String ID: 2095303065-0
                                                    • Opcode ID: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                                    • Instruction ID: 24d8057b763805d248a02a33893b377b1579bd56aab3fff97e90bb3d062a49ad
                                                    • Opcode Fuzzy Hash: 367b6e42355be36f427f5e4c5f923650598af64a8eac08207e4f2af605b886a1
                                                    • Instruction Fuzzy Hash: 0C3150721043056EE210DF94DD84FBF73ECEBC9314F44492EBA9596141D7B8E9098B6A
                                                    APIs
                                                    • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C2F4
                                                    • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C31B
                                                    • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C363
                                                    • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C385
                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C392
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfile$SectionWrite$String
                                                    • String ID:
                                                    • API String ID: 2832842796-0
                                                    • Opcode ID: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                                    • Instruction ID: eb365ed5c03c4bb3a44f9ddbc5128f2f56e5f8affd5b6ace934fe40af23b551f
                                                    • Opcode Fuzzy Hash: c76cc1094b5fb1fc43fcb7877a7661b5ae667b5fa7796de5023eb6f45200691f
                                                    • Instruction Fuzzy Hash: 00318675240305ABD610DFA1DC85F9BB3A8AF84705F00891DF94497292D7B9E889CB94
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 00447997
                                                    • GetCursorPos.USER32(?), ref: 004479A2
                                                    • ScreenToClient.USER32(?,?), ref: 004479BE
                                                    • WindowFromPoint.USER32(?,?), ref: 004479FF
                                                    • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447A78
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Client$CursorFromPointProcRectScreenWindow
                                                    • String ID:
                                                    • API String ID: 1822080540-0
                                                    • Opcode ID: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                                    • Instruction ID: e9c1e18ea4fcc9a2ad4b32cd349e8b57ec7287094a91df3c43d19f1875151664
                                                    • Opcode Fuzzy Hash: c356f0f93048ebf3c0a873f2be17aa192b5fb9472fb724aa4a6a449873fe30ba
                                                    • Instruction Fuzzy Hash: DE3188742082029BD710CF19D88596FB7A9EBC8714F144A1EF88097291D778EA57CBAA
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00447C1B
                                                    • ScreenToClient.USER32(?,?), ref: 00447C39
                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C4C
                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447C93
                                                    • EndPaint.USER32(?,?), ref: 00447CD1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ClientPaintRectRectangleScreenViewportWindow
                                                    • String ID:
                                                    • API String ID: 659298297-0
                                                    • Opcode ID: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                                    • Instruction ID: 653bb342b0117225c29b14224c0e663a7b864e912777eddc33bb147bcfad3e12
                                                    • Opcode Fuzzy Hash: a6d698a2242c6caf7091173c4181dadfabb51550506680b35635a03376f271bc
                                                    • Instruction Fuzzy Hash: 8A3150706043019FE320CF15D9C8F7B7BE8EB89724F044A6EF994873A1D774A8468B69
                                                    APIs
                                                    • GetCursorPos.USER32(?), ref: 004478A7
                                                    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478C3
                                                    • DefDlgProcW.USER32(?,0000007B,?,?,004A83D8,?,004A83D8,?), ref: 004478E7
                                                    • GetCursorPos.USER32(?), ref: 00447935
                                                    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 0044795B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CursorMenuPopupTrack$Proc
                                                    • String ID:
                                                    • API String ID: 1300944170-0
                                                    • Opcode ID: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                                    • Instruction ID: 600148c7f6f0e64f7aba5c2d0a58757112576a5c49d56a392ea253be37485a5b
                                                    • Opcode Fuzzy Hash: 00aabaf84d80e4f8c92fc7d2a6c816b999107077810d41e1d32a7af9c3da8c6b
                                                    • Instruction Fuzzy Hash: 2B31E475244204ABE214DB48DC48FABB7A5FBC9711F14491EF64483390D7B96C4BC779
                                                    APIs
                                                    • EnableWindow.USER32(004A83D8,00000000), ref: 00448BAB
                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448BC1
                                                    • ShowWindow.USER32(004A83D8,00000000,004A83D8,?,?), ref: 00448C37
                                                    • ShowWindow.USER32(004A83D8,00000004,004A83D8), ref: 00448C43
                                                    • EnableWindow.USER32(004A83D8,00000001), ref: 00448C58
                                                      • Part of subcall function 004413F0: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0044140E
                                                      • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441452
                                                      • Part of subcall function 004413F0: GetWindowLongW.USER32(?,000000F0), ref: 00441493
                                                      • Part of subcall function 004413F0: SendMessageW.USER32(00961A30,000000F1,00000000,00000000), ref: 004414C6
                                                      • Part of subcall function 004413F0: SendMessageW.USER32(00961A30,000000F1,00000001,00000000), ref: 004414F1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$EnableMessageSend$LongShow
                                                    • String ID:
                                                    • API String ID: 142311417-0
                                                    • Opcode ID: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                                    • Instruction ID: 53ead31d82dc60d0a1ec6489c26700cf05fac79e8a5bf65a12bf69c5108a1aee
                                                    • Opcode Fuzzy Hash: 63a7105258867651d9446b65671e60b54e1f680e017c4d0f27b0fbeeb6060130
                                                    • Instruction Fuzzy Hash: 942105B07053809BF7148E28C8C47AFB7D0FB95345F08482EF981A6391DBAC9845C72E
                                                    APIs
                                                    • _memset.LIBCMT ref: 0044955A
                                                      • Part of subcall function 00433A98: _wcspbrk.LIBCMT ref: 00433AAC
                                                    • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 004495B3
                                                    • _wcslen.LIBCMT ref: 004495C1
                                                    • _wcslen.LIBCMT ref: 004495CE
                                                    • SendMessageW.USER32(?,00001060,00000000,?), ref: 004495FF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_wcslen$_memset_wcspbrk
                                                    • String ID:
                                                    • API String ID: 1843234404-0
                                                    • Opcode ID: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                                    • Instruction ID: 2eba0e6ca7bf2f01d6f4dc0284c8cedbdf4c7ea0b5caad0642d64795040b3bc6
                                                    • Opcode Fuzzy Hash: b21334e59b332bdcefcacb45badc01962a29afe58654cc2f886ab9dc01dd4065
                                                    • Instruction Fuzzy Hash: 1821F87260430556E630EB15AC81BFBB3D8EBD0761F10483FEE4081280E67E9959D3AA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                                    • Instruction ID: 4734ce3ce40af5b77ad59fd8baedf6a3e56741e39cc50bb30d89ac3ca2d3bd52
                                                    • Opcode Fuzzy Hash: 43986f9d4d7e017d9aea9f4dce7e52c9963f71054abe4abd36fa420e2ae722de
                                                    • Instruction Fuzzy Hash: 1321E0712006409BCB10EF29D994D6B73A8EF45321B40466EFE5597382DB34EC08CBA9
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 00445721
                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0044573C
                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00445773
                                                    • _wcslen.LIBCMT ref: 004457A3
                                                    • CharUpperBuffW.USER32(00000000,00000000), ref: 004457AD
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                                    • String ID:
                                                    • API String ID: 3087257052-0
                                                    • Opcode ID: 07a683c3f77dae50ee773e7e3fa5154241049f7b31449e9a489b3be5124be6a3
                                                    • Instruction ID: 00e09c3d40749c53521e9302b0eb92bb7bfe2d7d521d01ead8474e6f611d5aec
                                                    • Opcode Fuzzy Hash: 07a683c3f77dae50ee773e7e3fa5154241049f7b31449e9a489b3be5124be6a3
                                                    • Instruction Fuzzy Hash: FA11E972601741BBF7105B35DC46F5B77CDAF65320F04443AF40AE6281FB69E84583AA
                                                    APIs
                                                    • IsWindow.USER32(00000000), ref: 00459DEF
                                                    • GetForegroundWindow.USER32 ref: 00459E07
                                                    • GetDC.USER32(00000000), ref: 00459E44
                                                    • GetPixel.GDI32(00000000,?,00000000), ref: 00459E4F
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00459E8B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$ForegroundPixelRelease
                                                    • String ID:
                                                    • API String ID: 4156661090-0
                                                    • Opcode ID: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                                    • Instruction ID: f25aa70a507d7fb142791e963b89e5313ab4350e7ab13503248c443e15a863bf
                                                    • Opcode Fuzzy Hash: c25ec76bf159445cc401153d518622b926736981535c7bd42fe0b2b106eefd61
                                                    • Instruction Fuzzy Hash: 76219D76600202ABD700EFA5CD49A5AB7E9FF84315F19483DF90597642DB78FC04CBA9
                                                    APIs
                                                      • Part of subcall function 004647A2: inet_addr.WSOCK32(?), ref: 004647C7
                                                    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 00464985
                                                    • WSAGetLastError.WSOCK32(00000000,00000002,00000001,00000006,00000000), ref: 00464993
                                                    • connect.WSOCK32(00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649CD
                                                    • WSAGetLastError.WSOCK32(00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 004649F4
                                                    • closesocket.WSOCK32(00000000,00000000,00000000,00000000,00000000,00000010,00000002,00000001,00000006,00000000), ref: 00464A07
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                                    • String ID:
                                                    • API String ID: 245547762-0
                                                    • Opcode ID: c11d93ef0e5925fc7b778e12926c76e847d2ba71e7f4531691fb5523561cfb0e
                                                    • Instruction ID: b27d5ee258410aac5bd3077dd9c53ce90635b59006b610d0ec7ee295a05cd03d
                                                    • Opcode Fuzzy Hash: c11d93ef0e5925fc7b778e12926c76e847d2ba71e7f4531691fb5523561cfb0e
                                                    • Instruction Fuzzy Hash: 3211DA712002109BD310FB2AC842F9BB3D8AF85728F04895FF594A72D2D7B9A885875A
                                                    APIs
                                                    • DeleteObject.GDI32(00000000), ref: 00447151
                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                    • SelectObject.GDI32(?,00000000), ref: 004471A2
                                                    • BeginPath.GDI32(?), ref: 004471B7
                                                    • SelectObject.GDI32(?,00000000), ref: 004471DC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$BeginCreateDeletePath
                                                    • String ID:
                                                    • API String ID: 2338827641-0
                                                    • Opcode ID: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                                    • Instruction ID: ab30216038401830d00444c504d41f25dcbf82a6e2307e0a418987ed8484b610
                                                    • Opcode Fuzzy Hash: f19e52de08adcd67550c2e9faff4417be3cdd69e9125f029607893bae639c511
                                                    • Instruction Fuzzy Hash: 7E2171B18083019FD320CF29AD44A1B7FACF74A724F14052FF654933A1EB789849CB69
                                                    APIs
                                                    • Sleep.KERNEL32(00000000,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043771E
                                                    • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043773C
                                                    • Sleep.KERNEL32(00000000,?,?,?,?,004448B6,0000000F,?), ref: 0043775C
                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,004448B6,0000000F,?), ref: 00437767
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CounterPerformanceQuerySleep
                                                    • String ID:
                                                    • API String ID: 2875609808-0
                                                    • Opcode ID: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                                    • Instruction ID: fd8a8a83491f03de43ea78fbc63302b75a2fa5438857304713168bbc83ca9150
                                                    • Opcode Fuzzy Hash: 901ea73111326f2a8af3d8a1217edfde6b6dff748f8bb26d3b0ac17b2ce0a9c5
                                                    • Instruction Fuzzy Hash: EA11A3B64093119BC210EF1ADA88A8FB7F4FFD8765F004D2EF9C462250DB34D5598B9A
                                                    APIs
                                                    • SendMessageW.USER32 ref: 0046FD00
                                                    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 0046FD2E
                                                    • SendMessageW.USER32(?,00001015,?,?), ref: 0046FD4B
                                                    • DestroyIcon.USER32(?), ref: 0046FD58
                                                    • DestroyIcon.USER32(?), ref: 0046FD5F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$DestroyIcon
                                                    • String ID:
                                                    • API String ID: 3419509030-0
                                                    • Opcode ID: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                                    • Instruction ID: ba7c1cc62690e465ab1dcb48fa3e0f79152c3dc78d34179caeeeb49ed344ab69
                                                    • Opcode Fuzzy Hash: a24bc400bf7eaff3d1708451a80103ed5292b50ec6011cebb58ec712c1110a53
                                                    • Instruction Fuzzy Hash: 5F1182B15043449BE730DF14DC46BABB7E8FBC5714F00492EE6C857291D6B8A84A8B67
                                                    APIs
                                                    • __getptd.LIBCMT ref: 004175AE
                                                      • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                                      • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                                    • __amsg_exit.LIBCMT ref: 004175CE
                                                    • __lock.LIBCMT ref: 004175DE
                                                    • InterlockedDecrement.KERNEL32(?), ref: 004175FB
                                                    • InterlockedIncrement.KERNEL32(00962CE0), ref: 00417626
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                    • String ID:
                                                    • API String ID: 4271482742-0
                                                    • Opcode ID: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                                    • Instruction ID: de548182bd5f57d4f8c9f8a4c79293bfa6802d75d0085d2526eaa3c6a777046b
                                                    • Opcode Fuzzy Hash: 9041076209036267701916e3e7e7a5ecd924b858c75713c79b1599e88ef874d9
                                                    • Instruction Fuzzy Hash: 9401AD31944A11AFC710ABA998497CE7BB0BB11724F0540ABE80063791CB3CA9C1CFEE
                                                    APIs
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$Icon
                                                    • String ID:
                                                    • API String ID: 4023252218-0
                                                    • Opcode ID: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                                    • Instruction ID: d1816f9fa450f538fb043821254e2bd2cfb9ade9207d957631f6d0e9d50691b6
                                                    • Opcode Fuzzy Hash: 187bd120907745c88baacffad0920a9106e1cca1ea6db424662e0a83cd01c53e
                                                    • Instruction Fuzzy Hash: 05015E70300605ABCB20DF65D9D4B2B77A8BF14712B50452AFD04D7346EB38EC48CB69
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00460342
                                                    • GetWindowTextW.USER32(00000000,00000100,00000100), ref: 00460357
                                                    • MessageBeep.USER32(00000000), ref: 0046036D
                                                    • KillTimer.USER32(?,0000040A), ref: 00460392
                                                    • EndDialog.USER32(?,00000001), ref: 004603AB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                    • String ID:
                                                    • API String ID: 3741023627-0
                                                    • Opcode ID: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                                    • Instruction ID: 48c257e0c270193328064fa19c5b46d6a870d8092b70dfec968bdaebd9a60f08
                                                    • Opcode Fuzzy Hash: 5e0545b8da8baa7cb8324f4116d33f6edaa60507eab9176a587cebaf75a8c25b
                                                    • Instruction Fuzzy Hash: BE018831500300A7E7209B54DE5DBDB77A8BF44B05F00492EB681A25D0E7F8A584CB55
                                                    APIs
                                                    • SendMessageW.USER32(?,00001101,00000000,?), ref: 00455514
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyObject$IconMessageSendWindow
                                                    • String ID:
                                                    • API String ID: 1489400265-0
                                                    • Opcode ID: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                                    • Instruction ID: 68d82c845863845e83b9d92669df32d5d1b96a6c2c0272d07869f65424c05900
                                                    • Opcode Fuzzy Hash: fb8346e1cf28bbdc4ad062342734fe1bacbf25b41774fd01ae6266dc65fad9d1
                                                    • Instruction Fuzzy Hash: D9014F703006419BDB10EF65DED8A2A73A9FB44712B40455AFE05DB286DB78EC49CB68
                                                    APIs
                                                      • Part of subcall function 0043343D: InvalidateRect.USER32(?,00000000,00000001), ref: 004334BE
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455640
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                                    • String ID:
                                                    • API String ID: 1042038666-0
                                                    • Opcode ID: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                                    • Instruction ID: 707d1f3050e1f0ff98422ce5efa9f9a4d3559fdafbc0a23101ed238e91bf2869
                                                    • Opcode Fuzzy Hash: 920ee65d6839c6288c76afce6441748d32e1b72318fe83d584ccefe2da360159
                                                    • Instruction Fuzzy Hash: B2014B702006419BCB10AF65D9C8A2A33ACAF19322780456AFD05D7242DB28EC498B79
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                    • String ID:
                                                    • API String ID: 2625713937-0
                                                    • Opcode ID: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                                    • Instruction ID: 1b0d13c7bbaa275692c81ef4a4760df4fcf6218f807946f7e03cce85d1463269
                                                    • Opcode Fuzzy Hash: a89ec47609df172868659220a46891f09f78d761c189f4b7bb4a315096e7830c
                                                    • Instruction Fuzzy Hash: F7F0A4751052019BD7508F18EC0C70E7FA8FB4F325F04462EEA19932E0DB781546CBAD
                                                    APIs
                                                      • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                                    • ___set_flsgetvalue.LIBCMT ref: 004140E1
                                                      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                    • ___fls_getvalue@4.LIBCMT ref: 004140EC
                                                      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                    • ___fls_setvalue@8.LIBCMT ref: 004140FF
                                                      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00414108
                                                    • ExitThread.KERNEL32 ref: 0041410F
                                                    • GetCurrentThreadId.KERNEL32 ref: 00414115
                                                    • __freefls@4.LIBCMT ref: 00414135
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00414148
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Value$CurrentThread__decode_pointer$ErrorExitImageLastNonwritable___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                    • String ID:
                                                    • API String ID: 132634196-0
                                                    • Opcode ID: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                                    • Instruction ID: c6f54ac6c47f72d6c6be617d0ab0d95393642b3a08ca47198428750b18cc63fb
                                                    • Opcode Fuzzy Hash: dbe0df41a3d89f03eebcd77cedb8c7fbd95cde8327ee68e759feca9a6a87dff2
                                                    • Instruction Fuzzy Hash: EFE0B6318012096B8F0177F28E2A8DF3A2DAD56799B12842EBF10A3112DA6DD9D147AD
                                                    APIs
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00415610
                                                      • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                                    • __getptd_noexit.LIBCMT ref: 00415620
                                                    • CloseHandle.KERNEL32(?,?,0041566B), ref: 00415634
                                                    • __freeptd.LIBCMT ref: 0041563B
                                                    • ExitThread.KERNEL32 ref: 00415643
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CloseCurrentExitFindHandleImageNonwritableSectionThread__freeptd__getptd_noexit
                                                    • String ID:
                                                    • API String ID: 3798957060-0
                                                    • Opcode ID: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                                    • Instruction ID: 5ad9b57b40d8b41da6f03c32f2a15b2799e0bbfe2e5ad1689210a27a588f1b2a
                                                    • Opcode Fuzzy Hash: d3b08fe511e09ca6ea2d918a54b62a74066439bca0a0e456eaad9824bd7e2a02
                                                    • Instruction Fuzzy Hash: 29E01A31501A1197C2212BB9AC097DE3255AF01F36F944A6EF81A952A0DB6CD98147AD
                                                    APIs
                                                      • Part of subcall function 00411A35: _doexit.LIBCMT ref: 00411A41
                                                    • ___set_flsgetvalue.LIBCMT ref: 00415690
                                                      • Part of subcall function 00416A84: TlsGetValue.KERNEL32(00411739,00416C10,?,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416A8D
                                                      • Part of subcall function 00416A84: __decode_pointer.LIBCMT ref: 00416A9F
                                                      • Part of subcall function 00416A84: TlsSetValue.KERNEL32(00000000,00411739,00417F28,00413979,?,?,00411739,?,00401C0B), ref: 00416AAE
                                                    • ___fls_getvalue@4.LIBCMT ref: 0041569B
                                                      • Part of subcall function 00416A64: TlsGetValue.KERNEL32(?,?,004140F1,00000000), ref: 00416A72
                                                    • ___fls_setvalue@8.LIBCMT ref: 004156AD
                                                      • Part of subcall function 00416AB8: __decode_pointer.LIBCMT ref: 00416AC9
                                                    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004156B6
                                                    • ExitThread.KERNEL32 ref: 004156BD
                                                    • __freefls@4.LIBCMT ref: 004156D9
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 004156EC
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Value$__decode_pointer$CurrentErrorExitImageLastNonwritableThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                                    • String ID:
                                                    • API String ID: 1537469427-0
                                                    • Opcode ID: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                                    • Instruction ID: 6f4b581ce684dac4bce1a6396b1ab204a3b2196504341234b7a244e47b3a25b0
                                                    • Opcode Fuzzy Hash: 99715b5f8e2ff19c7b8f3a2e2e0a417857e73ed83bc070766e6b29f9400adc7a
                                                    • Instruction Fuzzy Hash: 83E0E6308003096BCF0037F29E1A9DF392DAD41389B52841E7E14B2122DE6DD9D1466D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _malloc
                                                    • String ID: Default$|k
                                                    • API String ID: 1579825452-2254895183
                                                    • Opcode ID: 404d7240c4bb856f681ff9cdf52c8ed6758caabbd7f7f5126ad75ded5c77f63b
                                                    • Instruction ID: 39a525bc613f0e7e9485e4ea944b13d532e73913c0a35fc25f8fa2b96209a7b9
                                                    • Opcode Fuzzy Hash: 404d7240c4bb856f681ff9cdf52c8ed6758caabbd7f7f5126ad75ded5c77f63b
                                                    • Instruction Fuzzy Hash: 51F19F706083018BD714DF25C484A6BB7E5AF85314F64886FF885AB392D738EC55CB9B
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _memcmp
                                                    • String ID: '$[$h
                                                    • API String ID: 2931989736-1224472061
                                                    • Opcode ID: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
                                                    • Instruction ID: c2eec353cbd26a418970a1643da97c958d9efd09d44d369c5aec2a2e92b02032
                                                    • Opcode Fuzzy Hash: b65a2ba19e68ffe8a11284d2d069350b2f2ae6a9059e42b54d6f98484e49560c
                                                    • Instruction Fuzzy Hash: EBE1B3756083858FE725CF28C8807ABBBE1FFC9304F18896EE89587341D7799849CB56
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _strncmp
                                                    • String ID: >$R$U
                                                    • API String ID: 909875538-1924298640
                                                    • Opcode ID: 83caccdc30ebaedd60eda3635d3ed4fa95617b34971efb7504fa10d53abc7e5a
                                                    • Instruction ID: f6794502b7c89560a677b30a08de70cb8bc1b17d125f16f135907c58c8460d8d
                                                    • Opcode Fuzzy Hash: 83caccdc30ebaedd60eda3635d3ed4fa95617b34971efb7504fa10d53abc7e5a
                                                    • Instruction Fuzzy Hash: 46E19C745083818FEB25CF29C49076BBBE1EFD9304F28496EE89587381D378E849CB56
                                                    APIs
                                                      • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                                    • CoInitialize.OLE32(00000000), ref: 0046CE18
                                                    • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
                                                    • CoUninitialize.OLE32 ref: 0046CE50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                    • String ID: .lnk
                                                    • API String ID: 886957087-24824748
                                                    • Opcode ID: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                                    • Instruction ID: 09ec1e36491b9dee8eccbfa157b0fc1a83632a56aae6c10d58f94140378ad3aa
                                                    • Opcode Fuzzy Hash: cf95cfa125c39178dc1728bd48ca6ee468afe444b27fb378bb5b47a8cf5920ff
                                                    • Instruction Fuzzy Hash: D3A1ABB5A042019FC704EF64C980E6BB7E9EF88714F14895EF8849B392D735EC45CBA6
                                                    Strings
                                                    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00469C37
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcslen
                                                    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                    • API String ID: 176396367-557222456
                                                    • Opcode ID: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                                    • Instruction ID: 5ec49088f7a0f5eff408c40ec761cfb1cab3d77d8e9f1d748350f88cc39ab646
                                                    • Opcode Fuzzy Hash: 6ed3ee7040cf52f7c8cf58c24b37417f7719ae2cfab6dfb5b0d2deafceea8a2b
                                                    • Instruction Fuzzy Hash: 2C818F715183009FC310EF65C88186BB7E8AF85714F408A2FF5959B2A2E778ED45CB9B
                                                    APIs
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                    • VariantInit.OLEAUT32(00000000), ref: 0042D2E0
                                                    • VariantCopy.OLEAUT32(?,?), ref: 0042D2EE
                                                    • VariantClear.OLEAUT32(00000000), ref: 0042D2FF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Variant$ClearCopyInit_malloc
                                                    • String ID: 4RH
                                                    • API String ID: 2981388473-749298218
                                                    • Opcode ID: fc3cb15f69bed94fad3408b6e9a8dec14a823ae1006f6e36b74c6136e70dfe69
                                                    • Instruction ID: 2430bd0654d197d786bc988f6f01769df72c779a088326c60667d263ff95ce9f
                                                    • Opcode Fuzzy Hash: fc3cb15f69bed94fad3408b6e9a8dec14a823ae1006f6e36b74c6136e70dfe69
                                                    • Instruction Fuzzy Hash: CC913874A083519FC720CF29D480A1AB7E1FF89304F64892EE999DB351D774EC85CB96
                                                    APIs
                                                      • Part of subcall function 0040FFF0: _wcslen.LIBCMT ref: 0040FFF2
                                                      • Part of subcall function 0040FFF0: _wcscpy.LIBCMT ref: 00410012
                                                    • __wcsnicmp.LIBCMT ref: 0046681A
                                                    • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 004668B9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                                    • String ID: LPT$HH
                                                    • API String ID: 3035604524-2728063697
                                                    • Opcode ID: 4168d29b7d0848dc605f9ce781fdb6688c60699af114ee795911c582be7b9077
                                                    • Instruction ID: 32c7950bcbaa764ae6d62266904c1b9f72d26d84b6ae022b5f72856ccecd4d84
                                                    • Opcode Fuzzy Hash: 4168d29b7d0848dc605f9ce781fdb6688c60699af114ee795911c582be7b9077
                                                    • Instruction Fuzzy Hash: 2151D5B16043009FC720EF65C881B1BB7E5AF85704F11491EFA859B382E779ED49C79A
                                                    APIs
                                                      • Part of subcall function 004374AF: WriteProcessMemory.KERNEL32(?,?,00000000,00000000,00000000,?,00461142,?), ref: 004374E2
                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00438AB8
                                                      • Part of subcall function 00437472: ReadProcessMemory.KERNEL32(?,00000000,00000000,?,00000000,00000000,00460C33,?,00000000,?,00000202), ref: 004374A5
                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00438B2F
                                                    • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 00438BAF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$MemoryProcess$ReadWrite
                                                    • String ID: @
                                                    • API String ID: 4055202900-2766056989
                                                    • Opcode ID: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                                    • Instruction ID: 682097a2b5231093ce935cfc9f6f49684b756042c0be5430c67da702d62f7190
                                                    • Opcode Fuzzy Hash: 95f302c56ad406a71ba46a757bfca5032ac46bd5be6e99a0861c43b96ce9d769
                                                    • Instruction Fuzzy Hash: E6518FB2208304ABD310DB64CC81FEFB7A9EFC9714F04591EFA8597181D678F9498B66
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CrackInternet_memset_wcslen
                                                    • String ID: |
                                                    • API String ID: 915713708-2343686810
                                                    • Opcode ID: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                                    • Instruction ID: 59fb16093b155e5aebf0565036b17e76eaaa1a90c891d08183ce313382d628e9
                                                    • Opcode Fuzzy Hash: 49a329c21d3e2b60aa9c34259f3774bde857317d5b4f329263fe64f76368b085
                                                    • Instruction Fuzzy Hash: AE417EB2754301ABD204EF69DC81B9BF7E8FB88714F00052EF64593290DB75E909CBA6
                                                    APIs
                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A7FE
                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A851
                                                    • HttpQueryInfoW.WININET ref: 0044A892
                                                      • Part of subcall function 0044286A: GetLastError.KERNEL32(00000000,0044AA07,?,00000000,00000000,00000001,?,?), ref: 00442880
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                                    • String ID:
                                                    • API String ID: 3705125965-3916222277
                                                    • Opcode ID: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                                    • Instruction ID: e2ea4e726a01332d61d4ddbc0b4be6fd5f15ca60b5c099a75bcf819f780d651a
                                                    • Opcode Fuzzy Hash: 978b0a3adb57e12b693652f0a59e9f67067917ae502be6042813f4078819ed5c
                                                    • Instruction Fuzzy Hash: F431C6B56813416BE320EB16DC42F9FB7E8EFD9714F00091FF65057281D7A8A50D876A
                                                    APIs
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00450A84
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00450AA2
                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00450AB3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$Long
                                                    • String ID: SysTreeView32
                                                    • API String ID: 847901565-1698111956
                                                    • Opcode ID: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                                    • Instruction ID: 1ec52148e0427fd314aa46f8515fbaae5756f8dde681787cc4d1a4a364837cef
                                                    • Opcode Fuzzy Hash: 8beaa76caf08e9d8622144d4cb1fe8de975b1c4a0fa94bb7914df260c0b4a9df
                                                    • Instruction Fuzzy Hash: 9831E670244301AFE710DB64CC84B6BB3E8EF98325F104A1EF9A5932D1D7B8AD85CB25
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(?), ref: 00437CB2
                                                    • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00437D26
                                                    • FreeLibrary.KERNEL32(?,?,AU3_GetPluginDetails), ref: 00437D3D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID: AU3_GetPluginDetails
                                                    • API String ID: 145871493-4132174516
                                                    • Opcode ID: 4d29db7c409dc1d8665f13fcd2a771d904d38d92e5d57695c8085be3ce6f429e
                                                    • Instruction ID: 909018a8305b4cb0ce841e730e5bf8c258fddf5044228ae68d4d210ccee2088c
                                                    • Opcode Fuzzy Hash: 4d29db7c409dc1d8665f13fcd2a771d904d38d92e5d57695c8085be3ce6f429e
                                                    • Instruction Fuzzy Hash: 054147B96042019FC314DF68D8C4D5AF3E5FF8D304B20866EE9568B751DB35E802CB96
                                                    APIs
                                                    • DestroyWindow.USER32(00000000,004A83D8,00000000,?,?), ref: 00450C60
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: DestroyWindow
                                                    • String ID: msctls_updown32
                                                    • API String ID: 3375834691-2298589950
                                                    • Opcode ID: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                                    • Instruction ID: 6a1e1189e42626fde14bc74b9d87f1f450c181bb0fe7a510af516aef360d3f61
                                                    • Opcode Fuzzy Hash: 2a2b7300f3f0896f723b2acc27284ae87319393b418436251cb0663837fc8f9c
                                                    • Instruction Fuzzy Hash: CE31A279300201AFD624DF54DC81F5B73A9EB9A714F20451EF640AB382C7B4AC4ACB6A
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0045122A
                                                    • SendMessageW.USER32(00000000,00000186,00000000,00000000), ref: 00451238
                                                    • MoveWindow.USER32(?,?,00000000,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 0045125D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$MoveWindow
                                                    • String ID: Listbox
                                                    • API String ID: 3315199576-2633736733
                                                    • Opcode ID: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                                    • Instruction ID: bfe1e9b3800f224edd0053b2d0d87a77da448e7bf5b17050dc61905274d7532a
                                                    • Opcode Fuzzy Hash: ec94c338bdc408a6213732be15a93177a4dce0f95fa1299e59073e0341a0244e
                                                    • Instruction Fuzzy Hash: E421D3712043047BE6209A65DC81F6BB3E8EBCD735F104B1EFA60A72D1C675EC458729
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D243
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D2C7
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D30C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume
                                                    • String ID: HH
                                                    • API String ID: 2507767853-2761332787
                                                    • Opcode ID: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                                    • Instruction ID: 4a708fd112bc3492f79fb502a293ca5b83a6a9b53d4ab80d782c21126568c1ab
                                                    • Opcode Fuzzy Hash: 10a78899cac0a24ca5bd241ff5c46140465ea67f957306f93882c0fc43b3d187
                                                    • Instruction Fuzzy Hash: 622148756083019FC310EF55D944A6BB7E4FF88704F40882EFA45972A2D774E909CB5A
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001), ref: 0045D44A
                                                    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CE
                                                    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D502
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode$InformationVolume
                                                    • String ID: HH
                                                    • API String ID: 2507767853-2761332787
                                                    • Opcode ID: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                                    • Instruction ID: 8e4373afe1f51974a95c06a3ae407364d3098df30383bdf5f9e51316f0e0b5c8
                                                    • Opcode Fuzzy Hash: a403ffe69dae12f4374470e721856d745e9457d8bcd1b2c0f65575075c8e6c3b
                                                    • Instruction Fuzzy Hash: 902137756083019FC314EF55D944A5AB7E8FF88710F40882EFA49972A2D778E909CB9A
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450D74
                                                    • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450D8A
                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450D98
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: msctls_trackbar32
                                                    • API String ID: 3850602802-1010561917
                                                    • Opcode ID: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                                    • Instruction ID: c83169f0c5ec68c29a3e9aa847b4a28030a04f73c00385235601d1c9d4ce90e2
                                                    • Opcode Fuzzy Hash: e14717e3cb06623c4553287ca90ea840a6fcf4d017620d4062bb11778db8dfcd
                                                    • Instruction Fuzzy Hash: 4F1193717403117BE610CAA8DC81F5B73E8AB98B25F204A1AFA50A72C1D2B4FC458B68
                                                    APIs
                                                      • Part of subcall function 0045EFE7: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0047D14B,?,?,?,?), ref: 0045F003
                                                    • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046BD78
                                                    • WSAGetLastError.WSOCK32(00000000,?,?,00000000,?,?), ref: 0046BD83
                                                    • inet_ntoa.WSOCK32(00000000,?), ref: 0046BDCD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ByteCharErrorLastMultiWidegethostbynameinet_ntoa
                                                    • String ID: HH
                                                    • API String ID: 1515696956-2761332787
                                                    • Opcode ID: 536d88bcd2219f00ee4950b39be395ae06382d48515621a82e1548501abb3963
                                                    • Instruction ID: 2fad99cf3c45da3a785a9a513efbde0c8943f1fdc9598a344110207fd9df59bd
                                                    • Opcode Fuzzy Hash: 536d88bcd2219f00ee4950b39be395ae06382d48515621a82e1548501abb3963
                                                    • Instruction Fuzzy Hash: E21142765043006BC744FB66D885D9FB3A8AFC4318F448C2EF945A7242DA39E949876A
                                                    APIs
                                                      • Part of subcall function 00442C52: _wcslen.LIBCMT ref: 00442C82
                                                    • CoInitialize.OLE32(00000000), ref: 0046CE18
                                                    • CoCreateInstance.OLE32(00482A50,00000000,00000001,004828B0,?), ref: 0046CE31
                                                    • CoUninitialize.OLE32 ref: 0046CE50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                    • String ID: .lnk
                                                    • API String ID: 886957087-24824748
                                                    • Opcode ID: 8095c6d59d69238af541582e7c79e2891b33013a97e816c4c493b562f1f8ea66
                                                    • Instruction ID: 634f95a1702cd93f148e07eb64efb4b351689d97c5b229aafe37579347e0b37e
                                                    • Opcode Fuzzy Hash: 8095c6d59d69238af541582e7c79e2891b33013a97e816c4c493b562f1f8ea66
                                                    • Instruction Fuzzy Hash: E821AF312083009FC700EF55C985F5ABBF4EF89724F148A6EF9549B2E2D7B5A805CB56
                                                    APIs
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                    • GetMenuItemInfoW.USER32 ref: 004497EA
                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00449817
                                                    • DrawMenuBar.USER32 ref: 00449828
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Menu$InfoItem$Draw_malloc
                                                    • String ID: 0
                                                    • API String ID: 772068139-4108050209
                                                    • Opcode ID: 80c8cc45c3a2388c5d5a2fad2fa293faafe293b1266d5f5cdbd09ec66a21ca10
                                                    • Instruction ID: 895394c4ac3d8cdb9511dba433443d5742fa96e32f07ab63668b9f5a94eb31d1
                                                    • Opcode Fuzzy Hash: 80c8cc45c3a2388c5d5a2fad2fa293faafe293b1266d5f5cdbd09ec66a21ca10
                                                    • Instruction Fuzzy Hash: 941182B16042009BF730EB55EC96FABB7A8FB91714F00452EE648CA281DB7A9445CB76
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AllocTask_wcslen
                                                    • String ID: hkG
                                                    • API String ID: 2651040394-3610518997
                                                    • Opcode ID: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                                    • Instruction ID: 372044899b15e8c53ead78f1c779643819f92c4817f04f111663958edd7e2adf
                                                    • Opcode Fuzzy Hash: 13332cee77e5ed885d7d4fc6bfcacd5b22b96a16ce8d99b05f9432ebd764b12e
                                                    • Instruction Fuzzy Hash: DCE065736442225B97506A79AC045CBA7D8AFB0370B15482BF880E7310E278E89643E5
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0043417A
                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0043418C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                    • API String ID: 2574300362-1816364905
                                                    • Opcode ID: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                                    • Instruction ID: 1a9860a365f0c849ce8c10f1c40c5c80f9dda93506fd3415c38c98a37cde1a5a
                                                    • Opcode Fuzzy Hash: 58df7aafb5ba6d6c6a2aff3317d08040102bec91f6a73b36e13bbbd5fede489a
                                                    • Instruction Fuzzy Hash: F9D05EB1440B039FCB109FA0D80C64BB6E4AB64301F148C2EF885B2654D7B8E8C0CBA8
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434466,?,?,00464B68,?,?,?,?,?,00000000,?,?,00000101,?), ref: 004343DE
                                                    • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004343F0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpSendEcho
                                                    • API String ID: 2574300362-58917771
                                                    • Opcode ID: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                                    • Instruction ID: bde82dd314f67bb94adb8237e566b22d9cd50c1f3059090bebd97951f1ce1dc3
                                                    • Opcode Fuzzy Hash: 4b46215cfc07257f28131f0af9bcf44c57d27cd5d24dcd7dc697cbf0f45d51b4
                                                    • Instruction Fuzzy Hash: C9D017B45043039BD7105B21D80874A76E4AF58310F118C2FF881E2250CBBCE8808B79
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL,?,0043447D,?,?,00464B56,?,?,?,?,00000000,?,?,00000101,?,?), ref: 0043440D
                                                    • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 0043441F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpCloseHandle
                                                    • API String ID: 2574300362-3530519716
                                                    • Opcode ID: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                                    • Instruction ID: 815a2f2ef77883dfca24b23846b24e776c3b140ddfaf16f0983d17b56328066b
                                                    • Opcode Fuzzy Hash: 42f9b5773da98e9266fb1162e4ae0909fe6bfc7ac22b46aa183d999fe3c035a4
                                                    • Instruction Fuzzy Hash: 9FD017B04443129AD7106B64D80874A76E4AB68302F129C3FF881A2660C7BCA8808B39
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(ICMP.DLL,?,00434494,?,?,00464A94,?), ref: 0043443C
                                                    • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 0043444E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: ICMP.DLL$IcmpCreateFile
                                                    • API String ID: 2574300362-275556492
                                                    • Opcode ID: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                                    • Instruction ID: c247b13c068300da1972229949477068df6ba5342f41feac8fae2a533bc96115
                                                    • Opcode Fuzzy Hash: aa837af65d1bad252c0530eb36f48db089182c3e5c3795977f5f1506c5c05052
                                                    • Instruction Fuzzy Hash: 97D017B04043029ADB105B60D90875A77E4AB68300F118C7FF9A1A2250C7BCA8808B29
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(kernel32.dll,0040E551,?), ref: 0040EE7B
                                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040EE8D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID: IsWow64Process$kernel32.dll
                                                    • API String ID: 2574300362-3024904723
                                                    • Opcode ID: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                                                    • Instruction ID: 75875fa2f3f8b89ed4c8cde0d061cde3839b728dd3838c322d7dfd2ddbff31fa
                                                    • Opcode Fuzzy Hash: 16a412f97595c511ed2c9e877c1bae7dd0f808d0cf5b3a9fdd28adcf59ee176d
                                                    • Instruction Fuzzy Hash: 51D0C9B0940707DAC7301F72C91871B7AE4AB40342F204C3EB995A1290DBBCC0408B28
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ClearVariant
                                                    • String ID:
                                                    • API String ID: 1473721057-0
                                                    • Opcode ID: 864e75c6b64c8395072179653f2e6e54ed688e1196af63861ce1262d91a289fa
                                                    • Instruction ID: 4e1e522645e86f73b8885f2d86dba7d443b77ce6b8f7ad4508257b27d10f8221
                                                    • Opcode Fuzzy Hash: 864e75c6b64c8395072179653f2e6e54ed688e1196af63861ce1262d91a289fa
                                                    • Instruction Fuzzy Hash: 3DD18D746003018FD724DF25D484A26B7E1EF49704F64887EE9899B3A1D739EC92CB9A
                                                    APIs
                                                    • __flush.LIBCMT ref: 00414630
                                                    • __fileno.LIBCMT ref: 00414650
                                                    • __locking.LIBCMT ref: 00414657
                                                    • __flsbuf.LIBCMT ref: 00414682
                                                      • Part of subcall function 00417F23: __getptd_noexit.LIBCMT ref: 00417F23
                                                      • Part of subcall function 00417EBB: __decode_pointer.LIBCMT ref: 00417EC6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                                    • String ID:
                                                    • API String ID: 3240763771-0
                                                    • Opcode ID: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                                    • Instruction ID: ec1a4dff6c5341ad57a53ba98b0f539b864df2cc4a0ba96fecd891c5d8a4160d
                                                    • Opcode Fuzzy Hash: da881668a639e25d03d88a6d97948a76b4f19f87a827f6f9fc91a47de182ffa5
                                                    • Instruction Fuzzy Hash: 4841A571A00605ABDB249FA5C9445DFB7B6EFC1328F28852FE41997280D77CDEC18B48
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                    • VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                    • VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                    • VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CopyVariant$ErrorLast
                                                    • String ID:
                                                    • API String ID: 2286883814-0
                                                    • Opcode ID: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                                    • Instruction ID: 2d87100fc18953c9afe9b7e879878e48daa4ef19e0256d9a4550ae3fa38499cf
                                                    • Opcode Fuzzy Hash: 5518b7b53ef3ca50261af568c513a59c65815d8cf0fffae25230fe941ba47538
                                                    • Instruction Fuzzy Hash: 5F517C751543409FC310DF69C880A9BBBE4FF88314F448A6EF9499B352DB39E909CB99
                                                    APIs
                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00474068
                                                    • WSAGetLastError.WSOCK32(00000000,00000002,00000002,00000011), ref: 00474076
                                                    • #21.WSOCK32 ref: 004740E0
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 004740EB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$socket
                                                    • String ID:
                                                    • API String ID: 1881357543-0
                                                    • Opcode ID: 34147ac461a0e284a181aa69957adffe558344c6371ca04fba36d93f3b76d486
                                                    • Instruction ID: ff1742a21ceaee7448286ece46cbaad1fa76dded649dcd1b12ff87c083dae87e
                                                    • Opcode Fuzzy Hash: 34147ac461a0e284a181aa69957adffe558344c6371ca04fba36d93f3b76d486
                                                    • Instruction Fuzzy Hash: 7641D9717403006AE720BF6ADC47F5672C89B54B18F14496EF648BF2C3D6FAA881869C
                                                    APIs
                                                    • ClientToScreen.USER32(00000000,?), ref: 00441CDE
                                                    • GetWindowRect.USER32(?,?), ref: 00441D5A
                                                    • PtInRect.USER32(?,?,?), ref: 00441D6F
                                                    • MessageBeep.USER32(00000000), ref: 00441DF2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                    • String ID:
                                                    • API String ID: 1352109105-0
                                                    • Opcode ID: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                                    • Instruction ID: 11ad13a84751b34e4f8a983c71a6a29643224e7bbeba0240db3aabd8edeb2108
                                                    • Opcode Fuzzy Hash: f335056d542ece3fcaf1afd85692f97af485635a3f9ffa8235448c3f06d12885
                                                    • Instruction Fuzzy Hash: E64192B5A042418FE710DF18D884AABB7E5FFC9311F18866FE8518B360D734AC85CBA5
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0042387E
                                                    • __isleadbyte_l.LIBCMT ref: 004238B2
                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 004238E3
                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000000,00000002,00000000), ref: 00423951
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                                    • Instruction ID: 550681b3841f0f34ee613cb5364b25607849a03987ccfca5eaaec14299199b49
                                                    • Opcode Fuzzy Hash: f131ee11c0d220cb2dc6b3da44158834730645c68ebbd2a61d5b0c3ed448205f
                                                    • Instruction Fuzzy Hash: A931C270B00265EFDB20EF64D8849AA7BF5EF01312B9445AAF0A09F291D338CE81CB55
                                                    APIs
                                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D10A
                                                    • GetLastError.KERNEL32(?,00000000), ref: 0045D12B
                                                    • DeleteFileW.KERNEL32(00000000,?), ref: 0045D14C
                                                    • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0045D16A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                    • String ID:
                                                    • API String ID: 3321077145-0
                                                    • Opcode ID: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                                    • Instruction ID: 240381fd0e223f31e6bb83dc4f900fe278965bce5f9bbaa9f824fb1079ab41c9
                                                    • Opcode Fuzzy Hash: 7cd5f2a63614e36a101d3a24e32b13d83311d412b7f68151a30e37c1c693f1dc
                                                    • Instruction Fuzzy Hash: 393180B5900301ABCB10AF71C985A1BF7E8AF84755F10891EF85497392C739FC45CB68
                                                    APIs
                                                    • GetParent.USER32(?), ref: 004505BF
                                                    • DefDlgProcW.USER32(?,00000138,?,?,004A83D8,?,004A83D8,?), ref: 00450610
                                                    • DefDlgProcW.USER32(?,00000133,?,?,004A83D8,?,004A83D8,?), ref: 0045065A
                                                    • DefDlgProcW.USER32(?,00000134,?,?,004A83D8,?,004A83D8,?), ref: 00450688
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Proc$Parent
                                                    • String ID:
                                                    • API String ID: 2351499541-0
                                                    • Opcode ID: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                                    • Instruction ID: e3e31f905615dd8bfbe674c7a91f48f64006a8638b4dc9b760805e547d05c650
                                                    • Opcode Fuzzy Hash: 93bb19dea30658450b5dada9832e261aba4ffbe4fc891123e7e77a8d6405a749
                                                    • Instruction Fuzzy Hash: 8C3128362411006BC2209B299C58DBB7B58EBC7336F14465BFA54832D3CB769826C768
                                                    APIs
                                                      • Part of subcall function 00438C85: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00438C95
                                                      • Part of subcall function 004021E0: _wcslen.LIBCMT ref: 004021F2
                                                    • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 00461420
                                                    • SendMessageW.USER32(00000000,0000102C,00000000,00000002), ref: 0046144F
                                                    • __itow.LIBCMT ref: 00461461
                                                    • __itow.LIBCMT ref: 004614AB
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$__itow$_wcslen
                                                    • String ID:
                                                    • API String ID: 2875217250-0
                                                    • Opcode ID: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                                    • Instruction ID: b65c482f8247f617b799fd724a7506577ebf884cdb52d0d4602b18db992df379
                                                    • Opcode Fuzzy Hash: 347b44770508ca88cf5981266e998b528a2978f718c0dd2978777487f2c1d3f7
                                                    • Instruction Fuzzy Hash: 3A213D7670031067D210BA169C86FAFB794EB94714F08443FFF44AB241EE69E94687EB
                                                    APIs
                                                    • _memset.LIBCMT ref: 0040E202
                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E2C7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: IconNotifyShell__memset
                                                    • String ID:
                                                    • API String ID: 928536360-0
                                                    • Opcode ID: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                                                    • Instruction ID: 9c6d99eda8392314e00a4319cd3b9f491a6d528882fc0aac3328a2d60ab56ec1
                                                    • Opcode Fuzzy Hash: a8f79553875ba5cd412c6e6f6aef719f94b94a7ff7df26053db2d04cf48d3506
                                                    • Instruction Fuzzy Hash: FC318170608701DFD320DF25D845B97BBF8BB45304F00486EE99A93380E778A958CF5A
                                                    APIs
                                                    • GetForegroundWindow.USER32 ref: 00472806
                                                      • Part of subcall function 00443EEF: GetWindowThreadProcessId.USER32(00000001,00000000), ref: 00443F11
                                                      • Part of subcall function 00443EEF: GetCurrentThreadId.KERNEL32 ref: 00443F18
                                                      • Part of subcall function 00443EEF: AttachThreadInput.USER32(00000000), ref: 00443F1F
                                                    • GetCaretPos.USER32(?), ref: 0047281A
                                                    • ClientToScreen.USER32(00000000,?), ref: 00472856
                                                    • GetForegroundWindow.USER32 ref: 0047285C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                    • String ID:
                                                    • API String ID: 2759813231-0
                                                    • Opcode ID: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                                    • Instruction ID: 38f02bd9b1f6bed34cfa7ce2d7f69328ba3456287a0ba45db7850a86b8391dd2
                                                    • Opcode Fuzzy Hash: f08c9821fa495b0e17bd1c697e1e5286648ea95901ecf1a9ceb1535147bec3ee
                                                    • Instruction Fuzzy Hash: FF2195716403056FE310EF65CC42F5BB7E8AF84708F144D2EF544AB282D6FAB9858795
                                                    APIs
                                                      • Part of subcall function 0046DD22: IsWindow.USER32(00000000), ref: 0046DD51
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0047728E
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772A9
                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004772C0
                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001,?,?), ref: 004772D0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$AttributesLayered
                                                    • String ID:
                                                    • API String ID: 2169480361-0
                                                    • Opcode ID: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                                    • Instruction ID: faea1ea985e506ac999786301d765d91882fdca708237d94abe4bce3661c65f1
                                                    • Opcode Fuzzy Hash: cf64f2ba38e7b8586118add57273b6dbf74680437e58013ae8f64db123384f26
                                                    • Instruction Fuzzy Hash: 5F11B431205510ABD310FB29DD45F9BB798FF91720F10862EF455E72E2C7A8AC45C7A8
                                                    APIs
                                                    • SendMessageW.USER32 ref: 00448CB8
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00448CE0
                                                    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448D19
                                                    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$LongWindow
                                                    • String ID:
                                                    • API String ID: 312131281-0
                                                    • Opcode ID: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                                    • Instruction ID: 9d6bf2a2f0cb0d5184a29e15ea511504db1ac53b4253ca88fa0f688086887250
                                                    • Opcode Fuzzy Hash: 75ae646de43e531ea10203f5aba75cb55710deee3f48b72b110124c921b55059
                                                    • Instruction Fuzzy Hash: B12174715053019BF3208F18D98879FB7E4FBD5325F140B2EF594962D0DBB58449C796
                                                    APIs
                                                    • select.WSOCK32 ref: 0045890A
                                                    • __WSAFDIsSet.WSOCK32(00000000,00000000), ref: 00458919
                                                    • accept.WSOCK32(00000000,00000000,00000000,00000000,00000000), ref: 00458927
                                                    • WSAGetLastError.WSOCK32(00000000), ref: 00458952
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastacceptselect
                                                    • String ID:
                                                    • API String ID: 385091864-0
                                                    • Opcode ID: 4f99be09ea3748399bcd45f1fb284b1e509608db9923cba0f0141099163bafeb
                                                    • Instruction ID: 93f38c3b8a65fd8a68e5265ae944391143789c71a4918893f245a539b4228a7d
                                                    • Opcode Fuzzy Hash: 4f99be09ea3748399bcd45f1fb284b1e509608db9923cba0f0141099163bafeb
                                                    • Instruction Fuzzy Hash: 1F2166712043019BD314EF29C842BABB7E5AFC4714F144A2EF994DB2C1DBB4A985CB99
                                                    APIs
                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00438D6F
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D82
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438D9A
                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00438DB4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                                    • Instruction ID: 707762f1bc06eebb59e9357f9c77b20c0e090dcf7cedc03b298b4f863176c0ea
                                                    • Opcode Fuzzy Hash: 265964968b448329a9940c71d90cafee1d95b27ec759889be900fe0a368f8aeb
                                                    • Instruction Fuzzy Hash: 77113AB6204305AFD210EF58DC84F6BF7E8EBE8750F20491EF580D7290D6B1A8468BA1
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,FFFFFFFF,?,?,?,?,?,?,00400000,00000000), ref: 0043367E
                                                    • GetStockObject.GDI32(00000011), ref: 00433695
                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043369F
                                                    • ShowWindow.USER32(00000000,00000000), ref: 004336BA
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateMessageObjectSendShowStock
                                                    • String ID:
                                                    • API String ID: 1358664141-0
                                                    • Opcode ID: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                                    • Instruction ID: 5bb77caae3378c1c36de35f78993aeb7f53e4fc0e9047450929301c31466c70f
                                                    • Opcode Fuzzy Hash: a78582cd8c915fd270119012ff4eddf0033f410814d91724adacf9cac7d73a6b
                                                    • Instruction Fuzzy Hash: 60114F72204A00BFD254DF55CC49F5BB3F9AFCCB01F20950DB254922A0D7B4E9418BA9
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 004441B8
                                                    • MessageBoxW.USER32(?,?,?,?), ref: 004441F6
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0044420C
                                                    • CloseHandle.KERNEL32(00000000), ref: 00444213
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                    • String ID:
                                                    • API String ID: 2880819207-0
                                                    • Opcode ID: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                                    • Instruction ID: a177bb78e812b0c83f085b16f259857c8a511f23e32e5024349264f8b0df3d09
                                                    • Opcode Fuzzy Hash: 146d2f4ba151d14deb3aa3acfdd6de045567f86e28c98b22242e1e1489ea4094
                                                    • Instruction Fuzzy Hash: C401E5364183105BD300DB28ED08A9BBBD8BFD9721F18067EF89893351E6B48948C7B6
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00434037
                                                    • ScreenToClient.USER32(?,?), ref: 0043405B
                                                    • ScreenToClient.USER32(?,?), ref: 00434085
                                                    • InvalidateRect.USER32(?,?,?), ref: 004340A4
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                    • String ID:
                                                    • API String ID: 357397906-0
                                                    • Opcode ID: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                                    • Instruction ID: 02545dd0d615a745195cb6f618e51c1f9c2552a202a2369b8695847d2ce6fb2f
                                                    • Opcode Fuzzy Hash: 751e48bbdad3fa965b56aea51b9fa4e55de6b4169d4940aca7a3583b508516de
                                                    • Instruction Fuzzy Hash: 24117EB9608302AFC304DF18D98095BBBE9FFD8650F10891EF88993350D770E9498BA2
                                                    APIs
                                                    • __wsplitpath.LIBCMT ref: 00436A45
                                                      • Part of subcall function 00413DB0: __wsplitpath_helper.LIBCMT ref: 00413DF2
                                                    • __wsplitpath.LIBCMT ref: 00436A6C
                                                    • __wcsicoll.LIBCMT ref: 00436A93
                                                    • __wcsicoll.LIBCMT ref: 00436AB0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                                    • String ID:
                                                    • API String ID: 1187119602-0
                                                    • Opcode ID: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                                    • Instruction ID: cc447ddabc085245cf6c6bda96777749177fc915bba42f20b5b260b799017f3a
                                                    • Opcode Fuzzy Hash: 5b78189461bd351535feab14c2aa3b28919a840a222a6c91b90152b853837e7b
                                                    • Instruction Fuzzy Hash: 690165B64043416BD724EB50D881EEBB3ED7BD8304F04C91EB5C982041FB38D24C87A6
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_malloc_wcscat_wcscpy
                                                    • String ID:
                                                    • API String ID: 1597257046-0
                                                    • Opcode ID: 6b0dcf7875e5cc8b2f124becf3425b1e3567ced601fe1f13ac9ef2b9b8e14b5c
                                                    • Instruction ID: 9df5ee2dcc5f1a759a9cde70f7b42babd8a8bdcc369222b22224423102f690bd
                                                    • Opcode Fuzzy Hash: 6b0dcf7875e5cc8b2f124becf3425b1e3567ced601fe1f13ac9ef2b9b8e14b5c
                                                    • Instruction Fuzzy Hash: BFF06D32200200AFC314EB66C885E6BB3EAEBC5324F04852EF556C7791DB39F841C764
                                                    APIs
                                                    • DeleteObject.GDI32(?), ref: 0045564E
                                                    • DeleteObject.GDI32(?), ref: 0045565C
                                                    • DestroyIcon.USER32(?,?,?,?,?), ref: 0045566A
                                                    • DestroyWindow.USER32(?,?,?,?,?), ref: 00455678
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: DeleteDestroyObject$IconWindow
                                                    • String ID:
                                                    • API String ID: 3349847261-0
                                                    • Opcode ID: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                                    • Instruction ID: 3a9029eb8e47786e7dec82746d504bb216afab776d143f23dce7b1a7602128e4
                                                    • Opcode Fuzzy Hash: 3ca9d014447a04aedc0dfd8276f5a6e9fbff97cfd7386ed498fa31ba53dce0fe
                                                    • Instruction Fuzzy Hash: 06F03C702006419BDB20AF65DDD8A2B77ACEF45322740456AFD04D7242DB28DC498B7D
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(?), ref: 0044B60B
                                                    • InterlockedExchange.KERNEL32(?,?), ref: 0044B619
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B630
                                                    • LeaveCriticalSection.KERNEL32(?), ref: 0044B641
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                                    • String ID:
                                                    • API String ID: 2223660684-0
                                                    • Opcode ID: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                                    • Instruction ID: 8f2921e390180aa9c6083979f061463a0462abb68b72a76a452ff5fd2bc04521
                                                    • Opcode Fuzzy Hash: ff66e887f7cbb15f4500d5b6eb7e85b0bae77af45fe5867796c74117f3ed7197
                                                    • Instruction Fuzzy Hash: 35F08C362422019F82249B59EA488DBB3FDEBE97213009C2FE142C32108BB5F806CB75
                                                    APIs
                                                      • Part of subcall function 0044710F: DeleteObject.GDI32(00000000), ref: 00447151
                                                      • Part of subcall function 0044710F: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,00000000,?,?,?), ref: 00447195
                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471A2
                                                      • Part of subcall function 0044710F: BeginPath.GDI32(?), ref: 004471B7
                                                      • Part of subcall function 0044710F: SelectObject.GDI32(?,00000000), ref: 004471DC
                                                    • MoveToEx.GDI32(?,?,00000000,00000000), ref: 0044728F
                                                    • LineTo.GDI32(?,00000000,00000002), ref: 004472A0
                                                    • EndPath.GDI32(?), ref: 004472B0
                                                    • StrokePath.GDI32(?), ref: 004472BE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                    • String ID:
                                                    • API String ID: 2783949968-0
                                                    • Opcode ID: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                                    • Instruction ID: 15f667079dd022c0076d5117e5ffb33549464faf874781034dcdd6a9c0a79bb3
                                                    • Opcode Fuzzy Hash: 09270453bc364e96d12f6c3f9be453f1264e71f62e0889bc66601f12e66ee767
                                                    • Instruction Fuzzy Hash: 46F09030109361BFE211DB10DC0AF9F3B98AB46310F10490CF641622D2C7B46845C7BA
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00417D1A
                                                      • Part of subcall function 00416C72: __getptd_noexit.LIBCMT ref: 00416C75
                                                      • Part of subcall function 00416C72: __amsg_exit.LIBCMT ref: 00416C82
                                                    • __getptd.LIBCMT ref: 00417D31
                                                    • __amsg_exit.LIBCMT ref: 00417D3F
                                                    • __lock.LIBCMT ref: 00417D4F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                    • String ID:
                                                    • API String ID: 3521780317-0
                                                    • Opcode ID: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                                    • Instruction ID: 784cd6646040312d8c3929352b57c791f513dbd9ce30c249d09a92555f0e5bc7
                                                    • Opcode Fuzzy Hash: 6e88b35b2b81098ca19d257f076875e832caf49443e3c23eeee739354b537ff9
                                                    • Instruction Fuzzy Hash: D4F06D319447089AD720FB66E4067EA32B0AF01728F11856FA4415B7D2DB3C99C08B9E
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00471144
                                                    • GetDC.USER32(00000000), ref: 0047114D
                                                    • GetDeviceCaps.GDI32(00000000,00000074), ref: 0047115A
                                                    • ReleaseDC.USER32(00000000,?), ref: 0047117B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                                    • Instruction ID: a1da8b046b56c0024f4e51319ca7c868ce9b42ab557c4db2e47d6af70bf9fcef
                                                    • Opcode Fuzzy Hash: 949280357db84fa49407f8095e759b2e277f1c53a9819964645a6bf04a6d26c7
                                                    • Instruction Fuzzy Hash: 75F05E759042009FC310DF65DC4856EBBA4FB94351F108C3EFD05D2251DB7889059B99
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00471102
                                                    • GetDC.USER32(00000000), ref: 0047110B
                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00471118
                                                    • ReleaseDC.USER32(00000000,?), ref: 00471139
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                    • String ID:
                                                    • API String ID: 2889604237-0
                                                    • Opcode ID: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                                    • Instruction ID: 5204c471e266b2ed5cdb435334cd6f206910ee07043e0bb223494c3f632f6575
                                                    • Opcode Fuzzy Hash: 179ddf2500a9669b2282ba4880ad99879b6dd87bde84ab61e923a9eee80713d7
                                                    • Instruction Fuzzy Hash: 78F05E759042009FD310EF65DC5896EBBA4FB94351F104C3EFC05D2251DB7489059B99
                                                    APIs
                                                    • SendMessageTimeoutW.USER32(00000001,00000000,00000000,00000000,00000002,00001388,004848E8), ref: 004389C0
                                                    • GetWindowThreadProcessId.USER32(00000001,00000000), ref: 004389D3
                                                    • GetCurrentThreadId.KERNEL32 ref: 004389DA
                                                    • AttachThreadInput.USER32(00000000), ref: 004389E1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                    • String ID:
                                                    • API String ID: 2710830443-0
                                                    • Opcode ID: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                                    • Instruction ID: 438da6915ae72ab6a15f098678a9856147cbf2dc0a85cf0a700465948addd5b0
                                                    • Opcode Fuzzy Hash: fc668e8f88677791c9032932ff1b39d21009c78d2dca35edbf1b20bb29ea35ff
                                                    • Instruction Fuzzy Hash: 14E012712853107BE72157509D0EFAF7B98AF18B11F14481EB241B50D0DAF8A941876E
                                                    APIs
                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004390CD
                                                    • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 004390DB
                                                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390EB
                                                    • CloseHandle.KERNEL32(?,?,000000FF), ref: 004390F0
                                                      • Part of subcall function 00438FB6: GetProcessHeap.KERNEL32(00000000,?,00439504,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00438FC1
                                                      • Part of subcall function 00438FB6: HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00438FC8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                    • String ID:
                                                    • API String ID: 146765662-0
                                                    • Opcode ID: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                                    • Instruction ID: e19b07cb6d87eea3d85dfea562759309df1919ba68b29a0146d7a5ec0ea3c710
                                                    • Opcode Fuzzy Hash: 7cdfdd2e005e28f5438e9d3b399fcd684928161159dd652c77b09849c549b5d2
                                                    • Instruction Fuzzy Hash: 5DE0C976504311ABC620EB65DC48C4BB7E9EF883303114E1DF89693260CA74E881CB65
                                                    APIs
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00414070
                                                      • Part of subcall function 00418540: __FindPESection.LIBCMT ref: 0041859B
                                                    • __getptd_noexit.LIBCMT ref: 00414080
                                                    • __freeptd.LIBCMT ref: 0041408A
                                                    • ExitThread.KERNEL32 ref: 00414093
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                                    • String ID:
                                                    • API String ID: 3182216644-0
                                                    • Opcode ID: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                                    • Instruction ID: 8c1b811a677bc0208766d104aadce1409d27245c16b3af4a320e27a455eae914
                                                    • Opcode Fuzzy Hash: 18f79961a183a005566c851b5a75566c8a37b9a59448809cc1b4ea10e33ea091
                                                    • Instruction Fuzzy Hash: F8D0EC7051024256D6207BA7ED097AA3A589B44B26B15446EA905801B1DF68D9C1862D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: BuffCharLower
                                                    • String ID: $8'I
                                                    • API String ID: 2358735015-3608026889
                                                    • Opcode ID: e3039598ad07eb1683e22d1e13845cc1c6bfaba1fe80df618d976ecbdfba683b
                                                    • Instruction ID: 1bf34105e022c250dd7240f1ea7ec4803edb57b208c13e69c3fb06210d7c4844
                                                    • Opcode Fuzzy Hash: e3039598ad07eb1683e22d1e13845cc1c6bfaba1fe80df618d976ecbdfba683b
                                                    • Instruction Fuzzy Hash: 9FE1AE745043018BCB24EF16D88166BB7E4BF94348F40482FF88597292EB79DD89CB9B
                                                    APIs
                                                    • OleSetContainedObject.OLE32(00000000,00000001), ref: 0047857A
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                      • Part of subcall function 00445513: OleSetContainedObject.OLE32(?,00000000), ref: 00445593
                                                      • Part of subcall function 004781AE: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000001,00000000,NULL Pointer assignment,00000001), ref: 00478201
                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(?,?), ref: 00478259
                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000058,?), ref: 00478270
                                                      • Part of subcall function 004781AE: VariantCopy.OLEAUT32(-00000078,?), ref: 00478287
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: CopyVariant$ContainedObject$ErrorLast_malloc
                                                    • String ID: AutoIt3GUI$Container
                                                    • API String ID: 3380330463-3941886329
                                                    • Opcode ID: a9ff7069b9b8d6ccd49eba872ad7efd2467de888f1098c4430e935d21ee713db
                                                    • Instruction ID: 8a51a4197b359b89da059ec4b883cd23719ad159cb4f439b8c2c8f5fea4c1b32
                                                    • Opcode Fuzzy Hash: a9ff7069b9b8d6ccd49eba872ad7efd2467de888f1098c4430e935d21ee713db
                                                    • Instruction Fuzzy Hash: FEA16A71240601AFC760EF69C880A6BB7E9FB88304F10892EF649CB361EB75E945CB55
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00409A61
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                      • Part of subcall function 0041171A: std::bad_alloc::bad_alloc.LIBCMT ref: 00411757
                                                      • Part of subcall function 0041171A: std::bad_exception::bad_exception.LIBCMT ref: 0041176B
                                                      • Part of subcall function 0041171A: __CxxThrowException@8.LIBCMT ref: 00411779
                                                    • CharUpperBuffW.USER32(?,?), ref: 00409AF5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: BuffCharException@8ThrowUpper_malloc_wcslenstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
                                                    • String ID: 0vH
                                                    • API String ID: 1143807570-3662162768
                                                    • Opcode ID: c09e7a550d587b66afd16ae3f9308ee528eb86d4dd4285a1c93ad52bd0ffcd86
                                                    • Instruction ID: 5e67718e4417cbef977f4cc7974cb0b4b39b480e5382bb1977b3cac956c07efc
                                                    • Opcode Fuzzy Hash: c09e7a550d587b66afd16ae3f9308ee528eb86d4dd4285a1c93ad52bd0ffcd86
                                                    • Instruction Fuzzy Hash: 53515BB1A083009FC718CF18C48065BB7E1FF88314F54856EF9999B391D779E942CB96
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: HH$HH
                                                    • API String ID: 0-1787419579
                                                    • Opcode ID: fed4e066af51e45fc8c5976399addcc25001bc25a5639efd16b547c1275b717f
                                                    • Instruction ID: b2aab3850ea6996be17d3b26b1a0d96f4757dd5de2ef7d298d9c2790e2b3b10f
                                                    • Opcode Fuzzy Hash: fed4e066af51e45fc8c5976399addcc25001bc25a5639efd16b547c1275b717f
                                                    • Instruction Fuzzy Hash: 1241BF367042009FC310EF69E881F5AF3A1EF99314F548A6EFA589B381D776E811CB95
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: InfoItemMenu_memset
                                                    • String ID: 0
                                                    • API String ID: 2223754486-4108050209
                                                    • Opcode ID: 4788cf6f182db8212a4dd4ca04636ab1929000af0f3277abda7ed9995d735732
                                                    • Instruction ID: 143d79469fb3e570aa9bb1e7a79db7ad77638f8ab3c2e89d41e08a42c99b444e
                                                    • Opcode Fuzzy Hash: 4788cf6f182db8212a4dd4ca04636ab1929000af0f3277abda7ed9995d735732
                                                    • Instruction Fuzzy Hash: CB3101721043009BF3249F18DC85BABBBE4EBC6310F14081FFA90C62A0E379D949C75A
                                                    APIs
                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 0044846C
                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044847E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: '
                                                    • API String ID: 3850602802-1997036262
                                                    • Opcode ID: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                                    • Instruction ID: cecdca06d5aa7ecc7109d5e1ff25192cbd540bafe2d1ef24ff7c1b98f096cb5f
                                                    • Opcode Fuzzy Hash: 40c115dbe3bb232f42185e8835a3c48b8da925c0788aed463fb6e16a301179a8
                                                    • Instruction Fuzzy Hash: 984179706083459FE710CF18C880BABB7E1FB89700F54882EF9888B351DB75A841CF5A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 0
                                                    • API String ID: 0-4108050209
                                                    • Opcode ID: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                                    • Instruction ID: 268d240ecd79f719a1425e83c09d650ed443e1bf0ac8ef4f8d51517adc50c1d2
                                                    • Opcode Fuzzy Hash: b6c602b1dd263d2c99a5ec9127bd928e029cd45f71d746a48c0c49a5726287e2
                                                    • Instruction Fuzzy Hash: B6210D765042206BEB15DF08D844B97B7A4FBDA310F44492BEE9897250D379E848C7AA
                                                    APIs
                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00451305
                                                    • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00451313
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Combobox
                                                    • API String ID: 3850602802-2096851135
                                                    • Opcode ID: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                                    • Instruction ID: f266216a818347eeb58d59163185d0479ace604409515c443b0f4894c7ad90f2
                                                    • Opcode Fuzzy Hash: 0499e5d8541f4f9e55005c4c3969ca7e279e19a534152943b96dd4c6f47caa3c
                                                    • Instruction Fuzzy Hash: D9110A72A0430067E6109AA4DC80F5BB3D8EB99735F10071BFA24E72E1D774FC448768
                                                    APIs
                                                    • GetWindowTextLengthW.USER32(00000000), ref: 004515DA
                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004515EA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: LengthMessageSendTextWindow
                                                    • String ID: edit
                                                    • API String ID: 2978978980-2167791130
                                                    • Opcode ID: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                                    • Instruction ID: b80de1f22085cd2d24dcce0fe83431d10f7d2aff66e66183492c5b70af3c9e13
                                                    • Opcode Fuzzy Hash: 255065f22875c24af3de74cb0bd99753dbe1335258aa39c92c973eb9156a9169
                                                    • Instruction Fuzzy Hash: 2011E4716003006BD6109A64D884F6BB3DCEBD8335F104B1EFA61D32E1D779EC458729
                                                    APIs
                                                    • Sleep.KERNEL32(00000000), ref: 00474833
                                                    • GlobalMemoryStatusEx.KERNEL32 ref: 00474846
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemorySleepStatus
                                                    • String ID: @
                                                    • API String ID: 2783356886-2766056989
                                                    • Opcode ID: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                                    • Instruction ID: 41c327e25453105c4ca6c880754d33c67e761007402a238c65fd2e715fefe222
                                                    • Opcode Fuzzy Hash: 6b539aa5d60aaa410447b6e5f9627e9a7b549f395ce9a021d490b3e8c5b2361e
                                                    • Instruction Fuzzy Hash: 4421C230929A14B7C2107F6ABD4BB5E7BB8AF44716F008C5DF5C562094DF785268836F
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: htonsinet_addr
                                                    • String ID: 255.255.255.255
                                                    • API String ID: 3832099526-2422070025
                                                    • Opcode ID: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                                    • Instruction ID: e3b5e028fda38c0aed97ec3d425ece65e45bc088e5f3683a6f0e3ee8de0e9224
                                                    • Opcode Fuzzy Hash: 8f81358a7508e033a1ccca041802c5cf6ea433113977ffec7d790c03bda6a3ba
                                                    • Instruction Fuzzy Hash: 6F11253620030057DA10EB69C882F9BB394EFC4728F00896BFA105B283D679F45A832E
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469547
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 455545452-1403004172
                                                    • Opcode ID: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                                    • Instruction ID: d7878a024921556205560296ec06e6abf53b779169672b4943ab7ad66f70e2c7
                                                    • Opcode Fuzzy Hash: 19b239a33d6ccea3c1be09f9a3ff48f3ef4fb117e78275193105084191351ab7
                                                    • Instruction Fuzzy Hash: 2601D6327011106B8600BB299C019AFB39DDBC2370F544A2FF965573D1EA39AC0E476A
                                                    APIs
                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00442B8C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: InternetOpen
                                                    • String ID: <local>
                                                    • API String ID: 2038078732-4266983199
                                                    • Opcode ID: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                                    • Instruction ID: 525aca290fb55aeb65c4bf55ca0deee88c9418ef2a1db54778758d1eb2e06c8a
                                                    • Opcode Fuzzy Hash: 6ab628e9b643b7f337e7eb9a1eb164a667740d16f62f34970bb7649561c47b18
                                                    • Instruction Fuzzy Hash: 9011A934144751AAF621DF108D86FB77794FB50B01F50480FF9866B2C0D6F4B848C766
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • SendMessageW.USER32(00000000,00000180,00000000,00000000), ref: 00469660
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 455545452-1403004172
                                                    • Opcode ID: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                                    • Instruction ID: 486d2595d5a7427da4a9c048e684990a8dc9cac685a8154682435d05c4426571
                                                    • Opcode Fuzzy Hash: 9c387d355752c609e3ec3b71bdfa1ce54c6356e755a59a855018ee08606d8eab
                                                    • Instruction Fuzzy Hash: A101D87274121027C600BA259C01AEBB39CEB96354F04443BF94597291EA6DED0E43AA
                                                    APIs
                                                      • Part of subcall function 00401B70: _wcslen.LIBCMT ref: 00401B71
                                                    • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 004695D6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_wcslen
                                                    • String ID: ComboBox$ListBox
                                                    • API String ID: 455545452-1403004172
                                                    • Opcode ID: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                                    • Instruction ID: 72d13aeac174e9c1a3a177398698555a642000804846b33da1492f44d6438514
                                                    • Opcode Fuzzy Hash: ebc0188a5584a95c85a0cdadc4297c14a5cc600b4744d97cee4f9a5f6612b8f9
                                                    • Instruction Fuzzy Hash: 4D01A77374111067C610BA6A9C01AEB739CABD2364F44443BF94597292EA7DED0E43AA
                                                    APIs
                                                    • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560BA
                                                      • Part of subcall function 0041171A: _malloc.LIBCMT ref: 00411734
                                                    • wsprintfW.USER32 ref: 004560E9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: MessageSend_mallocwsprintf
                                                    • String ID: %d/%02d/%02d
                                                    • API String ID: 1262938277-328681919
                                                    • Opcode ID: dc5fd9a877cd0fc352ed6de9b5f97ee6fb2dcbb154e3a48ad4a1e49fbb654ae8
                                                    • Instruction ID: 2a73c44ac592e0fe880a68d863bd42ca8887a008949f121bccc13d44bcf2ebb3
                                                    • Opcode Fuzzy Hash: dc5fd9a877cd0fc352ed6de9b5f97ee6fb2dcbb154e3a48ad4a1e49fbb654ae8
                                                    • Instruction Fuzzy Hash: 13F08272744220A7E2105BA5AC01BBFB3D4EB84762F10443BFE44D12C0E66E8455D7BA
                                                    APIs
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0044226C
                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0044227F
                                                      • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: FindMessagePostSleepWindow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 529655941-2988720461
                                                    • Opcode ID: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                                    • Instruction ID: f0ed9326d30a696a9ade51716a531e8bd1705000bbe21894ac7a57cb5589152b
                                                    • Opcode Fuzzy Hash: 62d1e1a02585172d548c808ed695c1d9d3028cc69dace886715b1b3d1423c17e
                                                    • Instruction Fuzzy Hash: 71D0A772F8130177E92077706D0FFCB26246F14710F010C3AB305AA1C0D4E8D440C358
                                                    APIs
                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00442240
                                                    • PostMessageW.USER32(00000000), ref: 00442247
                                                      • Part of subcall function 00436272: Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,0044269D,0000000A), ref: 00436287
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: FindMessagePostSleepWindow
                                                    • String ID: Shell_TrayWnd
                                                    • API String ID: 529655941-2988720461
                                                    • Opcode ID: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                                    • Instruction ID: d1e5b9be119239975405e397b0c0efdc35250005003305bf123d4268f2ecb06f
                                                    • Opcode Fuzzy Hash: d3682f88803cb2a3efb7847c83fab5a73234bf1983908037f6894d5424c159e3
                                                    • Instruction Fuzzy Hash: 4DD05E72B813013BE92076706D0FF8B26246B14710F010C2AB205AA1C0D4E8A4408358
                                                    APIs
                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00439522
                                                      • Part of subcall function 00411A1F: _doexit.LIBCMT ref: 00411A2B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1696468624.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.1696366869.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696543398.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696576072.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.1696614614.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_FSRHC6mB16.jbxd
                                                    Similarity
                                                    • API ID: Message_doexit
                                                    • String ID: AutoIt$Error allocating memory.
                                                    • API String ID: 1993061046-4017498283
                                                    • Opcode ID: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                                    • Instruction ID: 5d68346425d2699d55792fe39b85c2381918ba1f955abba655776c5540820644
                                                    • Opcode Fuzzy Hash: 98c4a6cf209f69c689245cd57ea7e643062e7ce984d6ae84015e6f4dd77dfbd0
                                                    • Instruction Fuzzy Hash: 82B092343C038627E20437A01C0BF8C28049B64F42F220C2AB308384D259D90080231E