Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4iDzhJBJVv.exe

Overview

General Information

Sample name:4iDzhJBJVv.exe
renamed because original name is a hash value
Original sample name:937165f6ec620fd90744f5d180ffdaac029bda7ced16debce856dba23aa60728.exe
Analysis ID:1587643
MD5:ca73a7be6faac5bb95edd742b6648914
SHA1:f49d9442c3608a5f58ce93614f5c81aff19afb2d
SHA256:937165f6ec620fd90744f5d180ffdaac029bda7ced16debce856dba23aa60728
Tags:exeuser-adrian__luca
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Writes to foreign memory regions
Yara detected Generic Downloader
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 4iDzhJBJVv.exe (PID: 5372 cmdline: "C:\Users\user\Desktop\4iDzhJBJVv.exe" MD5: CA73A7BE6FAAC5BB95EDD742B6648914)
    • RegSvcs.exe (PID: 7236 cmdline: "C:\Users\user\Desktop\4iDzhJBJVv.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • cmd.exe (PID: 7460 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 7540 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8171365907:AAFhWO_13bnElnPqwo1PSMXeHNO4L26rV00/sendMessage?chat_id=7361435574", "Token": "8171365907:AAFhWO_13bnElnPqwo1PSMXeHNO4L26rV00", "Chat_id": "7361435574", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x1486d:$a1: get_encryptedPassword
      • 0x14b59:$a2: get_encryptedUsername
      • 0x14679:$a3: get_timePasswordChanged
      • 0x14774:$a4: get_passwordField
      • 0x14883:$a5: set_encryptedPassword
      • 0x15f19:$a7: get_logins
      • 0x15e7c:$a10: KeyLoggerEventArgs
      • 0x15ae7:$a11: KeyLoggerEventArgsEventHandler
      00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x19800:$x1: $%SMTPDV$
      • 0x181e4:$x2: $#TheHashHere%&
      • 0x197a8:$x3: %FTPDV$
      • 0x18184:$x4: $%TelegramDv$
      • 0x15ae7:$x5: KeyLoggerEventArgs
      • 0x15e7c:$x5: KeyLoggerEventArgs
      • 0x197cc:$m2: Clipboard Logs ID
      • 0x19a0a:$m2: Screenshot Logs ID
      • 0x19b1a:$m2: keystroke Logs ID
      • 0x19df4:$m3: SnakePW
      • 0x199e2:$m4: \SnakeKeylogger\
      00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x14a6d:$a1: get_encryptedPassword
              • 0x14d59:$a2: get_encryptedUsername
              • 0x14879:$a3: get_timePasswordChanged
              • 0x14974:$a4: get_passwordField
              • 0x14a83:$a5: set_encryptedPassword
              • 0x16119:$a7: get_logins
              • 0x1607c:$a10: KeyLoggerEventArgs
              • 0x15ce7:$a11: KeyLoggerEventArgsEventHandler
              3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x1c3b6:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x1b5e8:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x1ba1b:$a4: \Orbitum\User Data\Default\Login Data
              • 0x1ca5a:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 15 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-10T16:17:45.599134+010028033053Unknown Traffic192.168.2.749719104.21.96.1443TCP
              2025-01-10T16:17:46.880249+010028033053Unknown Traffic192.168.2.749726104.21.96.1443TCP
              2025-01-10T16:17:48.168437+010028033053Unknown Traffic192.168.2.749738104.21.96.1443TCP
              2025-01-10T16:17:50.735570+010028033053Unknown Traffic192.168.2.749756104.21.96.1443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-10T16:17:43.815492+010028032742Potentially Bad Traffic192.168.2.749702193.122.6.16880TCP
              2025-01-10T16:17:45.110687+010028032742Potentially Bad Traffic192.168.2.749702193.122.6.16880TCP
              2025-01-10T16:17:46.329430+010028032742Potentially Bad Traffic192.168.2.749720193.122.6.16880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8171365907:AAFhWO_13bnElnPqwo1PSMXeHNO4L26rV00/sendMessage?chat_id=7361435574", "Token": "8171365907:AAFhWO_13bnElnPqwo1PSMXeHNO4L26rV00", "Chat_id": "7361435574", "Version": "5.1"}
              Source: 4iDzhJBJVv.exeVirustotal: Detection: 47%Perma Link
              Source: 4iDzhJBJVv.exeReversingLabs: Detection: 73%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 4iDzhJBJVv.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: 4iDzhJBJVv.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.7:49708 version: TLS 1.0
              Source: Binary string: wntdll.pdbUGP source: 4iDzhJBJVv.exe, 00000003.00000003.1313739907.0000000003AE0000.00000004.00001000.00020000.00000000.sdmp, 4iDzhJBJVv.exe, 00000003.00000003.1311569612.0000000003910000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: 4iDzhJBJVv.exe, 00000003.00000003.1313739907.0000000003AE0000.00000004.00001000.00020000.00000000.sdmp, 4iDzhJBJVv.exe, 00000003.00000003.1311569612.0000000003910000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,3_2_00E0DBBE
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DDC2A2 FindFirstFileExW,3_2_00DDC2A2
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E168EE FindFirstFileW,FindClose,3_2_00E168EE
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,3_2_00E1698F
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00E0D076
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00E0D3A9
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00E19642
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00E1979D
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,3_2_00E19B2B
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E15C97 FindFirstFileW,FindNextFileW,FindClose,3_2_00E15C97

              Networking

              barindex
              Source: Yara matchFile source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
              Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49702 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49720 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49726 -> 104.21.96.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49719 -> 104.21.96.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49738 -> 104.21.96.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49756 -> 104.21.96.1:443
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.7:49708 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E1CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,3_2_00E1CE44
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RegSvcs.exe, 00000008.00000002.1428473072.0000000002B9A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BB6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000008.00000002.1428473072.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BB6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000008.00000002.1428473072.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: 4iDzhJBJVv.exe, 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000008.00000002.1428473072.0000000002B9A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BB6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B12000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000008.00000002.1428473072.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000008.00000002.1428473072.0000000002B9A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BB6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: 4iDzhJBJVv.exe, 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002AFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
              Source: RegSvcs.exe, 00000008.00000002.1428473072.0000000002B9A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BB6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
              Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
              Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
              Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
              Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
              Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,3_2_00E1EAFF
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E1ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,3_2_00E1ED6A
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,3_2_00E1EAFF
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E0AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,3_2_00E0AA57
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E39576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,3_2_00E39576

              System Summary

              barindex
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: 4iDzhJBJVv.exe PID: 5372, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: 4iDzhJBJVv.exe PID: 5372, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: RegSvcs.exe PID: 7236, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 7236, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 4iDzhJBJVv.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: 4iDzhJBJVv.exe, 00000003.00000000.1268545569.0000000000E62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e58fcc60-0
              Source: 4iDzhJBJVv.exe, 00000003.00000000.1268545569.0000000000E62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_55869889-3
              Source: 4iDzhJBJVv.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c7400b43-3
              Source: 4iDzhJBJVv.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a7fb0af7-2
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E0D5EB: CreateFileW,DeviceIoControl,CloseHandle,3_2_00E0D5EB
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,3_2_00E01201
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E0E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,3_2_00E0E8F6
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DABF403_2_00DABF40
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E120463_2_00E12046
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DA80603_2_00DA8060
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E082983_2_00E08298
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DDE4FF3_2_00DDE4FF
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DD676B3_2_00DD676B
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E348733_2_00E34873
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DACAF03_2_00DACAF0
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DCCAA03_2_00DCCAA0
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DBCC393_2_00DBCC39
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DD6DD93_2_00DD6DD9
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DA91C03_2_00DA91C0
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DBB1193_2_00DBB119
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC13943_2_00DC1394
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC17063_2_00DC1706
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC781B3_2_00DC781B
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC19B03_2_00DC19B0
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DB997D3_2_00DB997D
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DA79203_2_00DA7920
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC7A4A3_2_00DC7A4A
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC7CA73_2_00DC7CA7
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC1C773_2_00DC1C77
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DD9EEE3_2_00DD9EEE
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E2BE443_2_00E2BE44
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC1F323_2_00DC1F32
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_0144AF603_2_0144AF60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EFC1908_2_00EFC190
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EFB3288_2_00EFB328
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EFC4708_2_00EFC470
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EFC7538_2_00EFC753
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EF67308_2_00EF6730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EF98588_2_00EF9858
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EF4AD98_2_00EF4AD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EFCA338_2_00EFCA33
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EFBEB08_2_00EFBEB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EFB4F38_2_00EFB4F3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00EF35738_2_00EF3573
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: String function: 00DC0A30 appears 46 times
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: String function: 00DBF9F2 appears 40 times
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: String function: 00DA9CB3 appears 31 times
              Source: 4iDzhJBJVv.exe, 00000003.00000003.1313739907.0000000003C0D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 4iDzhJBJVv.exe
              Source: 4iDzhJBJVv.exe, 00000003.00000003.1313566526.0000000003A63000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 4iDzhJBJVv.exe
              Source: 4iDzhJBJVv.exe, 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs 4iDzhJBJVv.exe
              Source: 4iDzhJBJVv.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: 4iDzhJBJVv.exe PID: 5372, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: 4iDzhJBJVv.exe PID: 5372, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: RegSvcs.exe PID: 7236, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 7236, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: classification engineClassification label: mal100.troj.evad.winEXE@8/3@2/2
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E137B5 GetLastError,FormatMessageW,3_2_00E137B5
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E010BF AdjustTokenPrivileges,CloseHandle,3_2_00E010BF
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E016C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,3_2_00E016C3
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E151CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,3_2_00E151CD
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E2A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,3_2_00E2A67C
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E1648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,3_2_00E1648E
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DA42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,3_2_00DA42A2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.logJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7476:120:WilError_03
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeFile created: C:\Users\user~1\AppData\Local\Temp\aut6AE6.tmpJump to behavior
              Source: 4iDzhJBJVv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 4iDzhJBJVv.exeVirustotal: Detection: 47%
              Source: 4iDzhJBJVv.exeReversingLabs: Detection: 73%
              Source: unknownProcess created: C:\Users\user\Desktop\4iDzhJBJVv.exe "C:\Users\user\Desktop\4iDzhJBJVv.exe"
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\4iDzhJBJVv.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\4iDzhJBJVv.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
              Source: 4iDzhJBJVv.exeStatic file information: File size 1060352 > 1048576
              Source: 4iDzhJBJVv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: 4iDzhJBJVv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: 4iDzhJBJVv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: 4iDzhJBJVv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: 4iDzhJBJVv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: 4iDzhJBJVv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: 4iDzhJBJVv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: 4iDzhJBJVv.exe, 00000003.00000003.1313739907.0000000003AE0000.00000004.00001000.00020000.00000000.sdmp, 4iDzhJBJVv.exe, 00000003.00000003.1311569612.0000000003910000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: 4iDzhJBJVv.exe, 00000003.00000003.1313739907.0000000003AE0000.00000004.00001000.00020000.00000000.sdmp, 4iDzhJBJVv.exe, 00000003.00000003.1311569612.0000000003910000.00000004.00001000.00020000.00000000.sdmp
              Source: 4iDzhJBJVv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: 4iDzhJBJVv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: 4iDzhJBJVv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: 4iDzhJBJVv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: 4iDzhJBJVv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,3_2_00DA42DE
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC0A76 push ecx; ret 3_2_00DC0A89
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DBF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,3_2_00DBF98E
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E31C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,3_2_00E31C41
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_3-98879
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeAPI/Special instruction interceptor: Address: 144AB84
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599124Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599002Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598357Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598232Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598114Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597919Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597568Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597443Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597312Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597203Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597093Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596982Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596324Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595452Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595123Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594995Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594882Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594605Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594412Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594153Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594044Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593718Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593499Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7101Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2725Jump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeAPI coverage: 3.9 %
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,3_2_00E0DBBE
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DDC2A2 FindFirstFileExW,3_2_00DDC2A2
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E168EE FindFirstFileW,FindClose,3_2_00E168EE
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,3_2_00E1698F
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00E0D076
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00E0D3A9
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00E19642
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_00E1979D
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,3_2_00E19B2B
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E15C97 FindFirstFileW,FindNextFileW,FindClose,3_2_00E15C97
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,3_2_00DA42DE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599124Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599002Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598357Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598232Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598114Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597919Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597568Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597443Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597312Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597203Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597093Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596982Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596656Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596324Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595452Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595123Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594995Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594882Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594605Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594412Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594153Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594044Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593718Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593499Jump to behavior
              Source: RegSvcs.exe, 00000008.00000002.1427138463.0000000000A87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllam
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E1EAA2 BlockInput,3_2_00E1EAA2
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DD2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00DD2622
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,3_2_00DA42DE
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC4CE8 mov eax, dword ptr fs:[00000030h]3_2_00DC4CE8
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_0144ADF0 mov eax, dword ptr fs:[00000030h]3_2_0144ADF0
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_0144AE50 mov eax, dword ptr fs:[00000030h]3_2_0144AE50
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_014497B0 mov eax, dword ptr fs:[00000030h]3_2_014497B0
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_00E00B62
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DD2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00DD2622
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00DC083F
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC09D5 SetUnhandledExceptionFilter,3_2_00DC09D5
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00DC0C21
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7D0008Jump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,3_2_00E01201
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DE2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,3_2_00DE2BA5
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E0B226 SendInput,keybd_event,3_2_00E0B226
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E222DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,3_2_00E222DA
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\4iDzhJBJVv.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_00E00B62
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E01663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,3_2_00E01663
              Source: 4iDzhJBJVv.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: 4iDzhJBJVv.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DC0698 cpuid 3_2_00DC0698
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E18195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,3_2_00E18195
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DFD27A GetUserNameW,3_2_00DFD27A
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DDB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,3_2_00DDB952
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00DA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,3_2_00DA42DE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1428473072.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 4iDzhJBJVv.exe PID: 5372, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7236, type: MEMORYSTR
              Source: 4iDzhJBJVv.exeBinary or memory string: WIN_81
              Source: 4iDzhJBJVv.exeBinary or memory string: WIN_XP
              Source: 4iDzhJBJVv.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
              Source: 4iDzhJBJVv.exeBinary or memory string: WIN_XPe
              Source: 4iDzhJBJVv.exeBinary or memory string: WIN_VISTA
              Source: 4iDzhJBJVv.exeBinary or memory string: WIN_7
              Source: 4iDzhJBJVv.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 4iDzhJBJVv.exe PID: 5372, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7236, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 3.2.4iDzhJBJVv.exe.bb0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.4iDzhJBJVv.exe.bb0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.1428473072.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 4iDzhJBJVv.exe PID: 5372, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7236, type: MEMORYSTR
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E21204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,3_2_00E21204
              Source: C:\Users\user\Desktop\4iDzhJBJVv.exeCode function: 3_2_00E21806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,3_2_00E21806
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              1
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              21
              Input Capture
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol21
              Input Capture
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              2
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS126
              System Information Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              Masquerading
              LSA Secrets221
              Security Software Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Valid Accounts
              Cached Domain Credentials111
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              4iDzhJBJVv.exe48%VirustotalBrowse
              4iDzhJBJVv.exe74%ReversingLabsWin32.Trojan.AutoitInject
              4iDzhJBJVv.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              104.21.96.1
              truefalse
                high
                checkip.dyndns.com
                193.122.6.168
                truefalse
                  high
                  checkip.dyndns.org
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                      high
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.orgRegSvcs.exe, 00000008.00000002.1428473072.0000000002B9A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BB6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.orgRegSvcs.exe, 00000008.00000002.1428473072.0000000002AE7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BB6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BC3000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comRegSvcs.exe, 00000008.00000002.1428473072.0000000002B9A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BB6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000008.00000002.1428473072.0000000002A31000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.org/q4iDzhJBJVv.exe, 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.189$RegSvcs.exe, 00000008.00000002.1428473072.0000000002B9A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BB6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000008.00000002.1428473072.0000000002B9A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BE3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BF2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BB6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B12000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002BA8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://reallyfreegeoip.org/xml/4iDzhJBJVv.exe, 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.1428473072.0000000002AFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        193.122.6.168
                                        checkip.dyndns.comUnited States
                                        31898ORACLE-BMC-31898USfalse
                                        104.21.96.1
                                        reallyfreegeoip.orgUnited States
                                        13335CLOUDFLARENETUSfalse
                                        Joe Sandbox version:42.0.0 Malachite
                                        Analysis ID:1587643
                                        Start date and time:2025-01-10 16:16:39 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 6m 16s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:17
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:4iDzhJBJVv.exe
                                        renamed because original name is a hash value
                                        Original Sample Name:937165f6ec620fd90744f5d180ffdaac029bda7ced16debce856dba23aa60728.exe
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@8/3@2/2
                                        EGA Information:
                                        • Successful, ratio: 50%
                                        HCA Information:
                                        • Successful, ratio: 98%
                                        • Number of executed functions: 49
                                        • Number of non-executed functions: 294
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
                                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target RegSvcs.exe, PID 7236 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                        TimeTypeDescription
                                        10:17:43API Interceptor74x Sleep call for process: RegSvcs.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        193.122.6.168ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                        • checkip.dyndns.org/
                                        Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • checkip.dyndns.org/
                                        December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                        • checkip.dyndns.org/
                                        PO.exeGet hashmaliciousMassLogger RATBrowse
                                        • checkip.dyndns.org/
                                        New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • checkip.dyndns.org/
                                        Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                        • checkip.dyndns.org/
                                        104.21.96.1QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                        • www.mzkd6gp5.top/3u0p/
                                        SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                        • pelisplus.so/administrator/index.php
                                        Recibos.exeGet hashmaliciousFormBookBrowse
                                        • www.mffnow.info/1a34/
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        reallyfreegeoip.orgln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 104.21.112.1
                                        B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.48.1
                                        B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 104.21.32.1
                                        VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.80.1
                                        bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.80.1
                                        Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 104.21.48.1
                                        PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 104.21.96.1
                                        IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.64.1
                                        RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                        • 104.21.48.1
                                        Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.32.1
                                        checkip.dyndns.comln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 193.122.6.168
                                        B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.247.73
                                        VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                        • 193.122.130.0
                                        bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 193.122.130.0
                                        PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 158.101.44.242
                                        IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                        • 193.122.6.168
                                        RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                        • 193.122.130.0
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ORACLE-BMC-31898USln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 193.122.6.168
                                        B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                        • 193.122.130.0
                                        bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 193.122.130.0
                                        PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 158.101.44.242
                                        IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                        • 193.122.6.168
                                        RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                        • 193.122.130.0
                                        PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                        • 158.101.44.242
                                        CLOUDFLARENETUSMmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.56.70
                                        https://na4.docusign.net/Signing/EmailStart.aspx?a=ffa78034-d960-4bb3-b2a2-bb62a1fc4a65&etti=24&acct=86dab687-685e-40aa-af52-e5c3fc07b508&er=04714c6d-cc25-4a21-be91-01e1c43a5f3fGet hashmaliciousHTMLPhisherBrowse
                                        • 188.114.96.3
                                        DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 104.26.12.205
                                        RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                        • 104.26.13.205
                                        ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 104.21.112.1
                                        https://booking.extrantelabelason.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                        • 104.18.86.42
                                        Setup.exeGet hashmaliciousUnknownBrowse
                                        • 1.1.1.1
                                        https://eu.boxif.xyzGet hashmaliciousUnknownBrowse
                                        • 1.1.1.1
                                        7DpzcPcsTS.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        B8FnDUj8hy.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.13.205
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        54328bd36c14bd82ddaa0c04b25ed9adln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 104.21.96.1
                                        B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.96.1
                                        B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 104.21.96.1
                                        VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.96.1
                                        bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.96.1
                                        Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 104.21.96.1
                                        PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 104.21.96.1
                                        IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.96.1
                                        RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                        • 104.21.96.1
                                        Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.96.1
                                        No context
                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1039
                                        Entropy (8bit):5.353332853270839
                                        Encrypted:false
                                        SSDEEP:24:ML9E4KiE4Ko84qXKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKiHKoviYHKh3oPtHo6hAHKzeR
                                        MD5:A4AF0F36EC4E0C69DC0F860C891E8BBE
                                        SHA1:28DD81A1EDDF71CBCBF86DA986E047279EF097CD
                                        SHA-256:B038D4342E4DD96217BD90CFE32581FCCB381C5C2E6FF257CD32854F840D1FDE
                                        SHA-512:A675D3E9DB5BDD325A22E82C6BCDBD5409D7A34453DAAEB0E37206BE982C388547E1BDF22DC70393C69D0CE55635E2364502572C3AD2E6753A56A5C3893F6D69
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e
                                        Process:C:\Users\user\Desktop\4iDzhJBJVv.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):81344
                                        Entropy (8bit):7.839031878762017
                                        Encrypted:false
                                        SSDEEP:1536:OCw1ipk4YO+s4hKQ836nTyJdg/VjkJfjRwOW7RHT5r3mMYgZGh5aq9jEi:OCyR4TeyJdcgjRwO+H9i93vxjp
                                        MD5:BBB7BFE691504E51352E2A9EA8ABE7FC
                                        SHA1:029822306D614DAC7C01CC639ABAEBEBA647E4CB
                                        SHA-256:30D4A7E2B027553B2845638CE0925702B6E2C1C1C6F82C42E97FCD447AEB501C
                                        SHA-512:FB2887A82F3C65557D86033D518CCE70566C8C3EFFA8C4DF8C66BFDDEB75BCA5E60268BCA7F67BD2FC3C4CAD9A0E6D26BE8F17556623A3B5ADBD817601F6C629
                                        Malicious:false
                                        Reputation:low
                                        Preview:EA06......x.i.2.P.N(..O".V.......7........}[`..sS....n./..F.V..KK.O(.....!...iT..........Q.[.W.5.#..lSZM.$......L.M..ou..6.`.^.E...1Jd.T.M.....Ij.i...0.Q.....f'TJd..#4...K(....c5.A....R.6...5z.2P.1.8.gh..-B......m.p..........3.Q)......Z.......Q8..>\Z..f9.Zd.j.....y...7.U@.........0.g...Q!..,.uX......L.......9....@....*.$...N.Pi.h.R...Q....CO7..?..5C....m&;.......s....Nh....^.$. ....Zb...."@....0..i ....0....P..Z..\@....a".<..o.S'..4BoW.E..z.2%...&.Z....R.....T..(r;D.F.M*.i...P.L.....%............*.Z.8...........J.r#U.G..z..qn.M.....G..TJv.|..Y.2:..J.]*.i....q(.....@..H1JM..7.[*.h...0_f.k,..8.R#.{.._.."t@.B..I.5.."..jQ.t.L.P,.h..Q!.Q.y..H..6.z=.:.V.....KP.@k..4.u..(7.`.....j..e..L.Y).i.^s...-Q(.2i..U..j=J.E...5*U....D..Je.......i.... ....6......L.q.@....E.VeTJd.kV..@$.t.s...w.....c.p...C......AR.Qd.....7.Q%.......LeU.d....0+ ...=D.MiS..B.v.P........Qjs...cs.S8.$..07....o.. #..m.;...!..:y..,.....`......h..^......`.B9U.E@$....W...W34.J; ....:..
                                        Process:C:\Users\user\Desktop\4iDzhJBJVv.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):133632
                                        Entropy (8bit):6.836856337135012
                                        Encrypted:false
                                        SSDEEP:3072:kc80hzT63u8nYGPLmyxjroT2Ix2Hub3MdPy92mya3aAyO+e:kIhv63uQayx3oTydq9Lyaqzfe
                                        MD5:CFC20EB60B367FA52BF8AF3AA2F81676
                                        SHA1:BF9E5486C614CE885733EA82A8BA7311A9F510ED
                                        SHA-256:16ECAFE516C04D8B27A15A77BC250BFBED513F7801583E65E52158219E9412FE
                                        SHA-512:9F12D684B82052DDE9B9B5854689F2D2BB9FBEA3B54B3F57FF5A5FF8778AEC2113B0C5767FC17D6D87ED13AD3344D57B9461E0F5082EE9C7F25C7656B8991305
                                        Malicious:false
                                        Reputation:low
                                        Preview:{m.V4LGPH8DL..UV.LGPL8DLv7UV7LGPL8DL67UV7LGPL8DL67UV7LGPL8DL.7UV9S.^L.M...T..m.8%Kd<DX2$V!g3-V*#B.73.>2>lQ*lrx.vZ##5b5IF.7UV7LGP.}DLz6VV.a.6L8DL67UV.LEQG9.L6.TV7XGPL8DL.%WV7lGPL.FL67.V7lGPL:DL27UV7LGPH8DL67UV7,EPL:DL67UV5L..L8TL6'UV7LWPL(DL67UV'LGPL8DL67UVG^EP.8DL6.WV.\GPL8DL67UV7LGPL8DL6wWV;LGPL8DL67UV7LGPL8DL67UV7LGPL8DL67UV7LGPL8DL67UV7LGPL.DL>7UV7LGPL8DL>.UV.LGPL8DL67UV.8"(88DL..TV7lGPL.EL65UV7LGPL8DL67UV.LG0bJ7>U7UV.\GPL.FL6%UV7.FPL8DL67UV7LGP.8D..E0:X/GP@8DL6wWV7NGPL0FL67UV7LGPL8DLv7U.7LGPL8DL67UV7LGP.*FL67UV.LGPN8AL..TV.GPO8DL.7UP.lFP.8DL67UV7LGPL8DL67UV7LGPL8DL67UV7LGPL8DL67UV.1._..%E..V7LGPL9FO21]^7LGPL8DLH7UVqLGP.8DL.7UV.LGP!8DL.7UVILGP28DLR7UVELGP-8DLq7UVXLGP"8DLH7UV)NopL8Nf.7W~.LGZL..?.7U\.MGPHKgL6=.T7LC#h8DF.4UV3?bPL2.H67Q%.LGZ.=DL2..V4.QVL8_#.7U\7O.EJ8DW..UT.vGPF8nj64.C1LGKf.DN.>UV3f.#Q8DJ.tUV=8NPL:.F67Q|)No.L8Nf.IEV7HlPf.:]67Q}7fe.^8DH.7.tI_GPH.Df.IAV7HlPf&F."7UR.n9EL8@g6.w(!LGTg8nnH UV3gGzR:.[67Q|1f%P>.XLF4:.7LAx.8DF.WUV1LmjLFdL63W9.LGZj..L4.VW7FGROErL63WRJ{GPH..L4LlV
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):6.877362809304968
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:4iDzhJBJVv.exe
                                        File size:1'060'352 bytes
                                        MD5:ca73a7be6faac5bb95edd742b6648914
                                        SHA1:f49d9442c3608a5f58ce93614f5c81aff19afb2d
                                        SHA256:937165f6ec620fd90744f5d180ffdaac029bda7ced16debce856dba23aa60728
                                        SHA512:a9fb2f9b37627ec6f0f5f16b56ea20d80f3054d72f60e23a15b759d1806a0ccb1ee6fc31d1ac0388af5489bb18307c54b228f675cd3670294e32804282a576bd
                                        SSDEEP:24576:MqDEvCTbMWu7rQYlBQcBiT6rprG8aFu/Pv8Et5r:MTvC/MTQYxsWR7aFePvB5
                                        TLSH:DC35AE027391C062FFAB92334F5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                        Icon Hash:aaf3e3e3938382a0
                                        Entrypoint:0x420577
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x6762B46B [Wed Dec 18 11:39:23 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:1
                                        File Version Major:5
                                        File Version Minor:1
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:1
                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                        Instruction
                                        call 00007FB2404FC7E3h
                                        jmp 00007FB2404FC0EFh
                                        push ebp
                                        mov ebp, esp
                                        push esi
                                        push dword ptr [ebp+08h]
                                        mov esi, ecx
                                        call 00007FB2404FC2CDh
                                        mov dword ptr [esi], 0049FDF0h
                                        mov eax, esi
                                        pop esi
                                        pop ebp
                                        retn 0004h
                                        and dword ptr [ecx+04h], 00000000h
                                        mov eax, ecx
                                        and dword ptr [ecx+08h], 00000000h
                                        mov dword ptr [ecx+04h], 0049FDF8h
                                        mov dword ptr [ecx], 0049FDF0h
                                        ret
                                        push ebp
                                        mov ebp, esp
                                        push esi
                                        push dword ptr [ebp+08h]
                                        mov esi, ecx
                                        call 00007FB2404FC29Ah
                                        mov dword ptr [esi], 0049FE0Ch
                                        mov eax, esi
                                        pop esi
                                        pop ebp
                                        retn 0004h
                                        and dword ptr [ecx+04h], 00000000h
                                        mov eax, ecx
                                        and dword ptr [ecx+08h], 00000000h
                                        mov dword ptr [ecx+04h], 0049FE14h
                                        mov dword ptr [ecx], 0049FE0Ch
                                        ret
                                        push ebp
                                        mov ebp, esp
                                        push esi
                                        mov esi, ecx
                                        lea eax, dword ptr [esi+04h]
                                        mov dword ptr [esi], 0049FDD0h
                                        and dword ptr [eax], 00000000h
                                        and dword ptr [eax+04h], 00000000h
                                        push eax
                                        mov eax, dword ptr [ebp+08h]
                                        add eax, 04h
                                        push eax
                                        call 00007FB2404FEE8Dh
                                        pop ecx
                                        pop ecx
                                        mov eax, esi
                                        pop esi
                                        pop ebp
                                        retn 0004h
                                        lea eax, dword ptr [ecx+04h]
                                        mov dword ptr [ecx], 0049FDD0h
                                        push eax
                                        call 00007FB2404FEED8h
                                        pop ecx
                                        ret
                                        push ebp
                                        mov ebp, esp
                                        push esi
                                        mov esi, ecx
                                        lea eax, dword ptr [esi+04h]
                                        mov dword ptr [esi], 0049FDD0h
                                        push eax
                                        call 00007FB2404FEEC1h
                                        test byte ptr [ebp+08h], 00000001h
                                        pop ecx
                                        Programming Language:
                                        • [ C ] VS2008 SP1 build 30729
                                        • [IMP] VS2008 SP1 build 30729
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x2c328.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1010000x7594.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0xd40000x2c3280x2c400e9311eed93c7927370096d9e720288e1False0.8512038753531074data7.693769123394462IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x1010000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                        RT_RCDATA0xdc7b80x235eddata1.000352022750333
                                        RT_GROUP_ICON0xffda80x76dataEnglishGreat Britain0.6610169491525424
                                        RT_GROUP_ICON0xffe200x14dataEnglishGreat Britain1.25
                                        RT_GROUP_ICON0xffe340x14dataEnglishGreat Britain1.15
                                        RT_GROUP_ICON0xffe480x14dataEnglishGreat Britain1.25
                                        RT_VERSION0xffe5c0xdcdataEnglishGreat Britain0.6181818181818182
                                        RT_MANIFEST0xfff380x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                        DLLImport
                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                        PSAPI.DLLGetProcessMemoryInfo
                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                        UxTheme.dllIsThemeActive
                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishGreat Britain
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2025-01-10T16:17:43.815492+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749702193.122.6.16880TCP
                                        2025-01-10T16:17:45.110687+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749702193.122.6.16880TCP
                                        2025-01-10T16:17:45.599134+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749719104.21.96.1443TCP
                                        2025-01-10T16:17:46.329430+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749720193.122.6.16880TCP
                                        2025-01-10T16:17:46.880249+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749726104.21.96.1443TCP
                                        2025-01-10T16:17:48.168437+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749738104.21.96.1443TCP
                                        2025-01-10T16:17:50.735570+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749756104.21.96.1443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 10, 2025 16:17:42.781310081 CET4970280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:42.786317110 CET8049702193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:42.786405087 CET4970280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:42.786614895 CET4970280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:42.791460991 CET8049702193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:43.423918009 CET8049702193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:43.501295090 CET4970280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:43.536257982 CET4970280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:43.541042089 CET8049702193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:43.723237038 CET8049702193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:43.815491915 CET4970280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:44.035595894 CET49708443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.035669088 CET44349708104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:44.035751104 CET49708443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.045238972 CET49708443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.045273066 CET44349708104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:44.526810884 CET44349708104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:44.526916027 CET49708443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.536449909 CET49708443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.536463022 CET44349708104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:44.536778927 CET44349708104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:44.605030060 CET49708443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.647336006 CET44349708104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:44.758518934 CET44349708104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:44.758662939 CET44349708104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:44.758739948 CET49708443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.766514063 CET49708443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.771811008 CET4970280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:44.776680946 CET8049702193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:44.958755970 CET8049702193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:44.963860989 CET49719443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.963905096 CET44349719104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:44.964401960 CET49719443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.964401960 CET49719443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:44.964464903 CET44349719104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:45.110687017 CET4970280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:45.439977884 CET44349719104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:45.442574978 CET49719443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:45.442675114 CET44349719104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:45.599137068 CET44349719104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:45.599189043 CET44349719104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:45.599359035 CET49719443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:45.599787951 CET49719443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:45.603456020 CET4970280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:45.604782104 CET4972080192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:45.608455896 CET8049702193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:45.608534098 CET4970280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:45.609636068 CET8049720193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:45.609755993 CET4972080192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:45.609884024 CET4972080192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:45.614634037 CET8049720193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:46.278965950 CET8049720193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:46.280669928 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:46.280708075 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:46.280762911 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:46.281075001 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:46.281089067 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:46.329430103 CET4972080192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:46.734983921 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:46.747996092 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:46.748030901 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:46.880245924 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:46.880301952 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:46.880342007 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:46.880940914 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:46.888379097 CET4973280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:46.893177032 CET8049732193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:46.893248081 CET4973280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:46.893356085 CET4973280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:46.898156881 CET8049732193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:47.546988010 CET8049732193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:47.549968004 CET49738443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:47.550061941 CET44349738104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:47.550148010 CET49738443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:47.550575018 CET49738443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:47.550612926 CET44349738104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:47.595045090 CET4973280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:48.012273073 CET44349738104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:48.014179945 CET49738443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:48.014230967 CET44349738104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:48.168467999 CET44349738104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:48.168535948 CET44349738104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:48.168612003 CET49738443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:48.169198990 CET49738443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:48.173010111 CET4973280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:48.174388885 CET4973980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:48.178371906 CET8049732193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:48.178431988 CET4973280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:48.179265022 CET8049739193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:48.179356098 CET4973980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:48.179430008 CET4973980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:48.184230089 CET8049739193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:48.814099073 CET8049739193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:48.815603018 CET49745443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:48.815697908 CET44349745104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:48.815792084 CET49745443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:48.816183090 CET49745443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:48.816217899 CET44349745104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:48.860670090 CET4973980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:49.277836084 CET44349745104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:49.279983997 CET49745443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:49.280020952 CET44349745104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:49.422246933 CET44349745104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:49.422328949 CET44349745104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:49.422638893 CET49745443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:49.422960997 CET49745443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:49.427119017 CET4973980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:49.428160906 CET4975180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:49.432179928 CET8049739193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:49.432239056 CET4973980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:49.433674097 CET8049751193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:49.433775902 CET4975180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:49.433927059 CET4975180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:49.438690901 CET8049751193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:50.099812031 CET8049751193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:50.114960909 CET49756443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:50.114998102 CET44349756104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:50.115122080 CET49756443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:50.132811069 CET49756443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:50.132824898 CET44349756104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:50.141957998 CET4975180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:50.595419884 CET44349756104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:50.604613066 CET49756443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:50.604634047 CET44349756104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:50.735572100 CET44349756104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:50.735626936 CET44349756104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:50.735744953 CET49756443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:50.743288994 CET49756443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:50.806602955 CET4975180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:50.811440945 CET4976180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:50.811604023 CET8049751193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:50.811722994 CET4975180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:50.816301107 CET8049761193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:50.818149090 CET4976180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:50.818363905 CET4976180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:50.823132038 CET8049761193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:51.472178936 CET8049761193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:51.473824024 CET49765443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:51.473851919 CET44349765104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:51.473926067 CET49765443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:51.474318027 CET49765443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:51.474333048 CET44349765104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:51.516937971 CET4976180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:51.931530952 CET44349765104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:51.933321953 CET49765443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:51.933367968 CET44349765104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:52.092643023 CET44349765104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:52.092729092 CET44349765104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:52.092881918 CET49765443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:52.093492985 CET49765443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:52.098169088 CET4976180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:52.099638939 CET4977080192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:52.103235960 CET8049761193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:52.103353024 CET4976180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:52.104528904 CET8049770193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:52.106297970 CET4977080192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:52.108434916 CET4977080192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:52.113199949 CET8049770193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:52.744505882 CET8049770193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:17:52.746759892 CET49775443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:52.746804953 CET44349775104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:52.746893883 CET49775443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:52.747257948 CET49775443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:52.747284889 CET44349775104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:52.798223019 CET4977080192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:53.211404085 CET44349775104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:53.214171886 CET49775443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:53.214190960 CET44349775104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:53.357461929 CET44349775104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:53.357531071 CET44349775104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:17:53.357609987 CET49775443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:53.358335972 CET49775443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:17:53.773236036 CET4977080192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:17:53.773279905 CET4972080192.168.2.7193.122.6.168
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 10, 2025 16:17:42.765866041 CET4987353192.168.2.71.1.1.1
                                        Jan 10, 2025 16:17:42.773049116 CET53498731.1.1.1192.168.2.7
                                        Jan 10, 2025 16:17:44.021859884 CET5254153192.168.2.71.1.1.1
                                        Jan 10, 2025 16:17:44.030889988 CET53525411.1.1.1192.168.2.7
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jan 10, 2025 16:17:42.765866041 CET192.168.2.71.1.1.10x1b17Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:44.021859884 CET192.168.2.71.1.1.10xda8aStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 10, 2025 16:17:42.773049116 CET1.1.1.1192.168.2.70x1b17No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                        Jan 10, 2025 16:17:42.773049116 CET1.1.1.1192.168.2.70x1b17No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:42.773049116 CET1.1.1.1192.168.2.70x1b17No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:42.773049116 CET1.1.1.1192.168.2.70x1b17No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:42.773049116 CET1.1.1.1192.168.2.70x1b17No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:42.773049116 CET1.1.1.1192.168.2.70x1b17No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:44.030889988 CET1.1.1.1192.168.2.70xda8aNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:44.030889988 CET1.1.1.1192.168.2.70xda8aNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:44.030889988 CET1.1.1.1192.168.2.70xda8aNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:44.030889988 CET1.1.1.1192.168.2.70xda8aNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:44.030889988 CET1.1.1.1192.168.2.70xda8aNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:44.030889988 CET1.1.1.1192.168.2.70xda8aNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:17:44.030889988 CET1.1.1.1192.168.2.70xda8aNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                        • reallyfreegeoip.org
                                        • checkip.dyndns.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.749702193.122.6.168807236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:17:42.786614895 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:17:43.423918009 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:43 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                        Jan 10, 2025 16:17:43.536257982 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Jan 10, 2025 16:17:43.723237038 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:43 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                        Jan 10, 2025 16:17:44.771811008 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Jan 10, 2025 16:17:44.958755970 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:44 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.749720193.122.6.168807236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:17:45.609884024 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Jan 10, 2025 16:17:46.278965950 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:46 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.749732193.122.6.168807236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:17:46.893356085 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:17:47.546988010 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:47 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.749739193.122.6.168807236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:17:48.179430008 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:17:48.814099073 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:48 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.749751193.122.6.168807236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:17:49.433927059 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:17:50.099812031 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:49 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.749761193.122.6.168807236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:17:50.818363905 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:17:51.472178936 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:51 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.749770193.122.6.168807236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:17:52.108434916 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:17:52.744505882 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:52 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.749708104.21.96.14437236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:17:44 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2025-01-10 15:17:44 UTC855INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:44 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1837053
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hlZq%2FJwC%2BwGwRT7BqtL7xLDqRn9QOiSJvymvY4ICTco0CWU9Scv1BsTdMejpY9qst4zXcrEHrIiqQYR%2Fc1IWdgR9GnbJjVyEtw6of4HDHejaOJruSQn5fxsaJGQXUD89yKOfVxnd"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffda2ba1f3572a4-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=2004&min_rtt=1985&rtt_var=758&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1471032&cwnd=212&unsent_bytes=0&cid=2e9af267acbff400&ts=244&x=0"
                                        2025-01-10 15:17:44 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.749719104.21.96.14437236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:17:45 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2025-01-10 15:17:45 UTC859INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:45 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1837054
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sAC%2FuUnYobTEbNPaEknc%2FfzatiDsyA9%2BgbR7JwNTtx%2F36ppUHJXwa0XE2P9x8xWLKUgLNy8iJdgnE1FQ85p1CwVdPQ2egJeVUP%2BGOMl8Vw3b8u2I2pSsqa65epeLSZZstdAuzRna"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffda2bf8b761a48-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1946&min_rtt=1936&rtt_var=733&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1508264&cwnd=157&unsent_bytes=0&cid=96495aeb8739f7b3&ts=163&x=0"
                                        2025-01-10 15:17:45 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.749726104.21.96.14437236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:17:46 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2025-01-10 15:17:46 UTC849INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:46 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1837055
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uurMqFbHlEJRb2n8MHJZjGkQsl9pcTBX8SGJUBb57JlxmjMl1Exg6K2kNHjhSsbVcayHGoxA0hEgT6RghiTbAGy71iwznmpssnGUuCTi4Y37RATxIDSFzCb94cRuwp5cN72g17aI"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffda2c7ab991a48-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1956&min_rtt=1956&rtt_var=734&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1491317&cwnd=157&unsent_bytes=0&cid=65a592868fa0e9e0&ts=148&x=0"
                                        2025-01-10 15:17:46 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.749738104.21.96.14437236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:17:48 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2025-01-10 15:17:48 UTC855INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:48 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1837057
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ekg5%2BDyk3PR0v3yvpw4tBXcvCU8mA2LnAjNHDRFBRXnkxWk7PJXpWn63gfmB1aN2p5WygJBwn7%2BT2uFK7UMF6q3tBF8fa0xkDFCjdShaIPpcEwMP%2BBLc0rAABqx4iEco3cwEB20n"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffda2cf9b8ac32e-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1681&min_rtt=1651&rtt_var=641&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1768625&cwnd=178&unsent_bytes=0&cid=378cb964df1507af&ts=161&x=0"
                                        2025-01-10 15:17:48 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.749745104.21.96.14437236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:17:49 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2025-01-10 15:17:49 UTC855INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:49 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1837058
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zbbeE9XcerWHCZsdEKWnLhLSETWU8OwQqcm9vVj2zaQrbLeNJiuWBo5EYl8TasNleAxldl5NPf%2F%2BCTE4HE%2FhyLbcDzvoexcWIBfB8me5jhXMlKTngYz2K2235Ih2cpyauXasCWfN"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffda2d778a142c0-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1677&min_rtt=1672&rtt_var=637&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1702623&cwnd=212&unsent_bytes=0&cid=0b6c89d6569c8784&ts=151&x=0"
                                        2025-01-10 15:17:49 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.749756104.21.96.14437236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:17:50 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2025-01-10 15:17:50 UTC861INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:50 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1837059
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dROynmmJD47taEjEjRV2rV%2FHeT7e7A8n%2FUCBxIk7y1vkuKj%2B6cIr5bWKExvMf6s1S5dr%2FubWaTD46Ul%2FLwt1NqbSF5tI%2BZKZo74zr7GxmckKt0tCQzuHvUf4Jlk4gz3fJzmPmgO4"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffda2dfbb4f1a48-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1968&min_rtt=1959&rtt_var=753&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1435594&cwnd=157&unsent_bytes=0&cid=9789fc4fd3da499a&ts=142&x=0"
                                        2025-01-10 15:17:50 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.749765104.21.96.14437236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:17:51 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2025-01-10 15:17:52 UTC853INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:52 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1837061
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lUBeNOiiNu5qQ2RTwIF7elOdjy3GvlPURasVLa%2BnCV8JvWZqyaev6dGIAMUDkYnGZPh4IK6Q0hgSa7uNeyc4DCArlP9mZ6g3lU0fNgIo82WZQc8PuLh%2B1R1siIejAjovGFOFfWoP"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffda2e819294363-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=2009&min_rtt=1623&rtt_var=885&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1799137&cwnd=240&unsent_bytes=0&cid=8cfe8c00e0dd29d5&ts=162&x=0"
                                        2025-01-10 15:17:52 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        7192.168.2.749775104.21.96.14437236C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:17:53 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2025-01-10 15:17:53 UTC867INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:17:53 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1837062
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FYJxpgjGyZz82qXKDcxW%2Fni6G9Fh3DDCXZk%2FO8hyYq7IXNCc7ZT3IRne3a2B14RJPWI1nnTB%2FfyLhB4VVI%2BTX%2BM%2FsO3o2%2FPlfpHroWizxDXahtF2%2B84%2BW0Z2kyJAd7fHoEueWKbX"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffda2f01bd9c32e-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1631&min_rtt=1629&rtt_var=615&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1775075&cwnd=178&unsent_bytes=0&cid=7fbd24ce9521c8dc&ts=148&x=0"
                                        2025-01-10 15:17:53 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:3
                                        Start time:10:17:36
                                        Start date:10/01/2025
                                        Path:C:\Users\user\Desktop\4iDzhJBJVv.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\4iDzhJBJVv.exe"
                                        Imagebase:0xda0000
                                        File size:1'060'352 bytes
                                        MD5 hash:CA73A7BE6FAAC5BB95EDD742B6648914
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.1315734183.0000000000BB0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        Reputation:low
                                        Has exited:true

                                        Target ID:8
                                        Start time:10:17:40
                                        Start date:10/01/2025
                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\4iDzhJBJVv.exe"
                                        Imagebase:0x500000
                                        File size:45'984 bytes
                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000008.00000002.1426880206.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000008.00000002.1428473072.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:true

                                        Target ID:10
                                        Start time:10:17:52
                                        Start date:10/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                        Imagebase:0x410000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:12
                                        Start time:10:17:52
                                        Start date:10/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff75da10000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:13
                                        Start time:10:17:52
                                        Start date:10/01/2025
                                        Path:C:\Windows\SysWOW64\choice.exe
                                        Wow64 process (32bit):true
                                        Commandline:choice /C Y /N /D Y /T 3
                                        Imagebase:0x440000
                                        File size:28'160 bytes
                                        MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:3.2%
                                          Dynamic/Decrypted Code Coverage:0.4%
                                          Signature Coverage:5%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:78
                                          execution_graph 96490 da105b 96495 da344d 96490->96495 96492 da106a 96526 dc00a3 29 API calls __onexit 96492->96526 96494 da1074 96496 da345d __wsopen_s 96495->96496 96527 daa961 96496->96527 96500 da351c 96539 da3357 96500->96539 96507 daa961 22 API calls 96508 da354d 96507->96508 96560 daa6c3 96508->96560 96511 de3176 RegQueryValueExW 96512 de320c RegCloseKey 96511->96512 96513 de3193 96511->96513 96515 da3578 96512->96515 96525 de321e _wcslen 96512->96525 96566 dbfe0b 96513->96566 96515->96492 96516 de31ac 96576 da5722 96516->96576 96518 da4c6d 22 API calls 96518->96525 96520 de31d4 96579 da6b57 96520->96579 96522 de31ee ISource 96522->96512 96524 da515f 22 API calls 96524->96525 96525->96515 96525->96518 96525->96524 96591 da9cb3 96525->96591 96526->96494 96528 dbfe0b 22 API calls 96527->96528 96529 daa976 96528->96529 96597 dbfddb 96529->96597 96531 da3513 96532 da3a5a 96531->96532 96619 de1f50 96532->96619 96535 da9cb3 22 API calls 96536 da3a8d 96535->96536 96621 da3aa2 96536->96621 96538 da3a97 96538->96500 96540 de1f50 __wsopen_s 96539->96540 96541 da3364 GetFullPathNameW 96540->96541 96542 da3386 96541->96542 96543 da6b57 22 API calls 96542->96543 96544 da33a4 96543->96544 96545 da33c6 96544->96545 96546 de30bb 96545->96546 96547 da33dd 96545->96547 96548 dbfddb 22 API calls 96546->96548 96645 da33ee 96547->96645 96551 de30c5 _wcslen 96548->96551 96550 da33e8 96554 da515f 96550->96554 96552 dbfe0b 22 API calls 96551->96552 96553 de30fe __fread_nolock 96552->96553 96555 da516e 96554->96555 96559 da518f __fread_nolock 96554->96559 96557 dbfe0b 22 API calls 96555->96557 96556 dbfddb 22 API calls 96558 da3544 96556->96558 96557->96559 96558->96507 96559->96556 96561 daa6dd 96560->96561 96562 da3556 RegOpenKeyExW 96560->96562 96563 dbfddb 22 API calls 96561->96563 96562->96511 96562->96515 96564 daa6e7 96563->96564 96565 dbfe0b 22 API calls 96564->96565 96565->96562 96568 dbfddb 96566->96568 96567 dcea0c ___std_exception_copy 21 API calls 96567->96568 96568->96567 96569 dbfdfa 96568->96569 96572 dbfdfc 96568->96572 96660 dc4ead 7 API calls 2 library calls 96568->96660 96569->96516 96571 dc066d 96662 dc32a4 RaiseException 96571->96662 96572->96571 96661 dc32a4 RaiseException 96572->96661 96575 dc068a 96575->96516 96577 dbfddb 22 API calls 96576->96577 96578 da5734 RegQueryValueExW 96577->96578 96578->96520 96578->96522 96580 da6b67 _wcslen 96579->96580 96581 de4ba1 96579->96581 96584 da6b7d 96580->96584 96585 da6ba2 96580->96585 96582 da93b2 22 API calls 96581->96582 96583 de4baa 96582->96583 96583->96583 96663 da6f34 22 API calls 96584->96663 96587 dbfddb 22 API calls 96585->96587 96589 da6bae 96587->96589 96588 da6b85 __fread_nolock 96588->96522 96590 dbfe0b 22 API calls 96589->96590 96590->96588 96592 da9cc2 _wcslen 96591->96592 96593 dbfe0b 22 API calls 96592->96593 96594 da9cea __fread_nolock 96593->96594 96595 dbfddb 22 API calls 96594->96595 96596 da9d00 96595->96596 96596->96525 96600 dbfde0 96597->96600 96599 dbfdfa 96599->96531 96600->96599 96603 dbfdfc 96600->96603 96607 dcea0c 96600->96607 96614 dc4ead 7 API calls 2 library calls 96600->96614 96602 dc066d 96616 dc32a4 RaiseException 96602->96616 96603->96602 96615 dc32a4 RaiseException 96603->96615 96606 dc068a 96606->96531 96613 dd3820 pre_c_initialization 96607->96613 96608 dd385e 96618 dcf2d9 20 API calls __dosmaperr 96608->96618 96609 dd3849 RtlAllocateHeap 96611 dd385c 96609->96611 96609->96613 96611->96600 96613->96608 96613->96609 96617 dc4ead 7 API calls 2 library calls 96613->96617 96614->96600 96615->96602 96616->96606 96617->96613 96618->96611 96620 da3a67 GetModuleFileNameW 96619->96620 96620->96535 96622 de1f50 __wsopen_s 96621->96622 96623 da3aaf GetFullPathNameW 96622->96623 96624 da3ae9 96623->96624 96625 da3ace 96623->96625 96627 daa6c3 22 API calls 96624->96627 96626 da6b57 22 API calls 96625->96626 96628 da3ada 96626->96628 96627->96628 96631 da37a0 96628->96631 96632 da37ae 96631->96632 96635 da93b2 96632->96635 96634 da37c2 96634->96538 96636 da93c0 96635->96636 96638 da93c9 __fread_nolock 96635->96638 96636->96638 96639 daaec9 96636->96639 96638->96634 96640 daaedc 96639->96640 96644 daaed9 __fread_nolock 96639->96644 96641 dbfddb 22 API calls 96640->96641 96642 daaee7 96641->96642 96643 dbfe0b 22 API calls 96642->96643 96643->96644 96644->96638 96646 da33fe _wcslen 96645->96646 96647 de311d 96646->96647 96648 da3411 96646->96648 96650 dbfddb 22 API calls 96647->96650 96655 daa587 96648->96655 96652 de3127 96650->96652 96651 da341e __fread_nolock 96651->96550 96653 dbfe0b 22 API calls 96652->96653 96654 de3157 __fread_nolock 96653->96654 96656 daa598 __fread_nolock 96655->96656 96657 daa59d 96655->96657 96656->96651 96658 def80f 96657->96658 96659 dbfe0b 22 API calls 96657->96659 96659->96656 96660->96568 96661->96571 96662->96575 96663->96588 96664 da1098 96669 da42de 96664->96669 96668 da10a7 96670 daa961 22 API calls 96669->96670 96671 da42f5 GetVersionExW 96670->96671 96672 da6b57 22 API calls 96671->96672 96673 da4342 96672->96673 96674 da93b2 22 API calls 96673->96674 96686 da4378 96673->96686 96675 da436c 96674->96675 96677 da37a0 22 API calls 96675->96677 96676 da441b GetCurrentProcess IsWow64Process 96678 da4437 96676->96678 96677->96686 96679 da444f LoadLibraryA 96678->96679 96680 de3824 GetSystemInfo 96678->96680 96681 da449c GetSystemInfo 96679->96681 96682 da4460 GetProcAddress 96679->96682 96685 da4476 96681->96685 96682->96681 96684 da4470 GetNativeSystemInfo 96682->96684 96683 de37df 96684->96685 96687 da447a FreeLibrary 96685->96687 96688 da109d 96685->96688 96686->96676 96686->96683 96687->96688 96689 dc00a3 29 API calls __onexit 96688->96689 96689->96668 96690 daf7bf 96691 daf7d3 96690->96691 96692 dafcb6 96690->96692 96694 dafcc2 96691->96694 96695 dbfddb 22 API calls 96691->96695 96785 daaceb 96692->96785 96696 daaceb 23 API calls 96694->96696 96697 daf7e5 96695->96697 96699 dafd3d 96696->96699 96697->96694 96698 daf83e 96697->96698 96697->96699 96723 daed9d ISource 96698->96723 96725 db1310 96698->96725 96795 e11155 22 API calls 96699->96795 96702 dafef7 96709 daa8c7 22 API calls 96702->96709 96702->96723 96704 dbfddb 22 API calls 96721 daec76 ISource 96704->96721 96706 df4b0b 96801 e1359c 82 API calls __wsopen_s 96706->96801 96707 df4600 96707->96723 96796 daa8c7 96707->96796 96709->96723 96712 daa8c7 22 API calls 96712->96721 96714 dafbe3 96716 df4bdc 96714->96716 96714->96723 96724 daf3ae ISource 96714->96724 96715 daa961 22 API calls 96715->96721 96802 e1359c 82 API calls __wsopen_s 96716->96802 96717 dc0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96717->96721 96719 df4beb 96803 e1359c 82 API calls __wsopen_s 96719->96803 96720 dc00a3 29 API calls pre_c_initialization 96720->96721 96721->96702 96721->96704 96721->96706 96721->96707 96721->96712 96721->96714 96721->96715 96721->96717 96721->96719 96721->96720 96722 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96721->96722 96721->96723 96721->96724 96783 db01e0 235 API calls 2 library calls 96721->96783 96784 db06a0 41 API calls ISource 96721->96784 96722->96721 96724->96723 96800 e1359c 82 API calls __wsopen_s 96724->96800 96726 db17b0 96725->96726 96727 db1376 96725->96727 96947 dc0242 5 API calls __Init_thread_wait 96726->96947 96729 db1390 96727->96729 96730 df6331 96727->96730 96804 db1940 96729->96804 96731 df633d 96730->96731 96951 e2709c 235 API calls 96730->96951 96731->96721 96733 db17ba 96736 db17fb 96733->96736 96738 da9cb3 22 API calls 96733->96738 96740 df6346 96736->96740 96742 db182c 96736->96742 96737 db1940 9 API calls 96739 db13b6 96737->96739 96746 db17d4 96738->96746 96739->96736 96741 db13ec 96739->96741 96952 e1359c 82 API calls __wsopen_s 96740->96952 96741->96740 96765 db1408 __fread_nolock 96741->96765 96743 daaceb 23 API calls 96742->96743 96745 db1839 96743->96745 96949 dbd217 235 API calls 96745->96949 96948 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96746->96948 96749 df636e 96953 e1359c 82 API calls __wsopen_s 96749->96953 96750 db152f 96752 db153c 96750->96752 96753 df63d1 96750->96753 96754 db1940 9 API calls 96752->96754 96955 e25745 54 API calls _wcslen 96753->96955 96756 db1549 96754->96756 96759 df64fa 96756->96759 96761 db1940 9 API calls 96756->96761 96757 dbfddb 22 API calls 96757->96765 96758 dbfe0b 22 API calls 96758->96765 96769 df6369 96759->96769 96956 e1359c 82 API calls __wsopen_s 96759->96956 96760 db1872 96950 dbfaeb 23 API calls 96760->96950 96767 db1563 96761->96767 96765->96745 96765->96749 96765->96750 96765->96757 96765->96758 96766 df63b2 96765->96766 96765->96769 96814 daec40 96765->96814 96954 e1359c 82 API calls __wsopen_s 96766->96954 96767->96759 96770 daa8c7 22 API calls 96767->96770 96772 db15c7 ISource 96767->96772 96769->96721 96770->96772 96771 db1940 9 API calls 96771->96772 96772->96759 96772->96760 96772->96769 96772->96771 96774 db167b ISource 96772->96774 96838 da4f39 96772->96838 96844 e11e96 96772->96844 96848 e2959f 96772->96848 96851 e1f0ec 96772->96851 96860 e0d4ce 96772->96860 96863 e2958b 96772->96863 96866 e16ef1 96772->96866 96773 db171d 96773->96721 96774->96773 96946 dbce17 22 API calls ISource 96774->96946 96783->96721 96784->96721 96786 daacf9 96785->96786 96794 daad2a ISource 96785->96794 96787 daad01 ISource 96786->96787 96788 daad55 96786->96788 96790 defa48 96787->96790 96791 daad21 96787->96791 96787->96794 96789 daa8c7 22 API calls 96788->96789 96788->96794 96789->96794 96790->96794 98030 dbce17 22 API calls ISource 96790->98030 96792 defa3a VariantClear 96791->96792 96791->96794 96792->96794 96794->96694 96795->96723 96797 daa8ea __fread_nolock 96796->96797 96798 daa8db 96796->96798 96797->96723 96798->96797 96799 dbfe0b 22 API calls 96798->96799 96799->96797 96800->96723 96801->96723 96802->96719 96803->96723 96805 db195d 96804->96805 96806 db1981 96804->96806 96813 db13a0 96805->96813 96959 dc0242 5 API calls __Init_thread_wait 96805->96959 96957 dc0242 5 API calls __Init_thread_wait 96806->96957 96809 db198b 96809->96805 96958 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96809->96958 96811 db8727 96811->96813 96960 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96811->96960 96813->96737 96833 daec76 ISource 96814->96833 96815 dafef7 96822 daa8c7 22 API calls 96815->96822 96830 daed9d ISource 96815->96830 96817 dbfddb 22 API calls 96817->96833 96819 df4b0b 96964 e1359c 82 API calls __wsopen_s 96819->96964 96820 df4600 96826 daa8c7 22 API calls 96820->96826 96820->96830 96822->96830 96825 daa8c7 22 API calls 96825->96833 96826->96830 96827 dc0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96827->96833 96828 dafbe3 96828->96830 96832 df4bdc 96828->96832 96837 daf3ae ISource 96828->96837 96829 daa961 22 API calls 96829->96833 96830->96765 96831 dc00a3 29 API calls pre_c_initialization 96831->96833 96965 e1359c 82 API calls __wsopen_s 96832->96965 96833->96815 96833->96817 96833->96819 96833->96820 96833->96825 96833->96827 96833->96828 96833->96829 96833->96830 96833->96831 96835 df4beb 96833->96835 96836 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96833->96836 96833->96837 96961 db01e0 235 API calls 2 library calls 96833->96961 96962 db06a0 41 API calls ISource 96833->96962 96966 e1359c 82 API calls __wsopen_s 96835->96966 96836->96833 96837->96830 96963 e1359c 82 API calls __wsopen_s 96837->96963 96839 da4f43 96838->96839 96840 da4f4a 96838->96840 96967 dce678 96839->96967 96842 da4f6a FreeLibrary 96840->96842 96843 da4f59 96840->96843 96842->96843 96843->96772 96845 e11e9f 96844->96845 96847 e11ea4 96844->96847 97232 e10f67 96845->97232 96847->96772 97253 e27f59 96848->97253 96850 e295af 96850->96772 96852 da7510 53 API calls 96851->96852 96853 e1f126 96852->96853 97385 da9e90 96853->97385 96855 e1f136 96856 daec40 235 API calls 96855->96856 96857 e1f15b 96855->96857 96856->96857 96859 e1f15f 96857->96859 97413 da9c6e 22 API calls 96857->97413 96859->96772 97428 e0dbbe lstrlenW 96860->97428 96864 e27f59 120 API calls 96863->96864 96865 e2959b 96864->96865 96865->96772 96867 daa961 22 API calls 96866->96867 96868 e16f1d 96867->96868 96869 daa961 22 API calls 96868->96869 96870 e16f26 96869->96870 96871 e16f3a 96870->96871 97618 dab567 39 API calls 96870->97618 96873 da7510 53 API calls 96871->96873 96880 e16f57 _wcslen 96873->96880 96874 e16fbc 96876 da7510 53 API calls 96874->96876 96875 e170bf 97433 da4ecb 96875->97433 96878 e16fc8 96876->96878 96883 daa8c7 22 API calls 96878->96883 96888 e16fdb 96878->96888 96880->96874 96880->96875 96945 e170e9 96880->96945 96881 e170e5 96882 daa961 22 API calls 96881->96882 96881->96945 96885 e1711a 96882->96885 96883->96888 96884 da4ecb 94 API calls 96884->96881 96886 daa961 22 API calls 96885->96886 96890 e17126 96886->96890 96887 e17027 96889 da7510 53 API calls 96887->96889 96888->96887 96891 e17005 96888->96891 96894 daa8c7 22 API calls 96888->96894 96892 e17034 96889->96892 96893 daa961 22 API calls 96890->96893 96895 da33c6 22 API calls 96891->96895 96896 e17047 96892->96896 96897 e1703d 96892->96897 96898 e1712f 96893->96898 96894->96891 96899 e1700f 96895->96899 97619 e0e199 GetFileAttributesW 96896->97619 96900 daa8c7 22 API calls 96897->96900 96902 daa961 22 API calls 96898->96902 96903 da7510 53 API calls 96899->96903 96900->96896 96905 e17138 96902->96905 96906 e1701b 96903->96906 96904 e17050 96907 e17063 96904->96907 96911 da4c6d 22 API calls 96904->96911 96908 da7510 53 API calls 96905->96908 96909 da6350 22 API calls 96906->96909 96910 da7510 53 API calls 96907->96910 96917 e17069 96907->96917 96912 e17145 96908->96912 96909->96887 96913 e170a0 96910->96913 96911->96907 97455 da525f 96912->97455 97620 e0d076 57 API calls 96913->97620 96916 e17166 97497 da4c6d 96916->97497 96917->96945 96920 e171a9 96922 daa8c7 22 API calls 96920->96922 96921 da4c6d 22 API calls 96923 e17186 96921->96923 96924 e171ba 96922->96924 96923->96920 96926 da6b57 22 API calls 96923->96926 97500 da6350 96924->97500 96928 e1719b 96926->96928 96930 da6b57 22 API calls 96928->96930 96929 da6350 22 API calls 96931 e171d6 96929->96931 96930->96920 96932 da6350 22 API calls 96931->96932 96933 e171e4 96932->96933 96934 da7510 53 API calls 96933->96934 96935 e171f0 96934->96935 97509 e0d7bc 96935->97509 96937 e17201 96938 e0d4ce 4 API calls 96937->96938 96939 e1720b 96938->96939 96940 da7510 53 API calls 96939->96940 96944 e17239 96939->96944 96941 e17229 96940->96941 97563 e12947 96941->97563 96943 da4f39 68 API calls 96943->96945 96944->96943 96945->96772 96946->96774 96947->96733 96948->96736 96949->96760 96950->96760 96951->96731 96952->96769 96953->96769 96954->96769 96955->96767 96956->96769 96957->96809 96958->96805 96959->96811 96960->96813 96961->96833 96962->96833 96963->96830 96964->96830 96965->96835 96966->96830 96968 dce684 BuildCatchObjectHelperInternal 96967->96968 96969 dce695 96968->96969 96971 dce6aa 96968->96971 96997 dcf2d9 20 API calls __dosmaperr 96969->96997 96979 dce6a5 __wsopen_s 96971->96979 96980 dc918d EnterCriticalSection 96971->96980 96973 dce69a 96998 dd27ec 26 API calls __wsopen_s 96973->96998 96974 dce6c6 96981 dce602 96974->96981 96977 dce6d1 96999 dce6ee LeaveCriticalSection __fread_nolock 96977->96999 96979->96840 96980->96974 96982 dce60f 96981->96982 96983 dce624 96981->96983 97032 dcf2d9 20 API calls __dosmaperr 96982->97032 96989 dce61f 96983->96989 97000 dcdc0b 96983->97000 96985 dce614 97033 dd27ec 26 API calls __wsopen_s 96985->97033 96989->96977 96993 dce646 97017 dd862f 96993->97017 96997->96973 96998->96979 96999->96979 97001 dcdc1f 97000->97001 97002 dcdc23 97000->97002 97006 dd4d7a 97001->97006 97002->97001 97003 dcd955 __fread_nolock 26 API calls 97002->97003 97004 dcdc43 97003->97004 97040 dd59be 97004->97040 97007 dd4d90 97006->97007 97009 dce640 97006->97009 97008 dd29c8 _free 20 API calls 97007->97008 97007->97009 97008->97009 97010 dcd955 97009->97010 97011 dcd976 97010->97011 97012 dcd961 97010->97012 97011->96993 97172 dcf2d9 20 API calls __dosmaperr 97012->97172 97014 dcd966 97173 dd27ec 26 API calls __wsopen_s 97014->97173 97016 dcd971 97016->96993 97018 dd863e 97017->97018 97019 dd8653 97017->97019 97177 dcf2c6 20 API calls __dosmaperr 97018->97177 97021 dd868e 97019->97021 97024 dd867a 97019->97024 97179 dcf2c6 20 API calls __dosmaperr 97021->97179 97023 dd8643 97178 dcf2d9 20 API calls __dosmaperr 97023->97178 97174 dd8607 97024->97174 97025 dd8693 97180 dcf2d9 20 API calls __dosmaperr 97025->97180 97029 dce64c 97029->96989 97034 dd29c8 97029->97034 97030 dd869b 97181 dd27ec 26 API calls __wsopen_s 97030->97181 97032->96985 97033->96989 97035 dd29fc __dosmaperr 97034->97035 97036 dd29d3 RtlFreeHeap 97034->97036 97035->96989 97036->97035 97037 dd29e8 97036->97037 97231 dcf2d9 20 API calls __dosmaperr 97037->97231 97039 dd29ee GetLastError 97039->97035 97041 dd59ca BuildCatchObjectHelperInternal 97040->97041 97042 dd59ea 97041->97042 97043 dd59d2 97041->97043 97044 dd5a88 97042->97044 97049 dd5a1f 97042->97049 97119 dcf2c6 20 API calls __dosmaperr 97043->97119 97124 dcf2c6 20 API calls __dosmaperr 97044->97124 97047 dd59d7 97120 dcf2d9 20 API calls __dosmaperr 97047->97120 97048 dd5a8d 97125 dcf2d9 20 API calls __dosmaperr 97048->97125 97065 dd5147 EnterCriticalSection 97049->97065 97053 dd59df __wsopen_s 97053->97001 97054 dd5a95 97126 dd27ec 26 API calls __wsopen_s 97054->97126 97055 dd5a25 97057 dd5a56 97055->97057 97058 dd5a41 97055->97058 97066 dd5aa9 97057->97066 97121 dcf2d9 20 API calls __dosmaperr 97058->97121 97061 dd5a46 97122 dcf2c6 20 API calls __dosmaperr 97061->97122 97062 dd5a51 97123 dd5a80 LeaveCriticalSection __wsopen_s 97062->97123 97065->97055 97067 dd5ad7 97066->97067 97096 dd5ad0 97066->97096 97068 dd5adb 97067->97068 97069 dd5afa 97067->97069 97134 dcf2c6 20 API calls __dosmaperr 97068->97134 97072 dd5b4b 97069->97072 97073 dd5b2e 97069->97073 97077 dd5b61 97072->97077 97140 dd9424 28 API calls __wsopen_s 97072->97140 97137 dcf2c6 20 API calls __dosmaperr 97073->97137 97074 dd5cb1 97074->97062 97075 dd5ae0 97135 dcf2d9 20 API calls __dosmaperr 97075->97135 97127 dd564e 97077->97127 97079 dd5b33 97138 dcf2d9 20 API calls __dosmaperr 97079->97138 97081 dd5ae7 97136 dd27ec 26 API calls __wsopen_s 97081->97136 97086 dd5b6f 97089 dd5b95 97086->97089 97090 dd5b73 97086->97090 97087 dd5ba8 97092 dd5bbc 97087->97092 97093 dd5c02 WriteFile 97087->97093 97088 dd5b3b 97139 dd27ec 26 API calls __wsopen_s 97088->97139 97142 dd542e 45 API calls 3 library calls 97089->97142 97094 dd5c69 97090->97094 97141 dd55e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 97090->97141 97098 dd5bc4 97092->97098 97099 dd5bf2 97092->97099 97097 dd5c25 GetLastError 97093->97097 97102 dd5b8b 97093->97102 97094->97096 97149 dcf2d9 20 API calls __dosmaperr 97094->97149 97151 dc0a8c 97096->97151 97097->97102 97103 dd5bc9 97098->97103 97104 dd5be2 97098->97104 97145 dd56c4 7 API calls 2 library calls 97099->97145 97102->97094 97102->97096 97110 dd5c45 97102->97110 97103->97094 97108 dd5bd2 97103->97108 97144 dd5891 8 API calls 2 library calls 97104->97144 97106 dd5be0 97106->97102 97143 dd57a3 7 API calls 2 library calls 97108->97143 97109 dd5c8e 97150 dcf2c6 20 API calls __dosmaperr 97109->97150 97113 dd5c4c 97110->97113 97114 dd5c60 97110->97114 97146 dcf2d9 20 API calls __dosmaperr 97113->97146 97148 dcf2a3 20 API calls __dosmaperr 97114->97148 97117 dd5c51 97147 dcf2c6 20 API calls __dosmaperr 97117->97147 97119->97047 97120->97053 97121->97061 97122->97062 97123->97053 97124->97048 97125->97054 97126->97053 97158 ddf89b 97127->97158 97129 dd565e 97130 dd5663 97129->97130 97167 dd2d74 38 API calls 3 library calls 97129->97167 97130->97086 97130->97087 97132 dd5686 97132->97130 97133 dd56a4 GetConsoleMode 97132->97133 97133->97130 97134->97075 97135->97081 97136->97096 97137->97079 97138->97088 97139->97096 97140->97077 97141->97102 97142->97102 97143->97106 97144->97106 97145->97106 97146->97117 97147->97096 97148->97096 97149->97109 97150->97096 97152 dc0a95 97151->97152 97153 dc0a97 IsProcessorFeaturePresent 97151->97153 97152->97074 97155 dc0c5d 97153->97155 97171 dc0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97155->97171 97157 dc0d40 97157->97074 97159 ddf8a8 97158->97159 97160 ddf8b5 97158->97160 97168 dcf2d9 20 API calls __dosmaperr 97159->97168 97162 ddf8c1 97160->97162 97169 dcf2d9 20 API calls __dosmaperr 97160->97169 97162->97129 97164 ddf8ad 97164->97129 97165 ddf8e2 97170 dd27ec 26 API calls __wsopen_s 97165->97170 97167->97132 97168->97164 97169->97165 97170->97164 97171->97157 97172->97014 97173->97016 97182 dd8585 97174->97182 97176 dd862b 97176->97029 97177->97023 97178->97029 97179->97025 97180->97030 97181->97029 97183 dd8591 BuildCatchObjectHelperInternal 97182->97183 97193 dd5147 EnterCriticalSection 97183->97193 97185 dd859f 97186 dd85c6 97185->97186 97187 dd85d1 97185->97187 97194 dd86ae 97186->97194 97209 dcf2d9 20 API calls __dosmaperr 97187->97209 97190 dd85cc 97210 dd85fb LeaveCriticalSection __wsopen_s 97190->97210 97192 dd85ee __wsopen_s 97192->97176 97193->97185 97211 dd53c4 97194->97211 97196 dd86c4 97224 dd5333 21 API calls 2 library calls 97196->97224 97198 dd86be 97198->97196 97199 dd86f6 97198->97199 97202 dd53c4 __wsopen_s 26 API calls 97198->97202 97199->97196 97200 dd53c4 __wsopen_s 26 API calls 97199->97200 97203 dd8702 CloseHandle 97200->97203 97201 dd871c 97204 dd873e 97201->97204 97225 dcf2a3 20 API calls __dosmaperr 97201->97225 97205 dd86ed 97202->97205 97203->97196 97206 dd870e GetLastError 97203->97206 97204->97190 97208 dd53c4 __wsopen_s 26 API calls 97205->97208 97206->97196 97208->97199 97209->97190 97210->97192 97212 dd53e6 97211->97212 97213 dd53d1 97211->97213 97218 dd540b 97212->97218 97228 dcf2c6 20 API calls __dosmaperr 97212->97228 97226 dcf2c6 20 API calls __dosmaperr 97213->97226 97216 dd53d6 97227 dcf2d9 20 API calls __dosmaperr 97216->97227 97218->97198 97219 dd5416 97229 dcf2d9 20 API calls __dosmaperr 97219->97229 97220 dd53de 97220->97198 97222 dd541e 97230 dd27ec 26 API calls __wsopen_s 97222->97230 97224->97201 97225->97204 97226->97216 97227->97220 97228->97219 97229->97222 97230->97220 97231->97039 97233 e10f7e 97232->97233 97246 e11097 97232->97246 97234 e10f9e 97233->97234 97235 e10fcb 97233->97235 97237 e10fe2 97233->97237 97234->97235 97240 e10fb2 97234->97240 97236 dbfe0b 22 API calls 97235->97236 97250 e10fc0 __fread_nolock 97236->97250 97238 dbfe0b 22 API calls 97237->97238 97247 e10fff 97237->97247 97238->97247 97239 e11026 97242 dbfe0b 22 API calls 97239->97242 97241 dbfe0b 22 API calls 97240->97241 97241->97250 97244 e1102c 97242->97244 97243 dbfddb 22 API calls 97243->97246 97251 dbf1d8 22 API calls 97244->97251 97246->96847 97247->97239 97247->97240 97247->97250 97248 e11038 97252 dbf6c9 24 API calls 97248->97252 97250->97243 97251->97248 97252->97250 97291 da7510 97253->97291 97257 e28281 97258 e2844f 97257->97258 97262 e2828f 97257->97262 97354 e28ee4 60 API calls 97258->97354 97261 e2845e 97261->97262 97263 e2846a 97261->97263 97327 e27e86 97262->97327 97279 e27fd5 ISource 97263->97279 97264 da7510 53 API calls 97282 e28049 97264->97282 97269 e282c8 97342 dbfc70 97269->97342 97272 e28302 97349 da63eb 22 API calls 97272->97349 97273 e282e8 97348 e1359c 82 API calls __wsopen_s 97273->97348 97276 e282f3 GetCurrentProcess TerminateProcess 97276->97272 97277 e28311 97350 da6a50 22 API calls 97277->97350 97279->96850 97280 e2832a 97290 e28352 97280->97290 97351 db04f0 22 API calls 97280->97351 97282->97257 97282->97264 97282->97279 97346 e0417d 22 API calls __fread_nolock 97282->97346 97347 e2851d 42 API calls _strftime 97282->97347 97283 e284c5 97283->97279 97287 e284d9 FreeLibrary 97283->97287 97284 e28341 97352 e28b7b 75 API calls 97284->97352 97287->97279 97289 daaceb 23 API calls 97289->97290 97290->97283 97290->97289 97353 db04f0 22 API calls 97290->97353 97355 e28b7b 75 API calls 97290->97355 97292 da7522 97291->97292 97293 da7525 97291->97293 97292->97279 97314 e28cd3 97292->97314 97294 da755b 97293->97294 97295 da752d 97293->97295 97297 de50f6 97294->97297 97300 da756d 97294->97300 97305 de500f 97294->97305 97356 dc51c6 26 API calls 97295->97356 97359 dc5183 26 API calls 97297->97359 97298 da753d 97304 dbfddb 22 API calls 97298->97304 97357 dbfb21 51 API calls 97300->97357 97301 de510e 97301->97301 97306 da7547 97304->97306 97308 dbfe0b 22 API calls 97305->97308 97313 de5088 97305->97313 97307 da9cb3 22 API calls 97306->97307 97307->97292 97309 de5058 97308->97309 97310 dbfddb 22 API calls 97309->97310 97311 de507f 97310->97311 97312 da9cb3 22 API calls 97311->97312 97312->97313 97358 dbfb21 51 API calls 97313->97358 97315 daaec9 22 API calls 97314->97315 97316 e28cee CharLowerBuffW 97315->97316 97360 e08e54 97316->97360 97320 daa961 22 API calls 97321 e28d2a 97320->97321 97367 da6d25 97321->97367 97323 e28d3e 97324 da93b2 22 API calls 97323->97324 97326 e28d48 _wcslen 97324->97326 97325 e28e5e _wcslen 97325->97282 97326->97325 97380 e2851d 42 API calls _strftime 97326->97380 97328 e27ea1 97327->97328 97332 e27eec 97327->97332 97329 dbfe0b 22 API calls 97328->97329 97331 e27ec3 97329->97331 97330 dbfddb 22 API calls 97330->97331 97331->97330 97331->97332 97333 e29096 97332->97333 97334 e292ab ISource 97333->97334 97340 e290ba _strcat _wcslen 97333->97340 97334->97269 97335 dab38f 39 API calls 97335->97340 97336 dab567 39 API calls 97336->97340 97337 dab6b5 39 API calls 97337->97340 97338 da7510 53 API calls 97338->97340 97339 dcea0c 21 API calls ___std_exception_copy 97339->97340 97340->97334 97340->97335 97340->97336 97340->97337 97340->97338 97340->97339 97384 e0efae 24 API calls _wcslen 97340->97384 97344 dbfc85 97342->97344 97343 dbfd1d VirtualProtect 97345 dbfceb 97343->97345 97344->97343 97344->97345 97345->97272 97345->97273 97346->97282 97347->97282 97348->97276 97349->97277 97350->97280 97351->97284 97352->97290 97353->97290 97354->97261 97355->97290 97356->97298 97357->97298 97358->97297 97359->97301 97361 e08e74 _wcslen 97360->97361 97362 e08f63 97361->97362 97365 e08ea9 97361->97365 97366 e08f68 97361->97366 97362->97320 97362->97326 97365->97362 97381 dbce60 41 API calls 97365->97381 97366->97362 97382 dbce60 41 API calls 97366->97382 97368 da6d91 97367->97368 97369 da6d34 97367->97369 97370 da93b2 22 API calls 97368->97370 97369->97368 97371 da6d3f 97369->97371 97372 da6d62 __fread_nolock 97370->97372 97373 da6d5a 97371->97373 97374 de4c9d 97371->97374 97372->97323 97383 da6f34 22 API calls 97373->97383 97375 dbfddb 22 API calls 97374->97375 97377 de4ca7 97375->97377 97378 dbfe0b 22 API calls 97377->97378 97379 de4cda 97378->97379 97380->97325 97381->97365 97382->97366 97383->97372 97384->97340 97414 da6270 97385->97414 97387 da9fd2 97420 daa4a1 22 API calls __fread_nolock 97387->97420 97389 da9fec 97389->96855 97392 da9eb5 97392->97387 97393 daa12c __fread_nolock 97392->97393 97394 def7c4 97392->97394 97395 daa6c3 22 API calls 97392->97395 97397 def699 97392->97397 97405 daa405 97392->97405 97408 daa587 22 API calls 97392->97408 97409 daaec9 22 API calls 97392->97409 97412 daa4a1 22 API calls 97392->97412 97419 da4573 41 API calls _wcslen 97392->97419 97422 da48c8 23 API calls 97392->97422 97423 da49bd 22 API calls __fread_nolock 97392->97423 97424 daa673 22 API calls 97392->97424 97393->97394 97393->97405 97425 e096e2 84 API calls __wsopen_s 97394->97425 97395->97392 97401 dbfddb 22 API calls 97397->97401 97400 def7d2 97426 daa4a1 22 API calls __fread_nolock 97400->97426 97402 def754 97401->97402 97406 dbfe0b 22 API calls 97402->97406 97404 def7e8 97404->97389 97405->97389 97427 e096e2 84 API calls __wsopen_s 97405->97427 97406->97393 97408->97392 97410 daa0db CharUpperBuffW 97409->97410 97421 daa673 22 API calls 97410->97421 97412->97392 97413->96859 97415 dbfe0b 22 API calls 97414->97415 97416 da6295 97415->97416 97417 dbfddb 22 API calls 97416->97417 97418 da62a3 97417->97418 97418->97392 97419->97392 97420->97389 97421->97392 97422->97392 97423->97392 97424->97392 97425->97400 97426->97404 97427->97389 97429 e0d4d5 97428->97429 97430 e0dbdc GetFileAttributesW 97428->97430 97429->96772 97430->97429 97431 e0dbe8 FindFirstFileW 97430->97431 97431->97429 97432 e0dbf9 FindClose 97431->97432 97432->97429 97621 da4e90 LoadLibraryA 97433->97621 97438 de3ccf 97440 da4f39 68 API calls 97438->97440 97439 da4ef6 LoadLibraryExW 97629 da4e59 LoadLibraryA 97439->97629 97442 de3cd6 97440->97442 97444 da4e59 3 API calls 97442->97444 97446 de3cde 97444->97446 97651 da50f5 97446->97651 97447 da4f20 97447->97446 97448 da4f2c 97447->97448 97450 da4f39 68 API calls 97448->97450 97451 da4f31 97450->97451 97451->96881 97451->96884 97454 de3d05 97456 daa961 22 API calls 97455->97456 97457 da5275 97456->97457 97458 daa961 22 API calls 97457->97458 97459 da527d 97458->97459 97460 daa961 22 API calls 97459->97460 97461 da5285 97460->97461 97462 daa961 22 API calls 97461->97462 97463 da528d 97462->97463 97464 de3df5 97463->97464 97465 da52c1 97463->97465 97466 daa8c7 22 API calls 97464->97466 97467 da6d25 22 API calls 97465->97467 97469 de3dfe 97466->97469 97468 da52cf 97467->97468 97470 da93b2 22 API calls 97468->97470 97471 daa6c3 22 API calls 97469->97471 97472 da52d9 97470->97472 97473 da5304 97471->97473 97472->97473 97474 da6d25 22 API calls 97472->97474 97475 da5325 97473->97475 97490 da5349 97473->97490 97494 de3e20 97473->97494 97477 da52fa 97474->97477 97479 da4c6d 22 API calls 97475->97479 97475->97490 97476 da6d25 22 API calls 97481 da535a 97476->97481 97478 da93b2 22 API calls 97477->97478 97478->97473 97484 da5332 97479->97484 97480 da6b57 22 API calls 97493 de3ee0 97480->97493 97482 da5370 97481->97482 97485 daa8c7 22 API calls 97481->97485 97483 da5384 97482->97483 97488 daa8c7 22 API calls 97482->97488 97486 da538f 97483->97486 97489 daa8c7 22 API calls 97483->97489 97487 da6d25 22 API calls 97484->97487 97484->97490 97485->97482 97491 daa8c7 22 API calls 97486->97491 97495 da539a 97486->97495 97487->97490 97488->97483 97489->97486 97490->97476 97491->97495 97492 da4c6d 22 API calls 97492->97493 97493->97490 97493->97492 97891 da49bd 22 API calls __fread_nolock 97493->97891 97494->97480 97495->96916 97498 daaec9 22 API calls 97497->97498 97499 da4c78 97498->97499 97499->96920 97499->96921 97501 da6362 97500->97501 97502 de4a51 97500->97502 97892 da6373 97501->97892 97902 da4a88 22 API calls __fread_nolock 97502->97902 97505 da636e 97505->96929 97506 de4a5b 97507 daa8c7 22 API calls 97506->97507 97508 de4a67 97506->97508 97507->97508 97510 e0d7d8 97509->97510 97511 e0d7f3 97510->97511 97512 e0d7dd 97510->97512 97513 daa961 22 API calls 97511->97513 97515 daa8c7 22 API calls 97512->97515 97562 e0d7ee 97512->97562 97514 e0d7fb 97513->97514 97516 daa961 22 API calls 97514->97516 97515->97562 97517 e0d803 97516->97517 97518 daa961 22 API calls 97517->97518 97519 e0d80e 97518->97519 97520 daa961 22 API calls 97519->97520 97521 e0d816 97520->97521 97522 daa961 22 API calls 97521->97522 97523 e0d81e 97522->97523 97524 daa961 22 API calls 97523->97524 97525 e0d826 97524->97525 97526 daa961 22 API calls 97525->97526 97527 e0d82e 97526->97527 97528 daa961 22 API calls 97527->97528 97529 e0d836 97528->97529 97530 da525f 22 API calls 97529->97530 97531 e0d84d 97530->97531 97532 da525f 22 API calls 97531->97532 97533 e0d866 97532->97533 97534 da4c6d 22 API calls 97533->97534 97535 e0d872 97534->97535 97536 e0d885 97535->97536 97537 da93b2 22 API calls 97535->97537 97538 da4c6d 22 API calls 97536->97538 97537->97536 97539 e0d88e 97538->97539 97540 e0d89e 97539->97540 97541 da93b2 22 API calls 97539->97541 97542 e0d8b0 97540->97542 97543 daa8c7 22 API calls 97540->97543 97541->97540 97544 da6350 22 API calls 97542->97544 97543->97542 97545 e0d8bb 97544->97545 97903 e0d978 22 API calls 97545->97903 97547 e0d8ca 97904 e0d978 22 API calls 97547->97904 97549 e0d8dd 97550 da4c6d 22 API calls 97549->97550 97551 e0d8e7 97550->97551 97552 e0d8ec 97551->97552 97553 e0d8fe 97551->97553 97554 da33c6 22 API calls 97552->97554 97555 da4c6d 22 API calls 97553->97555 97556 e0d8f9 97554->97556 97557 e0d907 97555->97557 97560 da6350 22 API calls 97556->97560 97558 e0d925 97557->97558 97559 da33c6 22 API calls 97557->97559 97561 da6350 22 API calls 97558->97561 97559->97556 97560->97558 97561->97562 97562->96937 97564 e12954 __wsopen_s 97563->97564 97565 dbfe0b 22 API calls 97564->97565 97566 e12971 97565->97566 97567 da5722 22 API calls 97566->97567 97568 e1297b 97567->97568 97569 e1274e 27 API calls 97568->97569 97570 e12986 97569->97570 97571 da511f 64 API calls 97570->97571 97572 e1299b 97571->97572 97573 e12a6c 97572->97573 97574 e129bf 97572->97574 97575 e12e66 75 API calls 97573->97575 97918 e12e66 97574->97918 97591 e12a38 97575->97591 97579 da50f5 40 API calls 97580 e12a91 97579->97580 97581 da50f5 40 API calls 97580->97581 97584 e12aa1 97581->97584 97582 e12a75 ISource 97582->96944 97583 e129ed 97925 dcd583 26 API calls 97583->97925 97585 da50f5 40 API calls 97584->97585 97587 e12abc 97585->97587 97588 da50f5 40 API calls 97587->97588 97589 e12acc 97588->97589 97590 da50f5 40 API calls 97589->97590 97592 e12ae7 97590->97592 97591->97579 97591->97582 97593 da50f5 40 API calls 97592->97593 97594 e12af7 97593->97594 97595 da50f5 40 API calls 97594->97595 97596 e12b07 97595->97596 97597 da50f5 40 API calls 97596->97597 97598 e12b17 97597->97598 97905 e13017 GetTempPathW GetTempFileNameW 97598->97905 97600 e12b22 97601 dce5eb 29 API calls 97600->97601 97602 e12b33 97601->97602 97602->97582 97605 da50f5 40 API calls 97602->97605 97614 e12bed 97602->97614 97906 dcdbb3 97602->97906 97603 dce678 67 API calls 97604 e12bf8 97603->97604 97606 e12c12 97604->97606 97607 e12bfe DeleteFileW 97604->97607 97605->97602 97608 e12c91 CopyFileW 97606->97608 97613 e12c18 97606->97613 97607->97582 97609 e12ca7 DeleteFileW 97608->97609 97610 e12cb9 DeleteFileW 97608->97610 97609->97582 97915 e12fd8 CreateFileW 97610->97915 97926 e122ce 97613->97926 97614->97603 97617 e12c80 DeleteFileW 97617->97582 97618->96871 97619->96904 97620->96917 97622 da4ea8 GetProcAddress 97621->97622 97623 da4ec6 97621->97623 97624 da4eb8 97622->97624 97626 dce5eb 97623->97626 97624->97623 97625 da4ebf FreeLibrary 97624->97625 97625->97623 97659 dce52a 97626->97659 97628 da4eea 97628->97438 97628->97439 97630 da4e6e GetProcAddress 97629->97630 97631 da4e8d 97629->97631 97632 da4e7e 97630->97632 97634 da4f80 97631->97634 97632->97631 97633 da4e86 FreeLibrary 97632->97633 97633->97631 97635 dbfe0b 22 API calls 97634->97635 97636 da4f95 97635->97636 97637 da5722 22 API calls 97636->97637 97638 da4fa1 __fread_nolock 97637->97638 97639 de3d1d 97638->97639 97640 da50a5 97638->97640 97650 da4fdc 97638->97650 97731 e1304d 74 API calls 97639->97731 97720 da42a2 CreateStreamOnHGlobal 97640->97720 97643 de3d22 97645 da511f 64 API calls 97643->97645 97644 da50f5 40 API calls 97644->97650 97646 de3d45 97645->97646 97647 da50f5 40 API calls 97646->97647 97649 da506e ISource 97647->97649 97649->97447 97650->97643 97650->97644 97650->97649 97726 da511f 97650->97726 97652 da5107 97651->97652 97653 de3d70 97651->97653 97753 dce8c4 97652->97753 97656 e128fe 97874 e1274e 97656->97874 97658 e12919 97658->97454 97662 dce536 BuildCatchObjectHelperInternal 97659->97662 97660 dce544 97684 dcf2d9 20 API calls __dosmaperr 97660->97684 97662->97660 97664 dce574 97662->97664 97663 dce549 97685 dd27ec 26 API calls __wsopen_s 97663->97685 97665 dce579 97664->97665 97666 dce586 97664->97666 97686 dcf2d9 20 API calls __dosmaperr 97665->97686 97676 dd8061 97666->97676 97670 dce58f 97672 dce595 97670->97672 97673 dce5a2 97670->97673 97671 dce554 __wsopen_s 97671->97628 97687 dcf2d9 20 API calls __dosmaperr 97672->97687 97688 dce5d4 LeaveCriticalSection __fread_nolock 97673->97688 97677 dd806d BuildCatchObjectHelperInternal 97676->97677 97689 dd2f5e EnterCriticalSection 97677->97689 97679 dd807b 97690 dd80fb 97679->97690 97683 dd80ac __wsopen_s 97683->97670 97684->97663 97685->97671 97686->97671 97687->97671 97688->97671 97689->97679 97691 dd811e 97690->97691 97692 dd8177 97691->97692 97699 dd8088 97691->97699 97706 dc918d EnterCriticalSection 97691->97706 97707 dc91a1 LeaveCriticalSection 97691->97707 97708 dd4c7d 97692->97708 97696 dd29c8 _free 20 API calls 97697 dd8189 97696->97697 97697->97699 97715 dd3405 11 API calls 2 library calls 97697->97715 97703 dd80b7 97699->97703 97700 dd81a8 97716 dc918d EnterCriticalSection 97700->97716 97719 dd2fa6 LeaveCriticalSection 97703->97719 97705 dd80be 97705->97683 97706->97691 97707->97691 97713 dd4c8a pre_c_initialization 97708->97713 97709 dd4cca 97718 dcf2d9 20 API calls __dosmaperr 97709->97718 97710 dd4cb5 RtlAllocateHeap 97711 dd4cc8 97710->97711 97710->97713 97711->97696 97713->97709 97713->97710 97717 dc4ead 7 API calls 2 library calls 97713->97717 97715->97700 97716->97699 97717->97713 97718->97711 97719->97705 97721 da42d9 97720->97721 97722 da42bc FindResourceExW 97720->97722 97721->97650 97722->97721 97723 de35ba LoadResource 97722->97723 97723->97721 97724 de35cf SizeofResource 97723->97724 97724->97721 97725 de35e3 LockResource 97724->97725 97725->97721 97727 da512e 97726->97727 97728 de3d90 97726->97728 97732 dcece3 97727->97732 97731->97643 97735 dceaaa 97732->97735 97734 da513c 97734->97650 97736 dceab6 BuildCatchObjectHelperInternal 97735->97736 97737 dceac2 97736->97737 97739 dceae8 97736->97739 97748 dcf2d9 20 API calls __dosmaperr 97737->97748 97750 dc918d EnterCriticalSection 97739->97750 97740 dceac7 97749 dd27ec 26 API calls __wsopen_s 97740->97749 97743 dceaf4 97751 dcec0a 62 API calls 2 library calls 97743->97751 97745 dceb08 97752 dceb27 LeaveCriticalSection __fread_nolock 97745->97752 97747 dcead2 __wsopen_s 97747->97734 97748->97740 97749->97747 97750->97743 97751->97745 97752->97747 97756 dce8e1 97753->97756 97755 da5118 97755->97656 97757 dce8ed BuildCatchObjectHelperInternal 97756->97757 97758 dce925 __wsopen_s 97757->97758 97759 dce92d 97757->97759 97760 dce900 ___scrt_fastfail 97757->97760 97758->97755 97769 dc918d EnterCriticalSection 97759->97769 97783 dcf2d9 20 API calls __dosmaperr 97760->97783 97763 dce937 97770 dce6f8 97763->97770 97764 dce91a 97784 dd27ec 26 API calls __wsopen_s 97764->97784 97769->97763 97771 dce727 97770->97771 97774 dce70a ___scrt_fastfail 97770->97774 97785 dce96c LeaveCriticalSection __fread_nolock 97771->97785 97772 dce717 97851 dcf2d9 20 API calls __dosmaperr 97772->97851 97774->97771 97774->97772 97776 dce76a __fread_nolock 97774->97776 97776->97771 97777 dce886 ___scrt_fastfail 97776->97777 97779 dcd955 __fread_nolock 26 API calls 97776->97779 97786 dd8d45 97776->97786 97853 dccf78 26 API calls 4 library calls 97776->97853 97854 dcf2d9 20 API calls __dosmaperr 97777->97854 97779->97776 97781 dce71c 97852 dd27ec 26 API calls __wsopen_s 97781->97852 97783->97764 97784->97758 97785->97758 97787 dd8d6f 97786->97787 97788 dd8d57 97786->97788 97790 dd90d9 97787->97790 97795 dd8db4 97787->97795 97855 dcf2c6 20 API calls __dosmaperr 97788->97855 97871 dcf2c6 20 API calls __dosmaperr 97790->97871 97791 dd8d5c 97856 dcf2d9 20 API calls __dosmaperr 97791->97856 97794 dd90de 97872 dcf2d9 20 API calls __dosmaperr 97794->97872 97797 dd8dbf 97795->97797 97799 dd8d64 97795->97799 97803 dd8def 97795->97803 97857 dcf2c6 20 API calls __dosmaperr 97797->97857 97799->97776 97800 dd8dcc 97873 dd27ec 26 API calls __wsopen_s 97800->97873 97801 dd8dc4 97858 dcf2d9 20 API calls __dosmaperr 97801->97858 97805 dd8e08 97803->97805 97806 dd8e2e 97803->97806 97807 dd8e4a 97803->97807 97805->97806 97811 dd8e15 97805->97811 97859 dcf2c6 20 API calls __dosmaperr 97806->97859 97862 dd3820 21 API calls 2 library calls 97807->97862 97810 dd8e33 97860 dcf2d9 20 API calls __dosmaperr 97810->97860 97813 ddf89b __fread_nolock 26 API calls 97811->97813 97812 dd8e61 97817 dd29c8 _free 20 API calls 97812->97817 97815 dd8fb3 97813->97815 97818 dd9029 97815->97818 97821 dd8fcc GetConsoleMode 97815->97821 97816 dd8e3a 97861 dd27ec 26 API calls __wsopen_s 97816->97861 97820 dd8e6a 97817->97820 97823 dd902d ReadFile 97818->97823 97822 dd29c8 _free 20 API calls 97820->97822 97821->97818 97826 dd8fdd 97821->97826 97827 dd8e71 97822->97827 97824 dd9047 97823->97824 97825 dd90a1 GetLastError 97823->97825 97824->97825 97830 dd901e 97824->97830 97828 dd90ae 97825->97828 97829 dd9005 97825->97829 97826->97823 97831 dd8fe3 ReadConsoleW 97826->97831 97832 dd8e7b 97827->97832 97833 dd8e96 97827->97833 97869 dcf2d9 20 API calls __dosmaperr 97828->97869 97837 dd8e45 __fread_nolock 97829->97837 97866 dcf2a3 20 API calls __dosmaperr 97829->97866 97830->97837 97844 dd906c 97830->97844 97845 dd9083 97830->97845 97831->97830 97836 dd8fff GetLastError 97831->97836 97863 dcf2d9 20 API calls __dosmaperr 97832->97863 97865 dd9424 28 API calls __wsopen_s 97833->97865 97836->97829 97838 dd29c8 _free 20 API calls 97837->97838 97838->97799 97840 dd90b3 97870 dcf2c6 20 API calls __dosmaperr 97840->97870 97842 dd8e80 97864 dcf2c6 20 API calls __dosmaperr 97842->97864 97867 dd8a61 31 API calls 3 library calls 97844->97867 97845->97837 97848 dd909a 97845->97848 97868 dd88a1 29 API calls __wsopen_s 97848->97868 97850 dd909f 97850->97837 97851->97781 97852->97771 97853->97776 97854->97781 97855->97791 97856->97799 97857->97801 97858->97800 97859->97810 97860->97816 97861->97837 97862->97812 97863->97842 97864->97837 97865->97811 97866->97837 97867->97837 97868->97850 97869->97840 97870->97837 97871->97794 97872->97800 97873->97799 97877 dce4e8 97874->97877 97876 e1275d 97876->97658 97880 dce469 97877->97880 97879 dce505 97879->97876 97881 dce48c 97880->97881 97882 dce478 97880->97882 97887 dce488 __alldvrm 97881->97887 97890 dd333f 11 API calls 2 library calls 97881->97890 97888 dcf2d9 20 API calls __dosmaperr 97882->97888 97885 dce47d 97889 dd27ec 26 API calls __wsopen_s 97885->97889 97887->97879 97888->97885 97889->97887 97890->97887 97891->97493 97893 da6382 97892->97893 97899 da63b6 __fread_nolock 97892->97899 97894 de4a82 97893->97894 97895 da63a9 97893->97895 97893->97899 97896 dbfddb 22 API calls 97894->97896 97897 daa587 22 API calls 97895->97897 97898 de4a91 97896->97898 97897->97899 97900 dbfe0b 22 API calls 97898->97900 97899->97505 97901 de4ac5 __fread_nolock 97900->97901 97902->97506 97903->97547 97904->97549 97905->97600 97907 dcdbc1 97906->97907 97913 dcdbdd 97906->97913 97908 dcdbcd 97907->97908 97909 dcdbe3 97907->97909 97907->97913 97958 dcf2d9 20 API calls __dosmaperr 97908->97958 97955 dcd9cc 97909->97955 97912 dcdbd2 97959 dd27ec 26 API calls __wsopen_s 97912->97959 97913->97602 97916 e13013 97915->97916 97917 e12fff SetFileTime CloseHandle 97915->97917 97916->97582 97917->97916 97923 e12e7a 97918->97923 97919 e129c4 97919->97582 97924 dcd583 26 API calls 97919->97924 97920 da50f5 40 API calls 97920->97923 97921 e128fe 27 API calls 97921->97923 97922 da511f 64 API calls 97922->97923 97923->97919 97923->97920 97923->97921 97923->97922 97924->97583 97925->97591 97927 e122d9 97926->97927 97928 e122e7 97926->97928 97929 dce5eb 29 API calls 97927->97929 97930 e1232c 97928->97930 97931 dce5eb 29 API calls 97928->97931 97941 e122f0 97928->97941 97929->97928 98001 e12557 97930->98001 97932 e12311 97931->97932 97932->97930 97934 e1231a 97932->97934 97938 dce678 67 API calls 97934->97938 97934->97941 97935 e12370 97936 e12395 97935->97936 97937 e12374 97935->97937 98005 e12171 97936->98005 97940 e12381 97937->97940 97943 dce678 67 API calls 97937->97943 97938->97941 97940->97941 97944 dce678 67 API calls 97940->97944 97941->97610 97941->97617 97942 e1239d 97945 e123c3 97942->97945 97943->97940 97944->97941 97960 dcd97b 97955->97960 97958->97912 97959->97913 97961 dcd987 BuildCatchObjectHelperInternal 97960->97961 97968 dc918d EnterCriticalSection 97961->97968 97963 dcd995 97969 dcd9f4 97963->97969 97968->97963 97977 dd49a1 97969->97977 97975 dcd9a2 97976 dcd9c0 LeaveCriticalSection __fread_nolock 97975->97976 97978 dcd955 __fread_nolock 26 API calls 97977->97978 97979 dd49b0 97978->97979 97980 ddf89b __fread_nolock 26 API calls 97979->97980 97981 dd49b6 97980->97981 97982 dcda09 97981->97982 97998 dd3820 21 API calls 2 library calls 97981->97998 97986 dcda3a 97982->97986 97984 dd4a15 97985 dd29c8 _free 20 API calls 97984->97985 97985->97982 97988 dcda4c 97986->97988 97992 dcda24 97986->97992 97987 dcda5a 97999 dcf2d9 20 API calls __dosmaperr 97987->97999 97988->97987 97988->97992 97996 dcda85 __fread_nolock 97988->97996 97990 dcda5f 97997 dd4a56 62 API calls 97992->97997 97993 dcdc0b 62 API calls 97993->97996 97994 dcd955 __fread_nolock 26 API calls 97994->97996 97995 dd59be __wsopen_s 62 API calls 97995->97996 97996->97992 97996->97993 97996->97994 97996->97995 97997->97975 97998->97984 97999->97990 98002 e12565 __fread_nolock 98001->98002 98003 e1257c 98001->98003 98002->97935 98004 dce8c4 __fread_nolock 40 API calls 98003->98004 98004->98002 98006 dcea0c ___std_exception_copy 21 API calls 98005->98006 98007 e1217f 98006->98007 98008 dcea0c ___std_exception_copy 21 API calls 98007->98008 98009 e12190 98008->98009 98010 dcea0c ___std_exception_copy 21 API calls 98009->98010 98011 e1219c 98010->98011 98011->97942 98030->96794 98031 dd90fa 98032 dd9107 98031->98032 98036 dd911f 98031->98036 98081 dcf2d9 20 API calls __dosmaperr 98032->98081 98034 dd910c 98082 dd27ec 26 API calls __wsopen_s 98034->98082 98037 dd917a 98036->98037 98045 dd9117 98036->98045 98083 ddfdc4 21 API calls 2 library calls 98036->98083 98039 dcd955 __fread_nolock 26 API calls 98037->98039 98040 dd9192 98039->98040 98051 dd8c32 98040->98051 98042 dd9199 98043 dcd955 __fread_nolock 26 API calls 98042->98043 98042->98045 98044 dd91c5 98043->98044 98044->98045 98046 dcd955 __fread_nolock 26 API calls 98044->98046 98047 dd91d3 98046->98047 98047->98045 98048 dcd955 __fread_nolock 26 API calls 98047->98048 98049 dd91e3 98048->98049 98050 dcd955 __fread_nolock 26 API calls 98049->98050 98050->98045 98052 dd8c3e BuildCatchObjectHelperInternal 98051->98052 98053 dd8c5e 98052->98053 98054 dd8c46 98052->98054 98055 dd8d24 98053->98055 98059 dd8c97 98053->98059 98085 dcf2c6 20 API calls __dosmaperr 98054->98085 98092 dcf2c6 20 API calls __dosmaperr 98055->98092 98058 dd8c4b 98086 dcf2d9 20 API calls __dosmaperr 98058->98086 98062 dd8cbb 98059->98062 98063 dd8ca6 98059->98063 98060 dd8d29 98093 dcf2d9 20 API calls __dosmaperr 98060->98093 98084 dd5147 EnterCriticalSection 98062->98084 98087 dcf2c6 20 API calls __dosmaperr 98063->98087 98067 dd8cb3 98094 dd27ec 26 API calls __wsopen_s 98067->98094 98068 dd8cab 98088 dcf2d9 20 API calls __dosmaperr 98068->98088 98069 dd8cc1 98072 dd8cdd 98069->98072 98073 dd8cf2 98069->98073 98070 dd8c53 __wsopen_s 98070->98042 98089 dcf2d9 20 API calls __dosmaperr 98072->98089 98075 dd8d45 __fread_nolock 38 API calls 98073->98075 98077 dd8ced 98075->98077 98091 dd8d1c LeaveCriticalSection __wsopen_s 98077->98091 98078 dd8ce2 98090 dcf2c6 20 API calls __dosmaperr 98078->98090 98081->98034 98082->98045 98083->98037 98084->98069 98085->98058 98086->98070 98087->98068 98088->98067 98089->98078 98090->98077 98091->98070 98092->98060 98093->98067 98094->98070 98095 dc03fb 98096 dc0407 BuildCatchObjectHelperInternal 98095->98096 98124 dbfeb1 98096->98124 98098 dc040e 98099 dc0561 98098->98099 98102 dc0438 98098->98102 98151 dc083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98099->98151 98101 dc0568 98152 dc4e52 28 API calls _abort 98101->98152 98111 dc0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98102->98111 98135 dd247d 98102->98135 98104 dc056e 98153 dc4e04 28 API calls _abort 98104->98153 98108 dc0576 98109 dc0457 98114 dc04d8 98111->98114 98147 dc4e1a 38 API calls 3 library calls 98111->98147 98143 dc0959 98114->98143 98115 dc04de 98116 dc04f3 98115->98116 98148 dc0992 GetModuleHandleW 98116->98148 98118 dc04fa 98118->98101 98119 dc04fe 98118->98119 98120 dc0507 98119->98120 98149 dc4df5 28 API calls _abort 98119->98149 98150 dc0040 13 API calls 2 library calls 98120->98150 98123 dc050f 98123->98109 98125 dbfeba 98124->98125 98154 dc0698 IsProcessorFeaturePresent 98125->98154 98127 dbfec6 98155 dc2c94 10 API calls 3 library calls 98127->98155 98129 dbfecb 98130 dbfecf 98129->98130 98156 dd2317 98129->98156 98130->98098 98133 dbfee6 98133->98098 98136 dd2494 98135->98136 98137 dc0a8c CatchGuardHandler 5 API calls 98136->98137 98138 dc0451 98137->98138 98138->98109 98139 dd2421 98138->98139 98142 dd2450 98139->98142 98140 dc0a8c CatchGuardHandler 5 API calls 98141 dd2479 98140->98141 98141->98111 98142->98140 98207 dc2340 98143->98207 98146 dc097f 98146->98115 98147->98114 98148->98118 98149->98120 98150->98123 98151->98101 98152->98104 98153->98108 98154->98127 98155->98129 98160 ddd1f6 98156->98160 98159 dc2cbd 8 API calls 3 library calls 98159->98130 98161 ddd20f 98160->98161 98162 ddd213 98160->98162 98163 dc0a8c CatchGuardHandler 5 API calls 98161->98163 98162->98161 98166 dd4bfb 98162->98166 98164 dbfed8 98163->98164 98164->98133 98164->98159 98167 dd4c07 BuildCatchObjectHelperInternal 98166->98167 98178 dd2f5e EnterCriticalSection 98167->98178 98169 dd4c0e 98179 dd50af 98169->98179 98171 dd4c1d 98177 dd4c2c 98171->98177 98192 dd4a8f 29 API calls 98171->98192 98174 dd4c3d __wsopen_s 98174->98162 98175 dd4c27 98193 dd4b45 GetStdHandle GetFileType 98175->98193 98194 dd4c48 LeaveCriticalSection _abort 98177->98194 98178->98169 98180 dd50bb BuildCatchObjectHelperInternal 98179->98180 98181 dd50df 98180->98181 98182 dd50c8 98180->98182 98195 dd2f5e EnterCriticalSection 98181->98195 98203 dcf2d9 20 API calls __dosmaperr 98182->98203 98185 dd50cd 98204 dd27ec 26 API calls __wsopen_s 98185->98204 98187 dd50d7 __wsopen_s 98187->98171 98188 dd5117 98205 dd513e LeaveCriticalSection _abort 98188->98205 98190 dd50eb 98190->98188 98196 dd5000 98190->98196 98192->98175 98193->98177 98194->98174 98195->98190 98197 dd4c7d pre_c_initialization 20 API calls 98196->98197 98200 dd5012 98197->98200 98198 dd501f 98199 dd29c8 _free 20 API calls 98198->98199 98202 dd5071 98199->98202 98200->98198 98206 dd3405 11 API calls 2 library calls 98200->98206 98202->98190 98203->98185 98204->98187 98205->98187 98206->98200 98208 dc096c GetStartupInfoW 98207->98208 98208->98146 98209 da1033 98214 da4c91 98209->98214 98213 da1042 98215 daa961 22 API calls 98214->98215 98216 da4cff 98215->98216 98222 da3af0 98216->98222 98219 da4d9c 98220 da1038 98219->98220 98225 da51f7 22 API calls __fread_nolock 98219->98225 98221 dc00a3 29 API calls __onexit 98220->98221 98221->98213 98226 da3b1c 98222->98226 98225->98219 98227 da3b0f 98226->98227 98228 da3b29 98226->98228 98227->98219 98228->98227 98229 da3b30 RegOpenKeyExW 98228->98229 98229->98227 98230 da3b4a RegQueryValueExW 98229->98230 98231 da3b6b 98230->98231 98232 da3b80 RegCloseKey 98230->98232 98231->98232 98232->98227 98233 df3f75 98244 dbceb1 98233->98244 98235 df3f8b 98243 df4006 98235->98243 98311 dbe300 23 API calls 98235->98311 98238 df4052 98241 df4a88 98238->98241 98313 e1359c 82 API calls __wsopen_s 98238->98313 98240 df3fe6 98240->98238 98312 e11abf 22 API calls 98240->98312 98253 dabf40 98243->98253 98245 dbcebf 98244->98245 98246 dbced2 98244->98246 98247 daaceb 23 API calls 98245->98247 98248 dbced7 98246->98248 98249 dbcf05 98246->98249 98252 dbcec9 98247->98252 98251 dbfddb 22 API calls 98248->98251 98250 daaceb 23 API calls 98249->98250 98250->98252 98251->98252 98252->98235 98314 daadf0 98253->98314 98255 dabf9d 98256 dabfa9 98255->98256 98257 df04b6 98255->98257 98259 df04c6 98256->98259 98260 dac01e 98256->98260 98342 e1359c 82 API calls __wsopen_s 98257->98342 98343 e1359c 82 API calls __wsopen_s 98259->98343 98319 daac91 98260->98319 98263 df055a 98297 dac603 98263->98297 98345 e1359c 82 API calls __wsopen_s 98263->98345 98265 e07120 22 API calls 98307 dac039 ISource __fread_nolock 98265->98307 98268 dbfddb 22 API calls 98268->98307 98269 dac7da 98270 dbfe0b 22 API calls 98269->98270 98277 dac808 __fread_nolock 98270->98277 98272 df04f5 98272->98263 98344 dbd217 235 API calls 98272->98344 98275 dbfe0b 22 API calls 98308 dac350 ISource __fread_nolock 98275->98308 98276 daaf8a 22 API calls 98276->98307 98277->98275 98278 df091a 98354 e13209 23 API calls 98278->98354 98281 daec40 235 API calls 98281->98307 98282 df08a5 98283 daec40 235 API calls 98282->98283 98285 df08cf 98283->98285 98285->98297 98352 daa81b 41 API calls 98285->98352 98286 df0591 98346 e1359c 82 API calls __wsopen_s 98286->98346 98287 df08f6 98353 e1359c 82 API calls __wsopen_s 98287->98353 98291 dabbe0 40 API calls 98291->98307 98293 daaceb 23 API calls 98293->98307 98294 dac237 98295 dac253 98294->98295 98296 daa8c7 22 API calls 98294->98296 98298 df0976 98295->98298 98301 dac297 ISource 98295->98301 98296->98295 98297->98238 98300 daaceb 23 API calls 98298->98300 98303 df09bf 98300->98303 98302 daaceb 23 API calls 98301->98302 98301->98303 98304 dac335 98302->98304 98303->98297 98355 e1359c 82 API calls __wsopen_s 98303->98355 98304->98303 98305 dac342 98304->98305 98330 daa704 98305->98330 98307->98263 98307->98265 98307->98268 98307->98269 98307->98272 98307->98276 98307->98277 98307->98278 98307->98281 98307->98282 98307->98286 98307->98287 98307->98291 98307->98293 98307->98294 98307->98297 98307->98303 98309 dbfe0b 22 API calls 98307->98309 98323 daad81 98307->98323 98347 e07099 22 API calls __fread_nolock 98307->98347 98348 e25745 54 API calls _wcslen 98307->98348 98349 dbaa42 22 API calls ISource 98307->98349 98350 e0f05c 40 API calls 98307->98350 98351 daa993 41 API calls 98307->98351 98310 dac3ac 98308->98310 98341 dbce17 22 API calls ISource 98308->98341 98309->98307 98310->98238 98311->98240 98312->98243 98313->98241 98315 daae01 98314->98315 98318 daae1c ISource 98314->98318 98316 daaec9 22 API calls 98315->98316 98317 daae09 CharUpperBuffW 98316->98317 98317->98318 98318->98255 98320 daacae 98319->98320 98321 daacd1 98320->98321 98356 e1359c 82 API calls __wsopen_s 98320->98356 98321->98307 98324 defadb 98323->98324 98325 daad92 98323->98325 98326 dbfddb 22 API calls 98325->98326 98327 daad99 98326->98327 98357 daadcd 98327->98357 98331 def86f 98330->98331 98334 daa718 98330->98334 98332 def87f 98331->98332 98376 e04d4a 22 API calls ISource 98331->98376 98335 daa746 98334->98335 98340 daa763 ISource 98334->98340 98364 daaf8a 98334->98364 98337 daa74c 98335->98337 98338 daaf8a 22 API calls 98335->98338 98337->98340 98372 dab090 98337->98372 98338->98337 98340->98308 98341->98308 98342->98259 98343->98297 98344->98263 98345->98297 98346->98297 98347->98307 98348->98307 98349->98307 98350->98307 98351->98307 98352->98287 98353->98297 98354->98294 98355->98297 98356->98321 98361 daaddd 98357->98361 98358 daadb6 98358->98307 98359 dbfddb 22 API calls 98359->98361 98360 daa961 22 API calls 98360->98361 98361->98358 98361->98359 98361->98360 98362 daa8c7 22 API calls 98361->98362 98363 daadcd 22 API calls 98361->98363 98362->98361 98363->98361 98365 daaf98 98364->98365 98371 daafc0 ISource 98364->98371 98366 daafa6 98365->98366 98367 daaf8a 22 API calls 98365->98367 98368 daafac 98366->98368 98369 daaf8a 22 API calls 98366->98369 98367->98366 98370 dab090 22 API calls 98368->98370 98368->98371 98369->98368 98370->98371 98371->98335 98374 dab09b ISource 98372->98374 98373 dab0d6 ISource 98373->98340 98374->98373 98377 dbce17 22 API calls ISource 98374->98377 98376->98332 98377->98373 98378 da3156 98381 da3170 98378->98381 98382 da3187 98381->98382 98383 da31eb 98382->98383 98384 da318c 98382->98384 98385 da31e9 98382->98385 98389 de2dfb 98383->98389 98390 da31f1 98383->98390 98386 da3199 98384->98386 98387 da3265 PostQuitMessage 98384->98387 98388 da31d0 DefWindowProcW 98385->98388 98392 de2e7c 98386->98392 98393 da31a4 98386->98393 98394 da316a 98387->98394 98388->98394 98437 da18e2 10 API calls 98389->98437 98395 da31f8 98390->98395 98396 da321d SetTimer RegisterWindowMessageW 98390->98396 98451 e0bf30 34 API calls ___scrt_fastfail 98392->98451 98398 da31ae 98393->98398 98399 de2e68 98393->98399 98402 de2d9c 98395->98402 98403 da3201 KillTimer 98395->98403 98396->98394 98400 da3246 CreatePopupMenu 98396->98400 98397 de2e1c 98438 dbe499 42 API calls 98397->98438 98406 de2e4d 98398->98406 98407 da31b9 98398->98407 98426 e0c161 98399->98426 98400->98394 98409 de2dd7 MoveWindow 98402->98409 98410 de2da1 98402->98410 98433 da30f2 Shell_NotifyIconW ___scrt_fastfail 98403->98433 98406->98388 98450 e00ad7 22 API calls 98406->98450 98413 da31c4 98407->98413 98414 da3253 98407->98414 98408 de2e8e 98408->98388 98408->98394 98409->98394 98415 de2dc6 SetFocus 98410->98415 98416 de2da7 98410->98416 98412 da3214 98434 da3c50 DeleteObject DestroyWindow 98412->98434 98413->98388 98439 da30f2 Shell_NotifyIconW ___scrt_fastfail 98413->98439 98435 da326f 44 API calls ___scrt_fastfail 98414->98435 98415->98394 98416->98413 98419 de2db0 98416->98419 98436 da18e2 10 API calls 98419->98436 98421 da3263 98421->98394 98424 de2e41 98440 da3837 98424->98440 98427 e0c276 98426->98427 98428 e0c179 ___scrt_fastfail 98426->98428 98427->98394 98452 da3923 98428->98452 98430 e0c25f KillTimer SetTimer 98430->98427 98431 e0c1a0 98431->98430 98432 e0c251 Shell_NotifyIconW 98431->98432 98432->98430 98433->98412 98434->98394 98435->98421 98436->98394 98437->98397 98438->98413 98439->98424 98441 da3862 ___scrt_fastfail 98440->98441 98474 da4212 98441->98474 98445 da38e8 98446 de3386 Shell_NotifyIconW 98445->98446 98447 da3906 Shell_NotifyIconW 98445->98447 98448 da3923 24 API calls 98447->98448 98449 da391c 98448->98449 98449->98385 98450->98385 98451->98408 98453 da393f 98452->98453 98472 da3a13 98452->98472 98454 da6270 22 API calls 98453->98454 98455 da394d 98454->98455 98456 da395a 98455->98456 98457 de3393 LoadStringW 98455->98457 98458 da6b57 22 API calls 98456->98458 98459 de33ad 98457->98459 98460 da396f 98458->98460 98463 daa8c7 22 API calls 98459->98463 98468 da3994 ___scrt_fastfail 98459->98468 98461 da397c 98460->98461 98462 de33c9 98460->98462 98461->98459 98464 da3986 98461->98464 98465 da6350 22 API calls 98462->98465 98463->98468 98466 da6350 22 API calls 98464->98466 98467 de33d7 98465->98467 98466->98468 98467->98468 98469 da33c6 22 API calls 98467->98469 98470 da39f9 Shell_NotifyIconW 98468->98470 98471 de33f9 98469->98471 98470->98472 98473 da33c6 22 API calls 98471->98473 98472->98431 98473->98468 98475 de35a4 98474->98475 98476 da38b7 98474->98476 98475->98476 98477 de35ad DestroyIcon 98475->98477 98476->98445 98478 e0c874 42 API calls _strftime 98476->98478 98477->98476 98478->98445 98479 da2e37 98480 daa961 22 API calls 98479->98480 98481 da2e4d 98480->98481 98558 da4ae3 98481->98558 98483 da2e6b 98484 da3a5a 24 API calls 98483->98484 98485 da2e7f 98484->98485 98486 da9cb3 22 API calls 98485->98486 98487 da2e8c 98486->98487 98488 da4ecb 94 API calls 98487->98488 98489 da2ea5 98488->98489 98490 da2ead 98489->98490 98491 de2cb0 98489->98491 98494 daa8c7 22 API calls 98490->98494 98588 e12cf9 98491->98588 98493 de2cc3 98495 de2ccf 98493->98495 98496 da4f39 68 API calls 98493->98496 98497 da2ec3 98494->98497 98499 da4f39 68 API calls 98495->98499 98496->98495 98572 da6f88 22 API calls 98497->98572 98501 de2ce5 98499->98501 98500 da2ecf 98502 da9cb3 22 API calls 98500->98502 98614 da3084 22 API calls 98501->98614 98503 da2edc 98502->98503 98573 daa81b 41 API calls 98503->98573 98506 da2eec 98508 da9cb3 22 API calls 98506->98508 98507 de2d02 98615 da3084 22 API calls 98507->98615 98509 da2f12 98508->98509 98574 daa81b 41 API calls 98509->98574 98512 de2d1e 98513 da3a5a 24 API calls 98512->98513 98514 de2d44 98513->98514 98616 da3084 22 API calls 98514->98616 98515 da2f21 98518 daa961 22 API calls 98515->98518 98517 de2d50 98519 daa8c7 22 API calls 98517->98519 98520 da2f3f 98518->98520 98521 de2d5e 98519->98521 98575 da3084 22 API calls 98520->98575 98617 da3084 22 API calls 98521->98617 98524 da2f4b 98576 dc4a28 40 API calls 3 library calls 98524->98576 98526 da2f59 98526->98501 98527 da2f63 98526->98527 98577 dc4a28 40 API calls 3 library calls 98527->98577 98528 de2d6d 98530 daa8c7 22 API calls 98528->98530 98532 de2d83 98530->98532 98531 da2f6e 98531->98507 98533 da2f78 98531->98533 98618 da3084 22 API calls 98532->98618 98578 dc4a28 40 API calls 3 library calls 98533->98578 98536 de2d90 98537 da2f83 98537->98512 98538 da2f8d 98537->98538 98579 dc4a28 40 API calls 3 library calls 98538->98579 98540 da2f98 98541 da2fdc 98540->98541 98580 da3084 22 API calls 98540->98580 98541->98528 98542 da2fe8 98541->98542 98542->98536 98582 da63eb 22 API calls 98542->98582 98545 da2fbf 98547 daa8c7 22 API calls 98545->98547 98546 da2ff8 98583 da6a50 22 API calls 98546->98583 98549 da2fcd 98547->98549 98581 da3084 22 API calls 98549->98581 98551 da3006 98584 da70b0 23 API calls 98551->98584 98555 da3021 98556 da3065 98555->98556 98585 da6f88 22 API calls 98555->98585 98586 da70b0 23 API calls 98555->98586 98587 da3084 22 API calls 98555->98587 98559 da4af0 __wsopen_s 98558->98559 98560 da6b57 22 API calls 98559->98560 98561 da4b22 98559->98561 98560->98561 98562 da4c6d 22 API calls 98561->98562 98571 da4b58 98561->98571 98562->98561 98563 da9cb3 22 API calls 98565 da4c52 98563->98565 98564 da9cb3 22 API calls 98564->98571 98567 da515f 22 API calls 98565->98567 98566 da4c6d 22 API calls 98566->98571 98569 da4c5e 98567->98569 98568 da515f 22 API calls 98568->98571 98569->98483 98570 da4c29 98570->98563 98570->98569 98571->98564 98571->98566 98571->98568 98571->98570 98572->98500 98573->98506 98574->98515 98575->98524 98576->98526 98577->98531 98578->98537 98579->98540 98580->98545 98581->98541 98582->98546 98583->98551 98584->98555 98585->98555 98586->98555 98587->98555 98589 e12d15 98588->98589 98590 da511f 64 API calls 98589->98590 98591 e12d29 98590->98591 98592 e12e66 75 API calls 98591->98592 98593 e12d3b 98592->98593 98594 da50f5 40 API calls 98593->98594 98611 e12d3f 98593->98611 98595 e12d56 98594->98595 98596 da50f5 40 API calls 98595->98596 98597 e12d66 98596->98597 98598 da50f5 40 API calls 98597->98598 98599 e12d81 98598->98599 98600 da50f5 40 API calls 98599->98600 98601 e12d9c 98600->98601 98602 da511f 64 API calls 98601->98602 98603 e12db3 98602->98603 98604 dcea0c ___std_exception_copy 21 API calls 98603->98604 98605 e12dba 98604->98605 98606 dcea0c ___std_exception_copy 21 API calls 98605->98606 98607 e12dc4 98606->98607 98608 da50f5 40 API calls 98607->98608 98609 e12dd8 98608->98609 98610 e128fe 27 API calls 98609->98610 98612 e12dee 98610->98612 98611->98493 98612->98611 98613 e122ce 79 API calls 98612->98613 98613->98611 98614->98507 98615->98512 98616->98517 98617->98528 98618->98536 98619 1449cf0 98633 1447940 98619->98633 98621 1449dc2 98636 1449be0 98621->98636 98639 144adf0 GetPEB 98633->98639 98635 1447fcb 98635->98621 98637 1449be9 Sleep 98636->98637 98638 1449bf7 98637->98638 98640 144ae1a 98639->98640 98640->98635 98641 da1cad SystemParametersInfoW 98642 da2de3 98643 da2df0 __wsopen_s 98642->98643 98644 da2e09 98643->98644 98645 de2c2b ___scrt_fastfail 98643->98645 98646 da3aa2 23 API calls 98644->98646 98648 de2c47 GetOpenFileNameW 98645->98648 98647 da2e12 98646->98647 98658 da2da5 98647->98658 98650 de2c96 98648->98650 98651 da6b57 22 API calls 98650->98651 98653 de2cab 98651->98653 98653->98653 98655 da2e27 98676 da44a8 98655->98676 98659 de1f50 __wsopen_s 98658->98659 98660 da2db2 GetLongPathNameW 98659->98660 98661 da6b57 22 API calls 98660->98661 98662 da2dda 98661->98662 98663 da3598 98662->98663 98664 daa961 22 API calls 98663->98664 98665 da35aa 98664->98665 98666 da3aa2 23 API calls 98665->98666 98667 da35b5 98666->98667 98668 da35c0 98667->98668 98673 de32eb 98667->98673 98670 da515f 22 API calls 98668->98670 98671 da35cc 98670->98671 98705 da35f3 98671->98705 98674 de330d 98673->98674 98711 dbce60 41 API calls 98673->98711 98675 da35df 98675->98655 98677 da4ecb 94 API calls 98676->98677 98678 da44cd 98677->98678 98679 de3833 98678->98679 98680 da4ecb 94 API calls 98678->98680 98681 e12cf9 80 API calls 98679->98681 98682 da44e1 98680->98682 98683 de3848 98681->98683 98682->98679 98684 da44e9 98682->98684 98685 de384c 98683->98685 98686 de3869 98683->98686 98688 de3854 98684->98688 98689 da44f5 98684->98689 98690 da4f39 68 API calls 98685->98690 98687 dbfe0b 22 API calls 98686->98687 98704 de38ae 98687->98704 98713 e0da5a 82 API calls 98688->98713 98712 da940c 136 API calls 2 library calls 98689->98712 98690->98688 98693 da2e31 98694 de3862 98694->98686 98695 da4f39 68 API calls 98698 de3a5f 98695->98698 98698->98695 98719 e0989b 82 API calls __wsopen_s 98698->98719 98701 da9cb3 22 API calls 98701->98704 98704->98698 98704->98701 98714 e0967e 22 API calls __fread_nolock 98704->98714 98715 e095ad 42 API calls _wcslen 98704->98715 98716 e10b5a 22 API calls 98704->98716 98717 daa4a1 22 API calls __fread_nolock 98704->98717 98718 da3ff7 22 API calls 98704->98718 98706 da3605 98705->98706 98710 da3624 __fread_nolock 98705->98710 98708 dbfe0b 22 API calls 98706->98708 98707 dbfddb 22 API calls 98709 da363b 98707->98709 98708->98710 98709->98675 98710->98707 98711->98673 98712->98693 98713->98694 98714->98704 98715->98704 98716->98704 98717->98704 98718->98704 98719->98698 98720 de2ba5 98721 de2baf 98720->98721 98722 da2b25 98720->98722 98724 da3a5a 24 API calls 98721->98724 98748 da2b83 7 API calls 98722->98748 98726 de2bb8 98724->98726 98728 da9cb3 22 API calls 98726->98728 98730 de2bc6 98728->98730 98729 da2b2f 98734 da3837 49 API calls 98729->98734 98738 da2b44 98729->98738 98731 de2bce 98730->98731 98732 de2bf5 98730->98732 98735 da33c6 22 API calls 98731->98735 98733 da33c6 22 API calls 98732->98733 98746 de2bf1 GetForegroundWindow ShellExecuteW 98733->98746 98734->98738 98736 de2bd9 98735->98736 98740 da6350 22 API calls 98736->98740 98739 da2b5f 98738->98739 98752 da30f2 Shell_NotifyIconW ___scrt_fastfail 98738->98752 98744 da2b66 SetCurrentDirectoryW 98739->98744 98742 de2be7 98740->98742 98743 da33c6 22 API calls 98742->98743 98743->98746 98747 da2b7a 98744->98747 98745 de2c26 98745->98739 98746->98745 98753 da2cd4 7 API calls 98748->98753 98750 da2b2a 98751 da2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98750->98751 98751->98729 98752->98739 98753->98750 98754 da1044 98759 da10f3 98754->98759 98756 da104a 98795 dc00a3 29 API calls __onexit 98756->98795 98758 da1054 98796 da1398 98759->98796 98763 da116a 98764 daa961 22 API calls 98763->98764 98765 da1174 98764->98765 98766 daa961 22 API calls 98765->98766 98767 da117e 98766->98767 98768 daa961 22 API calls 98767->98768 98769 da1188 98768->98769 98770 daa961 22 API calls 98769->98770 98771 da11c6 98770->98771 98772 daa961 22 API calls 98771->98772 98773 da1292 98772->98773 98806 da171c 98773->98806 98777 da12c4 98778 daa961 22 API calls 98777->98778 98779 da12ce 98778->98779 98780 db1940 9 API calls 98779->98780 98781 da12f9 98780->98781 98827 da1aab 98781->98827 98783 da1315 98784 da1325 GetStdHandle 98783->98784 98785 da137a 98784->98785 98786 de2485 98784->98786 98789 da1387 OleInitialize 98785->98789 98786->98785 98787 de248e 98786->98787 98788 dbfddb 22 API calls 98787->98788 98790 de2495 98788->98790 98789->98756 98834 e1011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 98790->98834 98792 de249e 98835 e10944 CreateThread 98792->98835 98794 de24aa CloseHandle 98794->98785 98795->98758 98836 da13f1 98796->98836 98799 da13f1 22 API calls 98800 da13d0 98799->98800 98801 daa961 22 API calls 98800->98801 98802 da13dc 98801->98802 98803 da6b57 22 API calls 98802->98803 98804 da1129 98803->98804 98805 da1bc3 6 API calls 98804->98805 98805->98763 98807 daa961 22 API calls 98806->98807 98808 da172c 98807->98808 98809 daa961 22 API calls 98808->98809 98810 da1734 98809->98810 98811 daa961 22 API calls 98810->98811 98812 da174f 98811->98812 98813 dbfddb 22 API calls 98812->98813 98814 da129c 98813->98814 98815 da1b4a 98814->98815 98816 da1b58 98815->98816 98817 daa961 22 API calls 98816->98817 98818 da1b63 98817->98818 98819 daa961 22 API calls 98818->98819 98820 da1b6e 98819->98820 98821 daa961 22 API calls 98820->98821 98822 da1b79 98821->98822 98823 daa961 22 API calls 98822->98823 98824 da1b84 98823->98824 98825 dbfddb 22 API calls 98824->98825 98826 da1b96 RegisterWindowMessageW 98825->98826 98826->98777 98828 da1abb 98827->98828 98829 de272d 98827->98829 98831 dbfddb 22 API calls 98828->98831 98843 e13209 23 API calls 98829->98843 98833 da1ac3 98831->98833 98832 de2738 98833->98783 98834->98792 98835->98794 98844 e1092a 28 API calls 98835->98844 98837 daa961 22 API calls 98836->98837 98838 da13fc 98837->98838 98839 daa961 22 API calls 98838->98839 98840 da1404 98839->98840 98841 daa961 22 API calls 98840->98841 98842 da13c6 98841->98842 98842->98799 98843->98832 98845 df3a41 98849 e110c0 98845->98849 98847 df3a4c 98848 e110c0 53 API calls 98847->98848 98848->98847 98850 e110cd 98849->98850 98859 e110fa 98849->98859 98851 e110fc 98850->98851 98853 e11101 98850->98853 98857 e110f4 98850->98857 98850->98859 98861 dbfa11 53 API calls 98851->98861 98854 da7510 53 API calls 98853->98854 98855 e11108 98854->98855 98856 da6350 22 API calls 98855->98856 98856->98859 98860 dab270 39 API calls 98857->98860 98859->98847 98860->98859 98861->98853 98862 df2a00 98863 dad7b0 ISource 98862->98863 98864 dadb11 PeekMessageW 98863->98864 98865 dad807 GetInputState 98863->98865 98866 dad9d5 98863->98866 98867 df1cbe TranslateAcceleratorW 98863->98867 98869 dadb8f PeekMessageW 98863->98869 98870 dada04 timeGetTime 98863->98870 98871 dadb73 TranslateMessage DispatchMessageW 98863->98871 98872 dadbaf Sleep 98863->98872 98873 df2b74 Sleep 98863->98873 98874 df1dda timeGetTime 98863->98874 98890 daec40 235 API calls 98863->98890 98891 dabf40 235 API calls 98863->98891 98892 db1310 235 API calls 98863->98892 98894 dadfd0 98863->98894 98917 dbedf6 98863->98917 98922 dadd50 235 API calls 98863->98922 98924 e13a2a 23 API calls 98863->98924 98925 e1359c 82 API calls __wsopen_s 98863->98925 98864->98863 98865->98863 98865->98864 98867->98863 98869->98863 98870->98863 98871->98869 98887 dadbc0 98872->98887 98873->98887 98923 dbe300 23 API calls 98874->98923 98875 dbe551 timeGetTime 98875->98887 98878 df2c0b GetExitCodeProcess 98881 df2c37 CloseHandle 98878->98881 98882 df2c21 WaitForSingleObject 98878->98882 98879 e329bf GetForegroundWindow 98879->98887 98881->98887 98882->98863 98882->98881 98883 df2a31 98883->98866 98884 df2ca9 Sleep 98884->98863 98887->98863 98887->98866 98887->98875 98887->98878 98887->98879 98887->98883 98887->98884 98926 e25658 23 API calls 98887->98926 98927 e0e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98887->98927 98928 e0d4dc 47 API calls 98887->98928 98890->98863 98891->98863 98892->98863 98895 dae010 98894->98895 98912 dae0dc ISource 98895->98912 98931 dc0242 5 API calls __Init_thread_wait 98895->98931 98898 df2fca 98900 daa961 22 API calls 98898->98900 98898->98912 98899 daa961 22 API calls 98899->98912 98903 df2fe4 98900->98903 98932 dc00a3 29 API calls __onexit 98903->98932 98905 df2fee 98933 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98905->98933 98908 daec40 235 API calls 98908->98912 98909 e1359c 82 API calls 98909->98912 98911 daa8c7 22 API calls 98911->98912 98912->98899 98912->98908 98912->98909 98912->98911 98913 dae3e1 98912->98913 98914 db04f0 22 API calls 98912->98914 98929 daa81b 41 API calls 98912->98929 98930 dba308 235 API calls 98912->98930 98934 dc0242 5 API calls __Init_thread_wait 98912->98934 98935 dc00a3 29 API calls __onexit 98912->98935 98936 dc01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98912->98936 98937 e247d4 235 API calls 98912->98937 98938 e268c1 235 API calls 98912->98938 98913->98863 98914->98912 98918 dbee09 98917->98918 98919 dbee12 98917->98919 98918->98863 98919->98918 98920 dbee36 IsDialogMessageW 98919->98920 98921 dfefaf GetClassLongW 98919->98921 98920->98918 98920->98919 98921->98919 98921->98920 98922->98863 98923->98863 98924->98863 98925->98863 98926->98887 98927->98887 98928->98887 98929->98912 98930->98912 98931->98898 98932->98905 98933->98912 98934->98912 98935->98912 98936->98912 98937->98912 98938->98912 98939 dd8402 98944 dd81be 98939->98944 98942 dd842a 98949 dd81ef try_get_first_available_module 98944->98949 98946 dd83ee 98963 dd27ec 26 API calls __wsopen_s 98946->98963 98948 dd8343 98948->98942 98956 de0984 98948->98956 98949->98949 98952 dd8338 98949->98952 98959 dc8e0b 40 API calls 2 library calls 98949->98959 98951 dd838c 98951->98952 98960 dc8e0b 40 API calls 2 library calls 98951->98960 98952->98948 98962 dcf2d9 20 API calls __dosmaperr 98952->98962 98954 dd83ab 98954->98952 98961 dc8e0b 40 API calls 2 library calls 98954->98961 98964 de0081 98956->98964 98958 de099f 98958->98942 98959->98951 98960->98954 98961->98952 98962->98946 98963->98948 98967 de008d BuildCatchObjectHelperInternal 98964->98967 98965 de009b 99022 dcf2d9 20 API calls __dosmaperr 98965->99022 98967->98965 98969 de00d4 98967->98969 98968 de00a0 99023 dd27ec 26 API calls __wsopen_s 98968->99023 98975 de065b 98969->98975 98973 de00aa __wsopen_s 98973->98958 99025 de042f 98975->99025 98978 de068d 99057 dcf2c6 20 API calls __dosmaperr 98978->99057 98979 de06a6 99043 dd5221 98979->99043 98982 de0692 99058 dcf2d9 20 API calls __dosmaperr 98982->99058 98983 de06ab 98984 de06cb 98983->98984 98985 de06b4 98983->98985 99056 de039a CreateFileW 98984->99056 99059 dcf2c6 20 API calls __dosmaperr 98985->99059 98989 de06b9 99060 dcf2d9 20 API calls __dosmaperr 98989->99060 98990 de0781 GetFileType 98993 de078c GetLastError 98990->98993 98994 de07d3 98990->98994 98992 de0756 GetLastError 99062 dcf2a3 20 API calls __dosmaperr 98992->99062 99063 dcf2a3 20 API calls __dosmaperr 98993->99063 99065 dd516a 21 API calls 2 library calls 98994->99065 98995 de0704 98995->98990 98995->98992 99061 de039a CreateFileW 98995->99061 98999 de079a CloseHandle 98999->98982 99002 de07c3 98999->99002 99001 de0749 99001->98990 99001->98992 99064 dcf2d9 20 API calls __dosmaperr 99002->99064 99004 de07f4 99006 de0840 99004->99006 99066 de05ab 72 API calls 3 library calls 99004->99066 99005 de07c8 99005->98982 99010 de086d 99006->99010 99067 de014d 72 API calls 4 library calls 99006->99067 99009 de0866 99009->99010 99011 de087e 99009->99011 99012 dd86ae __wsopen_s 29 API calls 99010->99012 99013 de00f8 99011->99013 99014 de08fc CloseHandle 99011->99014 99012->99013 99024 de0121 LeaveCriticalSection __wsopen_s 99013->99024 99068 de039a CreateFileW 99014->99068 99016 de0927 99017 de095d 99016->99017 99018 de0931 GetLastError 99016->99018 99017->99013 99069 dcf2a3 20 API calls __dosmaperr 99018->99069 99020 de093d 99070 dd5333 21 API calls 2 library calls 99020->99070 99022->98968 99023->98973 99024->98973 99026 de046a 99025->99026 99027 de0450 99025->99027 99071 de03bf 99026->99071 99027->99026 99078 dcf2d9 20 API calls __dosmaperr 99027->99078 99029 de04a2 99033 de04d1 99029->99033 99080 dcf2d9 20 API calls __dosmaperr 99029->99080 99031 de045f 99079 dd27ec 26 API calls __wsopen_s 99031->99079 99042 de0524 99033->99042 99082 dcd70d 26 API calls 2 library calls 99033->99082 99036 de051f 99039 de059e 99036->99039 99036->99042 99037 de04c6 99081 dd27ec 26 API calls __wsopen_s 99037->99081 99083 dd27fc 11 API calls _abort 99039->99083 99041 de05aa 99042->98978 99042->98979 99044 dd522d BuildCatchObjectHelperInternal 99043->99044 99086 dd2f5e EnterCriticalSection 99044->99086 99046 dd527b 99087 dd532a 99046->99087 99047 dd5234 99047->99046 99048 dd5259 99047->99048 99053 dd52c7 EnterCriticalSection 99047->99053 99050 dd5000 __wsopen_s 21 API calls 99048->99050 99052 dd525e 99050->99052 99051 dd52a4 __wsopen_s 99051->98983 99052->99046 99090 dd5147 EnterCriticalSection 99052->99090 99053->99046 99054 dd52d4 LeaveCriticalSection 99053->99054 99054->99047 99056->98995 99057->98982 99058->99013 99059->98989 99060->98982 99061->99001 99062->98982 99063->98999 99064->99005 99065->99004 99066->99006 99067->99009 99068->99016 99069->99020 99070->99017 99072 de03d7 99071->99072 99073 de03f2 99072->99073 99084 dcf2d9 20 API calls __dosmaperr 99072->99084 99073->99029 99075 de0416 99085 dd27ec 26 API calls __wsopen_s 99075->99085 99077 de0421 99077->99029 99078->99031 99079->99026 99080->99037 99081->99033 99082->99036 99083->99041 99084->99075 99085->99077 99086->99047 99091 dd2fa6 LeaveCriticalSection 99087->99091 99089 dd5331 99089->99051 99090->99046 99091->99089

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 234 da42de-da434d call daa961 GetVersionExW call da6b57 239 de3617-de362a 234->239 240 da4353 234->240 242 de362b-de362f 239->242 241 da4355-da4357 240->241 243 da435d-da43bc call da93b2 call da37a0 241->243 244 de3656 241->244 245 de3632-de363e 242->245 246 de3631 242->246 263 de37df-de37e6 243->263 264 da43c2-da43c4 243->264 250 de365d-de3660 244->250 245->242 248 de3640-de3642 245->248 246->245 248->241 249 de3648-de364f 248->249 249->239 252 de3651 249->252 253 da441b-da4435 GetCurrentProcess IsWow64Process 250->253 254 de3666-de36a8 250->254 252->244 256 da4437 253->256 257 da4494-da449a 253->257 254->253 258 de36ae-de36b1 254->258 260 da443d-da4449 256->260 257->260 261 de36db-de36e5 258->261 262 de36b3-de36bd 258->262 265 da444f-da445e LoadLibraryA 260->265 266 de3824-de3828 GetSystemInfo 260->266 270 de36f8-de3702 261->270 271 de36e7-de36f3 261->271 267 de36bf-de36c5 262->267 268 de36ca-de36d6 262->268 272 de37e8 263->272 273 de3806-de3809 263->273 264->250 269 da43ca-da43dd 264->269 276 da449c-da44a6 GetSystemInfo 265->276 277 da4460-da446e GetProcAddress 265->277 267->253 268->253 278 de3726-de372f 269->278 279 da43e3-da43e5 269->279 281 de3704-de3710 270->281 282 de3715-de3721 270->282 271->253 280 de37ee 272->280 274 de380b-de381a 273->274 275 de37f4-de37fc 273->275 274->280 285 de381c-de3822 274->285 275->273 287 da4476-da4478 276->287 277->276 286 da4470-da4474 GetNativeSystemInfo 277->286 283 de373c-de3748 278->283 284 de3731-de3737 278->284 288 da43eb-da43ee 279->288 289 de374d-de3762 279->289 280->275 281->253 282->253 283->253 284->253 285->275 286->287 292 da447a-da447b FreeLibrary 287->292 293 da4481-da4493 287->293 294 da43f4-da440f 288->294 295 de3791-de3794 288->295 290 de376f-de377b 289->290 291 de3764-de376a 289->291 290->253 291->253 292->293 297 de3780-de378c 294->297 298 da4415 294->298 295->253 296 de379a-de37c1 295->296 299 de37ce-de37da 296->299 300 de37c3-de37c9 296->300 297->253 298->253 299->253 300->253
                                          APIs
                                          • GetVersionExW.KERNEL32(?), ref: 00DA430D
                                            • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                                          • GetCurrentProcess.KERNEL32(?,00E3CB64,00000000,?,?), ref: 00DA4422
                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00DA4429
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00DA4454
                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00DA4466
                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00DA4474
                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 00DA447B
                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 00DA44A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                          • API String ID: 3290436268-3101561225
                                          • Opcode ID: 345a2752391ec3c1568dfe8c7da44003a2c2e69d402b42106b5705ba17af7c05
                                          • Instruction ID: 68a3dddd1bebca4bcd991417e1230da071a3fbec98ac3952d4e2c8dd8b10b732
                                          • Opcode Fuzzy Hash: 345a2752391ec3c1568dfe8c7da44003a2c2e69d402b42106b5705ba17af7c05
                                          • Instruction Fuzzy Hash: E4A1957191A3C0FFC711DB7F7C451A57FA46B66300B1A58E9E08DB7AA1D2A0858CCB71

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1171 da42a2-da42ba CreateStreamOnHGlobal 1172 da42da-da42dd 1171->1172 1173 da42bc-da42d3 FindResourceExW 1171->1173 1174 da42d9 1173->1174 1175 de35ba-de35c9 LoadResource 1173->1175 1174->1172 1175->1174 1176 de35cf-de35dd SizeofResource 1175->1176 1176->1174 1177 de35e3-de35ee LockResource 1176->1177 1177->1174 1178 de35f4-de3612 1177->1178 1178->1174
                                          APIs
                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00DA50AA,?,?,00000000,00000000), ref: 00DA42B2
                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00DA50AA,?,?,00000000,00000000), ref: 00DA42C9
                                          • LoadResource.KERNEL32(?,00000000,?,?,00DA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DA4F20), ref: 00DE35BE
                                          • SizeofResource.KERNEL32(?,00000000,?,?,00DA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DA4F20), ref: 00DE35D3
                                          • LockResource.KERNEL32(00DA50AA,?,?,00DA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DA4F20,?), ref: 00DE35E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                          • String ID: SCRIPT
                                          • API String ID: 3051347437-3967369404
                                          • Opcode ID: 81cc55a1ff8fda51e5dca5dc3bd7e6deb3a8d1ea3e806a25a226b36db364006b
                                          • Instruction ID: cdd69f274272b7d61d4adf7a78a65c5f886db505d2cff57c6af1a9093634dda6
                                          • Opcode Fuzzy Hash: 81cc55a1ff8fda51e5dca5dc3bd7e6deb3a8d1ea3e806a25a226b36db364006b
                                          • Instruction Fuzzy Hash: 56117C72241704BFD7218B66DC4CF277BB9EBC6B51F244169B502A6260DBB1D8048730

                                          Control-flow Graph

                                          APIs
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00DA2B6B
                                            • Part of subcall function 00DA3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E71418,?,00DA2E7F,?,?,?,00000000), ref: 00DA3A78
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,00E62224), ref: 00DE2C10
                                          • ShellExecuteW.SHELL32(00000000,?,?,00E62224), ref: 00DE2C17
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                          • String ID: runas
                                          • API String ID: 448630720-4000483414
                                          • Opcode ID: ab9a2503d04c7b40f45ee19ff4f470debc04c1fbbcef2988436d8d16101bccf8
                                          • Instruction ID: 074283ca5f5b49e615399981bb8b0e1842264517bba300b1219876c3008c3d00
                                          • Opcode Fuzzy Hash: ab9a2503d04c7b40f45ee19ff4f470debc04c1fbbcef2988436d8d16101bccf8
                                          • Instruction Fuzzy Hash: DA11B4312083455FCB04FF69E8569BEBBA5DBD7350F08546DF196620A2DF20894D8732
                                          APIs
                                          • lstrlenW.KERNEL32(?,00DE5222), ref: 00E0DBCE
                                          • GetFileAttributesW.KERNELBASE(?), ref: 00E0DBDD
                                          • FindFirstFileW.KERNELBASE(?,?), ref: 00E0DBEE
                                          • FindClose.KERNEL32(00000000), ref: 00E0DBFA
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                          • String ID:
                                          • API String ID: 2695905019-0
                                          • Opcode ID: 76a20bc4caaa99629da97ae4dc3ce7c2292d9b80d7568075d82aa5859a08190a
                                          • Instruction ID: 24f05b5d69242076aaca27bffb1dd04d4964a41f2891dea2a7b85dc4201e81dc
                                          • Opcode Fuzzy Hash: 76a20bc4caaa99629da97ae4dc3ce7c2292d9b80d7568075d82aa5859a08190a
                                          • Instruction Fuzzy Hash: 37F0A7314149285BD2206BF89C4D4AB7F6C9F01334B204742F835F20F0EBB099988795
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: BuffCharUpper
                                          • String ID: p#
                                          • API String ID: 3964851224-4182048217
                                          • Opcode ID: 43fa4ae85da645a6257dabcc2933bc362fa582e0431fe6ae2f253f4945ab8dbb
                                          • Instruction ID: 73a26ecfcb72c8633178d6e11ee7dd096905af367a1dfe91ab307a5f4052a537
                                          • Opcode Fuzzy Hash: 43fa4ae85da645a6257dabcc2933bc362fa582e0431fe6ae2f253f4945ab8dbb
                                          • Instruction Fuzzy Hash: 00A24A706083019FD710DF28C480B6ABBE1FF89314F19996DE99A9B352D771EC45CBA2
                                          APIs
                                          • GetInputState.USER32 ref: 00DAD807
                                          • timeGetTime.WINMM ref: 00DADA07
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DADB28
                                          • TranslateMessage.USER32(?), ref: 00DADB7B
                                          • DispatchMessageW.USER32(?), ref: 00DADB89
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DADB9F
                                          • Sleep.KERNEL32(0000000A), ref: 00DADBB1
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                          • String ID:
                                          • API String ID: 2189390790-0
                                          • Opcode ID: f75c83c8a97a1a6f3831814e01f335fb515061801f99a52cef561e9fac2de519
                                          • Instruction ID: 04e3b29bb7150543f866aef62541bef43262d2145b960648e9cee9a04e5e78ec
                                          • Opcode Fuzzy Hash: f75c83c8a97a1a6f3831814e01f335fb515061801f99a52cef561e9fac2de519
                                          • Instruction Fuzzy Hash: DC42DE30604345EFD728CF24C884BBAB7E2FF46314F198559E59A976A1D770E884CBB2

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 00DA2D07
                                          • RegisterClassExW.USER32(00000030), ref: 00DA2D31
                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DA2D42
                                          • InitCommonControlsEx.COMCTL32(?), ref: 00DA2D5F
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DA2D6F
                                          • LoadIconW.USER32(000000A9), ref: 00DA2D85
                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DA2D94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                          • API String ID: 2914291525-1005189915
                                          • Opcode ID: bfb206f5fa2bc980844ac9bfc3f796671ba298ec289daf7c9af3e6b8caa22bec
                                          • Instruction ID: 19363b5fd80c69d4fb51011cb1170fdc676cd3d63d5b7e9f1e68ace783f1d8f5
                                          • Opcode Fuzzy Hash: bfb206f5fa2bc980844ac9bfc3f796671ba298ec289daf7c9af3e6b8caa22bec
                                          • Instruction Fuzzy Hash: 2C21E7B5911308AFDB00DFA9E849BDDBFB4FB48700F10415AFA15B6290D7B18549CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 302 de065b-de068b call de042f 305 de068d-de0698 call dcf2c6 302->305 306 de06a6-de06b2 call dd5221 302->306 311 de069a-de06a1 call dcf2d9 305->311 312 de06cb-de0714 call de039a 306->312 313 de06b4-de06c9 call dcf2c6 call dcf2d9 306->313 322 de097d-de0983 311->322 320 de0716-de071f 312->320 321 de0781-de078a GetFileType 312->321 313->311 324 de0756-de077c GetLastError call dcf2a3 320->324 325 de0721-de0725 320->325 326 de078c-de07bd GetLastError call dcf2a3 CloseHandle 321->326 327 de07d3-de07d6 321->327 324->311 325->324 331 de0727-de0754 call de039a 325->331 326->311 341 de07c3-de07ce call dcf2d9 326->341 329 de07df-de07e5 327->329 330 de07d8-de07dd 327->330 334 de07e9-de0837 call dd516a 329->334 335 de07e7 329->335 330->334 331->321 331->324 345 de0839-de0845 call de05ab 334->345 346 de0847-de086b call de014d 334->346 335->334 341->311 345->346 351 de086f-de0879 call dd86ae 345->351 352 de087e-de08c1 346->352 353 de086d 346->353 351->322 355 de08e2-de08f0 352->355 356 de08c3-de08c7 352->356 353->351 359 de097b 355->359 360 de08f6-de08fa 355->360 356->355 358 de08c9-de08dd 356->358 358->355 359->322 360->359 361 de08fc-de092f CloseHandle call de039a 360->361 364 de0963-de0977 361->364 365 de0931-de095d GetLastError call dcf2a3 call dd5333 361->365 364->359 365->364
                                          APIs
                                            • Part of subcall function 00DE039A: CreateFileW.KERNELBASE(00000000,00000000,?,00DE0704,?,?,00000000,?,00DE0704,00000000,0000000C), ref: 00DE03B7
                                          • GetLastError.KERNEL32 ref: 00DE076F
                                          • __dosmaperr.LIBCMT ref: 00DE0776
                                          • GetFileType.KERNELBASE(00000000), ref: 00DE0782
                                          • GetLastError.KERNEL32 ref: 00DE078C
                                          • __dosmaperr.LIBCMT ref: 00DE0795
                                          • CloseHandle.KERNEL32(00000000), ref: 00DE07B5
                                          • CloseHandle.KERNEL32(?), ref: 00DE08FF
                                          • GetLastError.KERNEL32 ref: 00DE0931
                                          • __dosmaperr.LIBCMT ref: 00DE0938
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                          • String ID: H
                                          • API String ID: 4237864984-2852464175
                                          • Opcode ID: 42785f2fb8c79f590c15fee263efa6fabfcc7294caeada25b4e87db0f0eb3f81
                                          • Instruction ID: c72c37cffd17dd6de633342318bdcf442364b32e4b0e9d704d04944281762345
                                          • Opcode Fuzzy Hash: 42785f2fb8c79f590c15fee263efa6fabfcc7294caeada25b4e87db0f0eb3f81
                                          • Instruction Fuzzy Hash: 39A10432A001898FDF19FF69D891BAD7FA1EB06320F28015DF815EB391C6719856CBB1

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00DA3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E71418,?,00DA2E7F,?,?,?,00000000), ref: 00DA3A78
                                            • Part of subcall function 00DA3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00DA3379
                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00DA356A
                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00DE318D
                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00DE31CE
                                          • RegCloseKey.ADVAPI32(?), ref: 00DE3210
                                          • _wcslen.LIBCMT ref: 00DE3277
                                          • _wcslen.LIBCMT ref: 00DE3286
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                          • API String ID: 98802146-2727554177
                                          • Opcode ID: dc86caffafc19b511ebf46811b7e7b46dcec7062a8b871ec7ae87d932791aeb7
                                          • Instruction ID: a229cff382ddeda230d0c818ff88c79b5d41f44c0977636d5e6a6a11d62d9d15
                                          • Opcode Fuzzy Hash: dc86caffafc19b511ebf46811b7e7b46dcec7062a8b871ec7ae87d932791aeb7
                                          • Instruction Fuzzy Hash: 6271A471404302AEC314EF66DC8696BBBE8FF95350F50482DF689A71A0DB74DA88CB71

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 00DA2B8E
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00DA2B9D
                                          • LoadIconW.USER32(00000063), ref: 00DA2BB3
                                          • LoadIconW.USER32(000000A4), ref: 00DA2BC5
                                          • LoadIconW.USER32(000000A2), ref: 00DA2BD7
                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00DA2BEF
                                          • RegisterClassExW.USER32(?), ref: 00DA2C40
                                            • Part of subcall function 00DA2CD4: GetSysColorBrush.USER32(0000000F), ref: 00DA2D07
                                            • Part of subcall function 00DA2CD4: RegisterClassExW.USER32(00000030), ref: 00DA2D31
                                            • Part of subcall function 00DA2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DA2D42
                                            • Part of subcall function 00DA2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00DA2D5F
                                            • Part of subcall function 00DA2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DA2D6F
                                            • Part of subcall function 00DA2CD4: LoadIconW.USER32(000000A9), ref: 00DA2D85
                                            • Part of subcall function 00DA2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DA2D94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                          • String ID: #$0$AutoIt v3
                                          • API String ID: 423443420-4155596026
                                          • Opcode ID: 535b021366120502d54a551ec127da39928c985cf8a561056f32deaab6374896
                                          • Instruction ID: c1477a101ab82dab99161d8009a1d19bdedd702b6da57ed6c1a29b99d5ad11b9
                                          • Opcode Fuzzy Hash: 535b021366120502d54a551ec127da39928c985cf8a561056f32deaab6374896
                                          • Instruction Fuzzy Hash: 03212571A00318BFDB10DFABEC49BA97FB4FB48B50F11009AE508B66A0D3B14598DF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 443 da3170-da3185 444 da3187-da318a 443->444 445 da31e5-da31e7 443->445 446 da31eb 444->446 447 da318c-da3193 444->447 445->444 448 da31e9 445->448 452 de2dfb-de2e23 call da18e2 call dbe499 446->452 453 da31f1-da31f6 446->453 449 da3199-da319e 447->449 450 da3265-da326d PostQuitMessage 447->450 451 da31d0-da31d8 DefWindowProcW 448->451 455 de2e7c-de2e90 call e0bf30 449->455 456 da31a4-da31a8 449->456 458 da3219-da321b 450->458 457 da31de-da31e4 451->457 487 de2e28-de2e2f 452->487 459 da31f8-da31fb 453->459 460 da321d-da3244 SetTimer RegisterWindowMessageW 453->460 455->458 481 de2e96 455->481 462 da31ae-da31b3 456->462 463 de2e68-de2e72 call e0c161 456->463 458->457 466 de2d9c-de2d9f 459->466 467 da3201-da3214 KillTimer call da30f2 call da3c50 459->467 460->458 464 da3246-da3251 CreatePopupMenu 460->464 470 de2e4d-de2e54 462->470 471 da31b9-da31be 462->471 477 de2e77 463->477 464->458 473 de2dd7-de2df6 MoveWindow 466->473 474 de2da1-de2da5 466->474 467->458 470->451 484 de2e5a-de2e63 call e00ad7 470->484 479 da3253-da3263 call da326f 471->479 480 da31c4-da31ca 471->480 473->458 482 de2dc6-de2dd2 SetFocus 474->482 483 de2da7-de2daa 474->483 477->458 479->458 480->451 480->487 481->451 482->458 483->480 488 de2db0-de2dc1 call da18e2 483->488 484->451 487->451 492 de2e35-de2e48 call da30f2 call da3837 487->492 488->458 492->451
                                          APIs
                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00DA316A,?,?), ref: 00DA31D8
                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,00DA316A,?,?), ref: 00DA3204
                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DA3227
                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00DA316A,?,?), ref: 00DA3232
                                          • CreatePopupMenu.USER32 ref: 00DA3246
                                          • PostQuitMessage.USER32(00000000), ref: 00DA3267
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                          • String ID: TaskbarCreated
                                          • API String ID: 129472671-2362178303
                                          • Opcode ID: 7657b82c95dff8fadfd592759813ef54a00402125155aa748c7ff3f8ed343cf5
                                          • Instruction ID: 2e19093e80e9a4e3ad11e585e80ebd7c754671998de368034cc96482d1ea87ea
                                          • Opcode Fuzzy Hash: 7657b82c95dff8fadfd592759813ef54a00402125155aa748c7ff3f8ed343cf5
                                          • Instruction Fuzzy Hash: 7C413732240304BFDB146B7D9C0EB793A5BEB87340F184166FA4AB61E1DB71CA8497B5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: D%$D%$D%$D%$D%$Variable must be of type 'Object'.
                                          • API String ID: 0-2799515523
                                          • Opcode ID: 80ff31890080f7b6fe21e2a8318249935c419bf0a8396e6cf522d981285dfa13
                                          • Instruction ID: 879432968f30a7dd0a7961d92ed066cb531b3af57e916eaf303678fe80569403
                                          • Opcode Fuzzy Hash: 80ff31890080f7b6fe21e2a8318249935c419bf0a8396e6cf522d981285dfa13
                                          • Instruction Fuzzy Hash: B3C28A71A00215CFCB24CF68C880AADB7B1FF4A310F298569E956AB391D775ED41CBB1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1009 dd8d45-dd8d55 1010 dd8d6f-dd8d71 1009->1010 1011 dd8d57-dd8d6a call dcf2c6 call dcf2d9 1009->1011 1013 dd90d9-dd90e6 call dcf2c6 call dcf2d9 1010->1013 1014 dd8d77-dd8d7d 1010->1014 1028 dd90f1 1011->1028 1033 dd90ec call dd27ec 1013->1033 1014->1013 1017 dd8d83-dd8dae 1014->1017 1017->1013 1020 dd8db4-dd8dbd 1017->1020 1023 dd8dbf-dd8dd2 call dcf2c6 call dcf2d9 1020->1023 1024 dd8dd7-dd8dd9 1020->1024 1023->1033 1026 dd8ddf-dd8de3 1024->1026 1027 dd90d5-dd90d7 1024->1027 1026->1027 1032 dd8de9-dd8ded 1026->1032 1030 dd90f4-dd90f9 1027->1030 1028->1030 1032->1023 1035 dd8def-dd8e06 1032->1035 1033->1028 1038 dd8e08-dd8e0b 1035->1038 1039 dd8e23-dd8e2c 1035->1039 1040 dd8e0d-dd8e13 1038->1040 1041 dd8e15-dd8e1e 1038->1041 1042 dd8e2e-dd8e45 call dcf2c6 call dcf2d9 call dd27ec 1039->1042 1043 dd8e4a-dd8e54 1039->1043 1040->1041 1040->1042 1046 dd8ebf-dd8ed9 1041->1046 1073 dd900c 1042->1073 1044 dd8e5b-dd8e79 call dd3820 call dd29c8 * 2 1043->1044 1045 dd8e56-dd8e58 1043->1045 1082 dd8e7b-dd8e91 call dcf2d9 call dcf2c6 1044->1082 1083 dd8e96-dd8ebc call dd9424 1044->1083 1045->1044 1048 dd8fad-dd8fb6 call ddf89b 1046->1048 1049 dd8edf-dd8eef 1046->1049 1060 dd9029 1048->1060 1061 dd8fb8-dd8fca 1048->1061 1049->1048 1052 dd8ef5-dd8ef7 1049->1052 1052->1048 1058 dd8efd-dd8f23 1052->1058 1058->1048 1063 dd8f29-dd8f3c 1058->1063 1069 dd902d-dd9045 ReadFile 1060->1069 1061->1060 1065 dd8fcc-dd8fdb GetConsoleMode 1061->1065 1063->1048 1067 dd8f3e-dd8f40 1063->1067 1065->1060 1072 dd8fdd-dd8fe1 1065->1072 1067->1048 1074 dd8f42-dd8f6d 1067->1074 1070 dd9047-dd904d 1069->1070 1071 dd90a1-dd90ac GetLastError 1069->1071 1070->1071 1078 dd904f 1070->1078 1076 dd90ae-dd90c0 call dcf2d9 call dcf2c6 1071->1076 1077 dd90c5-dd90c8 1071->1077 1072->1069 1079 dd8fe3-dd8ffd ReadConsoleW 1072->1079 1080 dd900f-dd9019 call dd29c8 1073->1080 1074->1048 1081 dd8f6f-dd8f82 1074->1081 1076->1073 1089 dd90ce-dd90d0 1077->1089 1090 dd9005-dd900b call dcf2a3 1077->1090 1085 dd9052-dd9064 1078->1085 1087 dd8fff GetLastError 1079->1087 1088 dd901e-dd9027 1079->1088 1080->1030 1081->1048 1092 dd8f84-dd8f86 1081->1092 1082->1073 1083->1046 1085->1080 1095 dd9066-dd906a 1085->1095 1087->1090 1088->1085 1089->1080 1090->1073 1092->1048 1099 dd8f88-dd8fa8 1092->1099 1102 dd906c-dd907c call dd8a61 1095->1102 1103 dd9083-dd908e 1095->1103 1099->1048 1114 dd907f-dd9081 1102->1114 1109 dd909a-dd909f call dd88a1 1103->1109 1110 dd9090 call dd8bb1 1103->1110 1115 dd9095-dd9098 1109->1115 1110->1115 1114->1080 1115->1114
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 210dbc031cd16fcb1bae53da73e7d01d639e3fe3a8a84eeb9b2000edd95f90fa
                                          • Instruction ID: 0125b20b0c57e27bb6fad9226db9954d59e069cbac96c5b6abb11a91140ea2d4
                                          • Opcode Fuzzy Hash: 210dbc031cd16fcb1bae53da73e7d01d639e3fe3a8a84eeb9b2000edd95f90fa
                                          • Instruction Fuzzy Hash: 46C1E074A0434AAFDF22DFA8D851BBDBBB1AF09310F18409AF458A7392C7319941DB71

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1117 1449f40-1449fee call 1447940 1120 1449ff5-144a01b call 144ae50 CreateFileW 1117->1120 1123 144a022-144a032 1120->1123 1124 144a01d 1120->1124 1129 144a034 1123->1129 1130 144a039-144a053 VirtualAlloc 1123->1130 1125 144a16d-144a171 1124->1125 1127 144a1b3-144a1b6 1125->1127 1128 144a173-144a177 1125->1128 1131 144a1b9-144a1c0 1127->1131 1132 144a183-144a187 1128->1132 1133 144a179-144a17c 1128->1133 1129->1125 1136 144a055 1130->1136 1137 144a05a-144a071 ReadFile 1130->1137 1138 144a215-144a22a 1131->1138 1139 144a1c2-144a1cd 1131->1139 1134 144a197-144a19b 1132->1134 1135 144a189-144a193 1132->1135 1133->1132 1142 144a19d-144a1a7 1134->1142 1143 144a1ab 1134->1143 1135->1134 1136->1125 1144 144a073 1137->1144 1145 144a078-144a0b8 VirtualAlloc 1137->1145 1140 144a22c-144a237 VirtualFree 1138->1140 1141 144a23a-144a242 1138->1141 1146 144a1d1-144a1dd 1139->1146 1147 144a1cf 1139->1147 1140->1141 1142->1143 1143->1127 1144->1125 1148 144a0bf-144a0da call 144b0a0 1145->1148 1149 144a0ba 1145->1149 1150 144a1f1-144a1fd 1146->1150 1151 144a1df-144a1ef 1146->1151 1147->1138 1157 144a0e5-144a0ef 1148->1157 1149->1125 1154 144a1ff-144a208 1150->1154 1155 144a20a-144a210 1150->1155 1153 144a213 1151->1153 1153->1131 1154->1153 1155->1153 1158 144a0f1-144a120 call 144b0a0 1157->1158 1159 144a122-144a136 call 144aeb0 1157->1159 1158->1157 1165 144a138 1159->1165 1166 144a13a-144a13e 1159->1166 1165->1125 1167 144a140-144a144 CloseHandle 1166->1167 1168 144a14a-144a14e 1166->1168 1167->1168 1169 144a150-144a15b VirtualFree 1168->1169 1170 144a15e-144a167 1168->1170 1169->1170 1170->1120 1170->1125
                                          APIs
                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0144A011
                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0144A237
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1317732673.0000000001447000.00000040.00000020.00020000.00000000.sdmp, Offset: 01447000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_1447000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CreateFileFreeVirtual
                                          • String ID:
                                          • API String ID: 204039940-0
                                          • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                          • Instruction ID: 0feac24cb2661729d202115ce31410a21b1dcb6ed83a1d0e2742a4cf74592fe2
                                          • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                          • Instruction Fuzzy Hash: 95A11774E40209EBEB14CFA4C894BEEBBB5BF48305F20855AE202BB391D7759A41CB54

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1181 da2c63-da2cd3 CreateWindowExW * 2 ShowWindow * 2
                                          APIs
                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00DA2C91
                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00DA2CB2
                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00DA1CAD,?), ref: 00DA2CC6
                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00DA1CAD,?), ref: 00DA2CCF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$CreateShow
                                          • String ID: AutoIt v3$edit
                                          • API String ID: 1584632944-3779509399
                                          • Opcode ID: edeccc5676e5e0c21cd081f5f510718418c4e294f2ec520e7eb2020db7996e29
                                          • Instruction ID: f1bfe3012f00c07a5ca83f00140b65da68ae0c1505155d2505a8fb8992eae281
                                          • Opcode Fuzzy Hash: edeccc5676e5e0c21cd081f5f510718418c4e294f2ec520e7eb2020db7996e29
                                          • Instruction Fuzzy Hash: CFF03A755403947EEB30472BAC0DF7B3EBDD7C6F50F12009AF908B21A0C2614888DAB0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1296 1449cf0-1449e38 call 1447940 call 1449be0 CreateFileW 1303 1449e3f-1449e4f 1296->1303 1304 1449e3a 1296->1304 1307 1449e56-1449e70 VirtualAlloc 1303->1307 1308 1449e51 1303->1308 1305 1449eef-1449ef4 1304->1305 1309 1449e74-1449e8b ReadFile 1307->1309 1310 1449e72 1307->1310 1308->1305 1311 1449e8d 1309->1311 1312 1449e8f-1449ec9 call 1449c20 call 1448be0 1309->1312 1310->1305 1311->1305 1317 1449ee5-1449eed ExitProcess 1312->1317 1318 1449ecb-1449ee0 call 1449c70 1312->1318 1317->1305 1318->1317
                                          APIs
                                            • Part of subcall function 01449BE0: Sleep.KERNELBASE(000001F4), ref: 01449BF1
                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01449E2E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1317732673.0000000001447000.00000040.00000020.00020000.00000000.sdmp, Offset: 01447000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_1447000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CreateFileSleep
                                          • String ID: 67UV7LGPL8DL
                                          • API String ID: 2694422964-3922532997
                                          • Opcode ID: bd3e2bc82f63e0e709de38508c5dfcbad0b828175edb0261aaec375eeaa5f4bd
                                          • Instruction ID: 8c647f2c8c00444d3cf29a8fe1e60c2441020daf91fb2bef1a8ad2ee5bb95c9c
                                          • Opcode Fuzzy Hash: bd3e2bc82f63e0e709de38508c5dfcbad0b828175edb0261aaec375eeaa5f4bd
                                          • Instruction Fuzzy Hash: 58518F30D04248EBFF11DBA4C854BEFBB79EF58704F104599E209BB2D0DAB91A45CBA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1320 e12947-e129b9 call de1f50 call e125d6 call dbfe0b call da5722 call e1274e call da511f call dc5232 1335 e12a6c-e12a73 call e12e66 1320->1335 1336 e129bf-e129c6 call e12e66 1320->1336 1341 e12a75-e12a77 1335->1341 1342 e12a7c 1335->1342 1336->1341 1343 e129cc-e12a6a call dcd583 call dc4983 call dc9038 call dcd583 call dc9038 * 2 1336->1343 1344 e12cb6-e12cb7 1341->1344 1346 e12a7f-e12b3a call da50f5 * 8 call e13017 call dce5eb 1342->1346 1343->1346 1347 e12cd5-e12cdb 1344->1347 1385 e12b43-e12b5e call e12792 1346->1385 1386 e12b3c-e12b3e 1346->1386 1350 e12cf0-e12cf6 1347->1350 1351 e12cdd-e12ced call dbfdcd call dbfe14 1347->1351 1351->1350 1389 e12bf0-e12bfc call dce678 1385->1389 1390 e12b64-e12b6c 1385->1390 1386->1344 1397 e12c12-e12c16 1389->1397 1398 e12bfe-e12c0d DeleteFileW 1389->1398 1392 e12b74 1390->1392 1393 e12b6e-e12b72 1390->1393 1394 e12b79-e12b97 call da50f5 1392->1394 1393->1394 1402 e12bc1-e12bd7 call e1211d call dcdbb3 1394->1402 1403 e12b99-e12b9e 1394->1403 1400 e12c91-e12ca5 CopyFileW 1397->1400 1401 e12c18-e12c7e call e125d6 call dcd2eb * 2 call e122ce 1397->1401 1398->1344 1405 e12ca7-e12cb4 DeleteFileW 1400->1405 1406 e12cb9-e12ccf DeleteFileW call e12fd8 1400->1406 1401->1406 1425 e12c80-e12c8f DeleteFileW 1401->1425 1420 e12bdc-e12be7 1402->1420 1408 e12ba1-e12bb4 call e128d2 1403->1408 1405->1344 1411 e12cd4 1406->1411 1418 e12bb6-e12bbf 1408->1418 1411->1347 1418->1402 1420->1390 1422 e12bed 1420->1422 1422->1389 1425->1344
                                          APIs
                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E12C05
                                          • DeleteFileW.KERNEL32(?), ref: 00E12C87
                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E12C9D
                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E12CAE
                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E12CC0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: File$Delete$Copy
                                          • String ID:
                                          • API String ID: 3226157194-0
                                          • Opcode ID: 21f7322d89995b978bc692d6a34c2cb3a0a99afc5a2bf98251a13c2bf3ca8100
                                          • Instruction ID: ac3dd63d5f7259a97abeddd9f55b2da833fa2d46b4939b02c5f35400854ef517
                                          • Opcode Fuzzy Hash: 21f7322d89995b978bc692d6a34c2cb3a0a99afc5a2bf98251a13c2bf3ca8100
                                          • Instruction Fuzzy Hash: 15B16D71900119ABDF21DBA4CC85EDEBBBDEF09350F1040AAF609F7151EA309A948FB1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1462 da3b1c-da3b27 1463 da3b99-da3b9b 1462->1463 1464 da3b29-da3b2e 1462->1464 1465 da3b8c-da3b8f 1463->1465 1464->1463 1466 da3b30-da3b48 RegOpenKeyExW 1464->1466 1466->1463 1467 da3b4a-da3b69 RegQueryValueExW 1466->1467 1468 da3b6b-da3b76 1467->1468 1469 da3b80-da3b8b RegCloseKey 1467->1469 1470 da3b78-da3b7a 1468->1470 1471 da3b90-da3b97 1468->1471 1469->1465 1472 da3b7e 1470->1472 1471->1472 1472->1469
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00DA3B0F,SwapMouseButtons,00000004,?), ref: 00DA3B40
                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00DA3B0F,SwapMouseButtons,00000004,?), ref: 00DA3B61
                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00DA3B0F,SwapMouseButtons,00000004,?), ref: 00DA3B83
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CloseOpenQueryValue
                                          • String ID: Control Panel\Mouse
                                          • API String ID: 3677997916-824357125
                                          • Opcode ID: 2dc29d3c8758376bd5bfbf53e2ca436278dc20c663c0507e1b0914a252995f79
                                          • Instruction ID: 4a719a52d7525dfe41607599b5e58eb2639199d85ae07fdae19a735197968795
                                          • Opcode Fuzzy Hash: 2dc29d3c8758376bd5bfbf53e2ca436278dc20c663c0507e1b0914a252995f79
                                          • Instruction Fuzzy Hash: 4A112AB5511208FFDB208FA5DC89AAEBBBAEF05744B144459B805E7110D331DE449B70
                                          APIs
                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 0144940D
                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01449431
                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01449453
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1317732673.0000000001447000.00000040.00000020.00020000.00000000.sdmp, Offset: 01447000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_1447000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                          • String ID:
                                          • API String ID: 2438371351-0
                                          • Opcode ID: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
                                          • Instruction ID: 051abf0f02d20dd2948231f72c9d799c50c32c52e0aa8e7a704c5f6e672559d7
                                          • Opcode Fuzzy Hash: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
                                          • Instruction Fuzzy Hash: 3B620E30A14258DBEB24CFA4C851BDEB776EF58304F1091A9D10DEB3A0E7759E81CB59
                                          APIs
                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00DE33A2
                                            • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00DA3A04
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: IconLoadNotifyShell_String_wcslen
                                          • String ID: Line:
                                          • API String ID: 2289894680-1585850449
                                          • Opcode ID: 12ba793daf1e342df321d89a36ba141d378c43f99fcf9e113bd7ba6e211d92c6
                                          • Instruction ID: e793997d16ef32db6905c64c05e671124d0e067e5b6df8bb3e5242c16c4e4258
                                          • Opcode Fuzzy Hash: 12ba793daf1e342df321d89a36ba141d378c43f99fcf9e113bd7ba6e211d92c6
                                          • Instruction Fuzzy Hash: 2131B071408304AEC721EB24DC46BEBB7E8EB42710F14456AF599A3091EB70D648CBF2
                                          APIs
                                          • GetOpenFileNameW.COMDLG32(?), ref: 00DE2C8C
                                            • Part of subcall function 00DA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA3A97,?,?,00DA2E7F,?,?,?,00000000), ref: 00DA3AC2
                                            • Part of subcall function 00DA2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DA2DC4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Name$Path$FileFullLongOpen
                                          • String ID: X$`e
                                          • API String ID: 779396738-4036142377
                                          • Opcode ID: 9abc5bc2b02a04ecffd15f060087f684eb904ea0ebe61bbd975107eeaeb27763
                                          • Instruction ID: c92d88d6264d9181c6f7f4bd3dc11562430fea2275c37658a772aa4f91b81e14
                                          • Opcode Fuzzy Hash: 9abc5bc2b02a04ecffd15f060087f684eb904ea0ebe61bbd975107eeaeb27763
                                          • Instruction Fuzzy Hash: B821C371A10298AFCB01EF99D805BEE7BFCEF49304F004059E405B7241DBB89A898FB1
                                          APIs
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00DC0668
                                            • Part of subcall function 00DC32A4: RaiseException.KERNEL32(?,?,?,00DC068A,?,00E71444,?,?,?,?,?,?,00DC068A,00DA1129,00E68738,00DA1129), ref: 00DC3304
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00DC0685
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$ExceptionRaise
                                          • String ID: Unknown exception
                                          • API String ID: 3476068407-410509341
                                          • Opcode ID: 9e52636acc6927a3fb2a8b421086c40fb0f3fa4d9a755c29069792781818b63d
                                          • Instruction ID: 9355e8d46c4b3e53020c0ee8ea331e815b8333f2b329eebe262dcb7a5dd6fdfe
                                          • Opcode Fuzzy Hash: 9e52636acc6927a3fb2a8b421086c40fb0f3fa4d9a755c29069792781818b63d
                                          • Instruction Fuzzy Hash: D4F0683494030EF78F00BA64EC4AE9D7F6C9E40350BA44539B915D7591EF71DA66C5B0
                                          APIs
                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00E1302F
                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00E13044
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Temp$FileNamePath
                                          • String ID: aut
                                          • API String ID: 3285503233-3010740371
                                          • Opcode ID: ec3917a66204800e552ef4f75e3c07d85544d0aa02d964b581870500b24b171d
                                          • Instruction ID: 7b875d61adbf5628db2b0b0874f6855cc108017be3fefb01b4a772d3057b5a28
                                          • Opcode Fuzzy Hash: ec3917a66204800e552ef4f75e3c07d85544d0aa02d964b581870500b24b171d
                                          • Instruction Fuzzy Hash: DFD05B72540318ABDA209795AC0DFC73E6CD704750F0002517655F20A1DAB0D544CBD0
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00E282F5
                                          • TerminateProcess.KERNEL32(00000000), ref: 00E282FC
                                          • FreeLibrary.KERNEL32(?,?,?,?), ref: 00E284DD
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process$CurrentFreeLibraryTerminate
                                          • String ID:
                                          • API String ID: 146820519-0
                                          • Opcode ID: 7ac65773fc639fd1bda7609b299e2e45db9cff03bbcdd203a33147af2ee5db69
                                          • Instruction ID: 8d847f49d2a04921492e55f89409a8b5af09db7373f380e1cb9875420b7bded8
                                          • Opcode Fuzzy Hash: 7ac65773fc639fd1bda7609b299e2e45db9cff03bbcdd203a33147af2ee5db69
                                          • Instruction Fuzzy Hash: BB128A71A08311CFD714DF28C584B6ABBE1FF89318F04995DE8999B292CB30ED45CB92
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 63a306c5e701c40c4d8f7d31f13edb3fead19524063b771d4779d3e73b5c5518
                                          • Instruction ID: da6e67cad21067e5cd789aabd1f494192dfdd040ca19708d94ef9eadbfcd02c7
                                          • Opcode Fuzzy Hash: 63a306c5e701c40c4d8f7d31f13edb3fead19524063b771d4779d3e73b5c5518
                                          • Instruction Fuzzy Hash: 3551BD71A1060AAFDB20AFA9E845FEEBFB9EF05310F18005BF405A7395D6719A01DB71
                                          APIs
                                            • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DA1BF4
                                            • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00DA1BFC
                                            • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DA1C07
                                            • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DA1C12
                                            • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00DA1C1A
                                            • Part of subcall function 00DA1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00DA1C22
                                            • Part of subcall function 00DA1B4A: RegisterWindowMessageW.USER32(00000004,?,00DA12C4), ref: 00DA1BA2
                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00DA136A
                                          • OleInitialize.OLE32 ref: 00DA1388
                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 00DE24AB
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                          • String ID:
                                          • API String ID: 1986988660-0
                                          • Opcode ID: 96978e62bc488aa7903d53ca90e36017d0559c077b72b7b19f642e1f82f0798e
                                          • Instruction ID: f59fda6d4cadca1abb867c047f889c16ef543b0b7d99885aef838628d2e503ed
                                          • Opcode Fuzzy Hash: 96978e62bc488aa7903d53ca90e36017d0559c077b72b7b19f642e1f82f0798e
                                          • Instruction Fuzzy Hash: DB71AEB49113408FD388DF7FA8466553AE5FBC934475592AED01EF7261EB308489CF62
                                          APIs
                                            • Part of subcall function 00DA3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00DA3A04
                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E0C259
                                          • KillTimer.USER32(?,00000001,?,?), ref: 00E0C261
                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E0C270
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_Timer$Kill
                                          • String ID:
                                          • API String ID: 3500052701-0
                                          • Opcode ID: 41b42175ee7a8b8c4fe6f9eb35693ef3130612821c10afd6057f006cc54b73d8
                                          • Instruction ID: 0023ddd8725de03d248e11e864417f4d70a186c92f86623616f84d0585123723
                                          • Opcode Fuzzy Hash: 41b42175ee7a8b8c4fe6f9eb35693ef3130612821c10afd6057f006cc54b73d8
                                          • Instruction Fuzzy Hash: 6D31B470904744AFEB228B648855BEBBBEC9B06308F10149EE5DEB3291C7745AC8CB51
                                          APIs
                                          • CloseHandle.KERNELBASE(00000000,00000000,?,?,00DD85CC,?,00E68CC8,0000000C), ref: 00DD8704
                                          • GetLastError.KERNEL32(?,00DD85CC,?,00E68CC8,0000000C), ref: 00DD870E
                                          • __dosmaperr.LIBCMT ref: 00DD8739
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CloseErrorHandleLast__dosmaperr
                                          • String ID:
                                          • API String ID: 2583163307-0
                                          • Opcode ID: 96d726b2667def3e990c527d3b3c77b87c661fff102caef1b11c0dd57ee168ce
                                          • Instruction ID: 9963398a8bce6b2e2460ed2134b7352c9bb5b0832c1517854dc2c022a00a782a
                                          • Opcode Fuzzy Hash: 96d726b2667def3e990c527d3b3c77b87c661fff102caef1b11c0dd57ee168ce
                                          • Instruction Fuzzy Hash: 94014E336056603AD6267734BC45B7E6B49CB81774F3D015BF8189B3D2DEA0CC85A270
                                          APIs
                                          • TranslateMessage.USER32(?), ref: 00DADB7B
                                          • DispatchMessageW.USER32(?), ref: 00DADB89
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DADB9F
                                          • Sleep.KERNEL32(0000000A), ref: 00DADBB1
                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00DF1CC9
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                          • String ID:
                                          • API String ID: 3288985973-0
                                          • Opcode ID: de0cce58e0473f1f295ff909073333240fbfe446f437d1cef40a8ece26e45712
                                          • Instruction ID: 0fae118f7f6cbdab78deb912a2405608f35396f45047b416d04358c614f4629e
                                          • Opcode Fuzzy Hash: de0cce58e0473f1f295ff909073333240fbfe446f437d1cef40a8ece26e45712
                                          • Instruction Fuzzy Hash: E8F05E30604344DBE734CB718C49FEA77B9EB85310F244519E65AA30C0DB30D488CB36
                                          APIs
                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00E12CD4,?,?,?,00000004,00000001), ref: 00E12FF2
                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00E12CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E13006
                                          • CloseHandle.KERNEL32(00000000,?,00E12CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E1300D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: File$CloseCreateHandleTime
                                          • String ID:
                                          • API String ID: 3397143404-0
                                          • Opcode ID: 5b38b01f5147ba7d91f3eb3035d6439f6c3b578eea7a8ba78590a7118cbe95ce
                                          • Instruction ID: 0ea1725bc1297ccebd8f36ed55d72fa15c2edd646ce83cdb5d331f76a55f4245
                                          • Opcode Fuzzy Hash: 5b38b01f5147ba7d91f3eb3035d6439f6c3b578eea7a8ba78590a7118cbe95ce
                                          • Instruction Fuzzy Hash: 58E0CD322813147BD2301766BC0DFCB3E6CDBCAF75F214210F759750D146A0950553A8
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 00DB17F6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: CALL
                                          • API String ID: 1385522511-4196123274
                                          • Opcode ID: 02bf19c562532d8c0c37b3cb085a4af917416fea60f91f17886c63d65d12283b
                                          • Instruction ID: 83333637e2890fc0eb63e643cb8b41908c0b9bcee7aa4848fa98548f484b9f3c
                                          • Opcode Fuzzy Hash: 02bf19c562532d8c0c37b3cb085a4af917416fea60f91f17886c63d65d12283b
                                          • Instruction Fuzzy Hash: 37228974608241DFC714DF24C8A0AAABBF1FF85314F68891DF5969B361D731E845CBA2
                                          APIs
                                          • _wcslen.LIBCMT ref: 00E16F6B
                                            • Part of subcall function 00DA4ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4EFD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: LibraryLoad_wcslen
                                          • String ID: >>>AUTOIT SCRIPT<<<
                                          • API String ID: 3312870042-2806939583
                                          • Opcode ID: 8b50a2515601e756a07ce662e51dd2a3a3fc3a1d4b760595a2cd6c2fed76f1b8
                                          • Instruction ID: cb5d1e85f326316ec952f92b2a30e6ad5d7b594f196d69a023c2690b3c31a5e3
                                          • Opcode Fuzzy Hash: 8b50a2515601e756a07ce662e51dd2a3a3fc3a1d4b760595a2cd6c2fed76f1b8
                                          • Instruction Fuzzy Hash: 11B185315083019FCB14EF24C8919AEB7E5EF95714F04895DF496972A1EB30ED89CBB2
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: __fread_nolock
                                          • String ID: EA06
                                          • API String ID: 2638373210-3962188686
                                          • Opcode ID: 6a5177db5df4d9afd263d6682bfe4ea328f9a430ad0ff2d25ad70d8773e53cce
                                          • Instruction ID: dd21188690a1928ba53b5feed641bff59287e2aa50170b6200f3a676439f8d5c
                                          • Opcode Fuzzy Hash: 6a5177db5df4d9afd263d6682bfe4ea328f9a430ad0ff2d25ad70d8773e53cce
                                          • Instruction Fuzzy Hash: 5E01B5B29442587EDF28C7A8CC56FEEBBF8DB05315F00455EF252E2181E5B4E6188B70
                                          APIs
                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DA3908
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_
                                          • String ID:
                                          • API String ID: 1144537725-0
                                          • Opcode ID: b70c608635e82d737e6f15f4839b8a1ff4cdefb4ad8aa3156ebf3d562ba48764
                                          • Instruction ID: 7a28f57161e40476988310a889b58703e0336dd741ab472821b783e911af25a3
                                          • Opcode Fuzzy Hash: b70c608635e82d737e6f15f4839b8a1ff4cdefb4ad8aa3156ebf3d562ba48764
                                          • Instruction Fuzzy Hash: BF319170504301DFD720DF79D885B97BBE8FB4A708F14096EF59993280E775AA48CB62
                                          APIs
                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 0144940D
                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01449431
                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01449453
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1317732673.0000000001447000.00000040.00000020.00020000.00000000.sdmp, Offset: 01447000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_1447000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                          • String ID:
                                          • API String ID: 2438371351-0
                                          • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                          • Instruction ID: fa39fe1cdaf7d0ec0e7e6774af7dd9bbcf5196a93fe697e04e2d2f385b91d018
                                          • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                          • Instruction Fuzzy Hash: 9E12CD24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                          • Instruction ID: 7c232d9b83e9dd71ed2a0831647df8b35384769fa3e40314b1d3bad50c61d398
                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                          • Instruction Fuzzy Hash: A031E475A00109DBC718CF59D8C0AA9FBA5FF49300B2886A5E84ACF656D731EDD1CBE0
                                          APIs
                                            • Part of subcall function 00DA4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DA4EDD,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4E9C
                                            • Part of subcall function 00DA4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00DA4EAE
                                            • Part of subcall function 00DA4E90: FreeLibrary.KERNEL32(00000000,?,?,00DA4EDD,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4EC0
                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4EFD
                                            • Part of subcall function 00DA4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DE3CDE,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4E62
                                            • Part of subcall function 00DA4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00DA4E74
                                            • Part of subcall function 00DA4E59: FreeLibrary.KERNEL32(00000000,?,?,00DE3CDE,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4E87
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Library$Load$AddressFreeProc
                                          • String ID:
                                          • API String ID: 2632591731-0
                                          • Opcode ID: 5a3ba8de460423a6bc35b8665369fa68fd2badf6617269cd59b46671f07f2a5e
                                          • Instruction ID: 5ca831e17edc014026329894164e52db6954c486ce45ad3d5554110371e42953
                                          • Opcode Fuzzy Hash: 5a3ba8de460423a6bc35b8665369fa68fd2badf6617269cd59b46671f07f2a5e
                                          • Instruction Fuzzy Hash: 1E110132610205AECB14BB60DC16FAD77A4EF81B10F20842DF552B71C1EEB4EA449770
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: __wsopen_s
                                          • String ID:
                                          • API String ID: 3347428461-0
                                          • Opcode ID: a64d1eaa3e5ee57f835d7319103dbb0ba0c99476b89643780e5a121b3043cef4
                                          • Instruction ID: 40e21f75cc5747a6c3d8728b9ff58761d5511c70d897826ce07779736e9a84c1
                                          • Opcode Fuzzy Hash: a64d1eaa3e5ee57f835d7319103dbb0ba0c99476b89643780e5a121b3043cef4
                                          • Instruction Fuzzy Hash: 6111187590420AAFCB06DF58E941A9A7BF5EF48314F14405AF808AB312DB31EA15DBB5
                                          APIs
                                            • Part of subcall function 00DD4C7D: RtlAllocateHeap.NTDLL(00000008,00DA1129,00000000,?,00DD2E29,00000001,00000364,?,?,?,00DCF2DE,00DD3863,00E71444,?,00DBFDF5,?), ref: 00DD4CBE
                                          • _free.LIBCMT ref: 00DD506C
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AllocateHeap_free
                                          • String ID:
                                          • API String ID: 614378929-0
                                          • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                          • Instruction ID: 17bcd6433005386da676adad7590cbca0a60db0a380781859a3e2c15257c3ee9
                                          • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                          • Instruction Fuzzy Hash: 22014E722047045BE3318F55D84196AFBECFB85370F25051EE184833C0E730A805C774
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                          • Instruction ID: 950c51ba5c32353b0be0cff0583e76b6b009d340efbe6363a14d2d4c8deababa
                                          • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                          • Instruction Fuzzy Hash: 32F0F472561A11A7C6323AB98C05F6A339DDF62330F140B2EF421932D2DB74E8029AB5
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000008,00DA1129,00000000,?,00DD2E29,00000001,00000364,?,?,?,00DCF2DE,00DD3863,00E71444,?,00DBFDF5,?), ref: 00DD4CBE
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 76eca3cf624038a603cf812d43a340aeb7f5e3e4f4fd71156f6b1d4cdf8ac6fd
                                          • Instruction ID: 3320e1b28f6410f79b8967693e75a18325a5e1759c248898ba35902adadb792f
                                          • Opcode Fuzzy Hash: 76eca3cf624038a603cf812d43a340aeb7f5e3e4f4fd71156f6b1d4cdf8ac6fd
                                          • Instruction Fuzzy Hash: A8F0B43162322567DB215F6A9D09F5A3789EF917A1B19411BB819AB380CA70D80196B0
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,?,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6,?,00DA1129), ref: 00DD3852
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: ebbb7b7bea1268fa1111748a4ad2ad4202814fb76fe99f68fdb9fc820d81bcc4
                                          • Instruction ID: a01b525cd4106fff27f454a36f4795911971aa097f0b83c67e46748abdd68e9f
                                          • Opcode Fuzzy Hash: ebbb7b7bea1268fa1111748a4ad2ad4202814fb76fe99f68fdb9fc820d81bcc4
                                          • Instruction Fuzzy Hash: B2E0E5311023256AD62126679C04F9A3A4EEF427B0F1D002ABC44A7780CB61DD01A2F2
                                          APIs
                                          • FreeLibrary.KERNEL32(?,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4F6D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: FreeLibrary
                                          • String ID:
                                          • API String ID: 3664257935-0
                                          • Opcode ID: 307837e018a05f5ca7b1e4bc0cfe351162def4f0a361236ce89d8e77afbe8fac
                                          • Instruction ID: 9ad631e16097f141bdec2fa52d871c0f0712695bbcc36d4fedb9325eba975371
                                          • Opcode Fuzzy Hash: 307837e018a05f5ca7b1e4bc0cfe351162def4f0a361236ce89d8e77afbe8fac
                                          • Instruction Fuzzy Hash: AAF0A97100A352CFCB348F20D490822BBF0EF42329324997EE1EA83620C7B1D848EF21
                                          APIs
                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DA2DC4
                                            • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: LongNamePath_wcslen
                                          • String ID:
                                          • API String ID: 541455249-0
                                          • Opcode ID: a0a94781772d70e00ed52ae8fa87b00ed0340dbf2ce0543676a6619ca0e0e673
                                          • Instruction ID: cc5cc2989008425d051dcf7e9915d6f97ae71f92b0c06edd3b73902febbd3495
                                          • Opcode Fuzzy Hash: a0a94781772d70e00ed52ae8fa87b00ed0340dbf2ce0543676a6619ca0e0e673
                                          • Instruction Fuzzy Hash: B9E0CD766041245BC711A2599C05FDA77DDDFC8790F0400B1FD09E7258D970ED8486B0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: __fread_nolock
                                          • String ID:
                                          • API String ID: 2638373210-0
                                          • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                          • Instruction ID: 6dc89b91a881ac121c2a2eabcf058623a6f8a536113155d53d9d2783d85088e2
                                          • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                          • Instruction Fuzzy Hash: 9BE04FB0609B005FDF395A28AC51BF677E8DF49304F00086EF69B93252E57268958A5D
                                          APIs
                                            • Part of subcall function 00DA3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DA3908
                                            • Part of subcall function 00DAD730: GetInputState.USER32 ref: 00DAD807
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00DA2B6B
                                            • Part of subcall function 00DA30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00DA314E
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                          • String ID:
                                          • API String ID: 3667716007-0
                                          • Opcode ID: daf9e49119ce2cbf30fa5dbefb4975955abf25adfe1cef76e6df154001b9c16f
                                          • Instruction ID: 034d9628949f84786b81b8f232e924233e59fd48231081ae70f0eb93288e6dd5
                                          • Opcode Fuzzy Hash: daf9e49119ce2cbf30fa5dbefb4975955abf25adfe1cef76e6df154001b9c16f
                                          • Instruction Fuzzy Hash: CCE086223042440BCA08BB79A85657DB75ADBD7351F40557EF157631A2DE2889494371
                                          APIs
                                          • CreateFileW.KERNELBASE(00000000,00000000,?,00DE0704,?,?,00000000,?,00DE0704,00000000,0000000C), ref: 00DE03B7
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CreateFile
                                          • String ID:
                                          • API String ID: 823142352-0
                                          • Opcode ID: dfaed938351837801a572ca9168a74b5b5485063e0f753c9753c02e7309c4a34
                                          • Instruction ID: 04d0ab402e6c53dcb3e81a9e009ba1dda7db6b7fcfd3ab6430dec21e648aa906
                                          • Opcode Fuzzy Hash: dfaed938351837801a572ca9168a74b5b5485063e0f753c9753c02e7309c4a34
                                          • Instruction Fuzzy Hash: 3ED06C3204010DBFDF028F85DD0AEDA3FAAFB48714F114000BE5866020C732E821AB90
                                          APIs
                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00DA1CBC
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: InfoParametersSystem
                                          • String ID:
                                          • API String ID: 3098949447-0
                                          • Opcode ID: b25604f0024ebf76e620c229cd04a4928b17758f17197ad3636a3dd412b61ad5
                                          • Instruction ID: c46c2efb985f7ffc88e1c87b23e91c02ca8a09f570e80322764021c1e390731a
                                          • Opcode Fuzzy Hash: b25604f0024ebf76e620c229cd04a4928b17758f17197ad3636a3dd412b61ad5
                                          • Instruction Fuzzy Hash: 7CC04836280308AFE2148B96AC4AF107B64A748B00F148001F64DB95E382A268A8AA61
                                          APIs
                                          • Sleep.KERNELBASE(000001F4), ref: 01449BF1
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1317732673.0000000001447000.00000040.00000020.00020000.00000000.sdmp, Offset: 01447000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_1447000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Sleep
                                          • String ID:
                                          • API String ID: 3472027048-0
                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                          • Instruction ID: a080a8009efaa0a36d1a37afe361af35d823bfd422b6839eb21bb344cf58c62d
                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                          • Instruction Fuzzy Hash: 1BE0E67498110DEFDB00EFF4D6496AE7FF4EF04301F100161FD01D2281D6309D509A62
                                          APIs
                                            • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00E3961A
                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E3965B
                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00E3969F
                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E396C9
                                          • SendMessageW.USER32 ref: 00E396F2
                                          • GetKeyState.USER32(00000011), ref: 00E3978B
                                          • GetKeyState.USER32(00000009), ref: 00E39798
                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E397AE
                                          • GetKeyState.USER32(00000010), ref: 00E397B8
                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E397E9
                                          • SendMessageW.USER32 ref: 00E39810
                                          • SendMessageW.USER32(?,00001030,?,00E37E95), ref: 00E39918
                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00E3992E
                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00E39941
                                          • SetCapture.USER32(?), ref: 00E3994A
                                          • ClientToScreen.USER32(?,?), ref: 00E399AF
                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00E399BC
                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E399D6
                                          • ReleaseCapture.USER32 ref: 00E399E1
                                          • GetCursorPos.USER32(?), ref: 00E39A19
                                          • ScreenToClient.USER32(?,?), ref: 00E39A26
                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E39A80
                                          • SendMessageW.USER32 ref: 00E39AAE
                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E39AEB
                                          • SendMessageW.USER32 ref: 00E39B1A
                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00E39B3B
                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00E39B4A
                                          • GetCursorPos.USER32(?), ref: 00E39B68
                                          • ScreenToClient.USER32(?,?), ref: 00E39B75
                                          • GetParent.USER32(?), ref: 00E39B93
                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E39BFA
                                          • SendMessageW.USER32 ref: 00E39C2B
                                          • ClientToScreen.USER32(?,?), ref: 00E39C84
                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00E39CB4
                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E39CDE
                                          • SendMessageW.USER32 ref: 00E39D01
                                          • ClientToScreen.USER32(?,?), ref: 00E39D4E
                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00E39D82
                                            • Part of subcall function 00DB9944: GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E39E05
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                          • String ID: @GUI_DRAGID$F$p#
                                          • API String ID: 3429851547-638943876
                                          • Opcode ID: aa91af50b681a048114e9d948805402ab443df8832241a8fcca422d94d8d5686
                                          • Instruction ID: 6364ef79372778619df3744530734f8bb465e6eb59365b8265b60b60b814c09b
                                          • Opcode Fuzzy Hash: aa91af50b681a048114e9d948805402ab443df8832241a8fcca422d94d8d5686
                                          • Instruction Fuzzy Hash: A542AD31205300AFD724CF28CC49AAABFE5FF89714F101659F699A72A2D7B1E854CF52
                                          APIs
                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00E348F3
                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00E34908
                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00E34927
                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00E3494B
                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00E3495C
                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00E3497B
                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00E349AE
                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00E349D4
                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00E34A0F
                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E34A56
                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E34A7E
                                          • IsMenu.USER32(?), ref: 00E34A97
                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E34AF2
                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E34B20
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E34B94
                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00E34BE3
                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00E34C82
                                          • wsprintfW.USER32 ref: 00E34CAE
                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E34CC9
                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E34CF1
                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E34D13
                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E34D33
                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E34D5A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                          • String ID: %d/%02d/%02d
                                          • API String ID: 4054740463-328681919
                                          • Opcode ID: 1f025b1a2fba41cb3d246044b7ecd77c86616c0cfe9cf9d11be1d5320081475b
                                          • Instruction ID: f61e9d571686e0c90b2488ef4509e99358830ae7a2c12d5d54c0bccab588f14e
                                          • Opcode Fuzzy Hash: 1f025b1a2fba41cb3d246044b7ecd77c86616c0cfe9cf9d11be1d5320081475b
                                          • Instruction Fuzzy Hash: 2712DEB1600218ABEB248F25CC4DFAE7FE8EF45714F145119F516FA2E1DB74AA41CB60
                                          APIs
                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00DBF998
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00DFF474
                                          • IsIconic.USER32(00000000), ref: 00DFF47D
                                          • ShowWindow.USER32(00000000,00000009), ref: 00DFF48A
                                          • SetForegroundWindow.USER32(00000000), ref: 00DFF494
                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DFF4AA
                                          • GetCurrentThreadId.KERNEL32 ref: 00DFF4B1
                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DFF4BD
                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DFF4CE
                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DFF4D6
                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00DFF4DE
                                          • SetForegroundWindow.USER32(00000000), ref: 00DFF4E1
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFF4F6
                                          • keybd_event.USER32(00000012,00000000), ref: 00DFF501
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFF50B
                                          • keybd_event.USER32(00000012,00000000), ref: 00DFF510
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFF519
                                          • keybd_event.USER32(00000012,00000000), ref: 00DFF51E
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFF528
                                          • keybd_event.USER32(00000012,00000000), ref: 00DFF52D
                                          • SetForegroundWindow.USER32(00000000), ref: 00DFF530
                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00DFF557
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 4125248594-2988720461
                                          • Opcode ID: 3ddc61f5b3c7bb35b1ae7768c2c58fb47e7a4e44802365f256f6ea0dfe9c04c2
                                          • Instruction ID: 83214566699fbb83212da80be72e7b826d0eb60a8e59fc773bb2d402e299f79f
                                          • Opcode Fuzzy Hash: 3ddc61f5b3c7bb35b1ae7768c2c58fb47e7a4e44802365f256f6ea0dfe9c04c2
                                          • Instruction Fuzzy Hash: 9A313671A4021CBFEB205BB65C4AFBF7E6CEB44B50F254065F601F61D1C6B19900AB61
                                          APIs
                                            • Part of subcall function 00E016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E0170D
                                            • Part of subcall function 00E016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E0173A
                                            • Part of subcall function 00E016C3: GetLastError.KERNEL32 ref: 00E0174A
                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00E01286
                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00E012A8
                                          • CloseHandle.KERNEL32(?), ref: 00E012B9
                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00E012D1
                                          • GetProcessWindowStation.USER32 ref: 00E012EA
                                          • SetProcessWindowStation.USER32(00000000), ref: 00E012F4
                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00E01310
                                            • Part of subcall function 00E010BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E011FC), ref: 00E010D4
                                            • Part of subcall function 00E010BF: CloseHandle.KERNEL32(?,?,00E011FC), ref: 00E010E9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                          • String ID: $default$winsta0$Z
                                          • API String ID: 22674027-1808616255
                                          • Opcode ID: 8c653106fd0d30eb3abe66bc581a922a7745dfa6abdbb25cce3c47bdba060bbb
                                          • Instruction ID: e8e8bbf4092def4502f4e52036051ee03c4c8c6aa8d64416be92fd313006db42
                                          • Opcode Fuzzy Hash: 8c653106fd0d30eb3abe66bc581a922a7745dfa6abdbb25cce3c47bdba060bbb
                                          • Instruction Fuzzy Hash: C6817A71900209AFDF219FA5DC49BEE7BB9EF04708F1451A9F921BA1A0C7758998CB21
                                          APIs
                                            • Part of subcall function 00E010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E01114
                                            • Part of subcall function 00E010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01120
                                            • Part of subcall function 00E010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E0112F
                                            • Part of subcall function 00E010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01136
                                            • Part of subcall function 00E010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E0114D
                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E00BCC
                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E00C00
                                          • GetLengthSid.ADVAPI32(?), ref: 00E00C17
                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00E00C51
                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E00C6D
                                          • GetLengthSid.ADVAPI32(?), ref: 00E00C84
                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00E00C8C
                                          • HeapAlloc.KERNEL32(00000000), ref: 00E00C93
                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E00CB4
                                          • CopySid.ADVAPI32(00000000), ref: 00E00CBB
                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E00CEA
                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E00D0C
                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E00D1E
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00D45
                                          • HeapFree.KERNEL32(00000000), ref: 00E00D4C
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00D55
                                          • HeapFree.KERNEL32(00000000), ref: 00E00D5C
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00D65
                                          • HeapFree.KERNEL32(00000000), ref: 00E00D6C
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00E00D78
                                          • HeapFree.KERNEL32(00000000), ref: 00E00D7F
                                            • Part of subcall function 00E01193: GetProcessHeap.KERNEL32(00000008,00E00BB1,?,00000000,?,00E00BB1,?), ref: 00E011A1
                                            • Part of subcall function 00E01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E00BB1,?), ref: 00E011A8
                                            • Part of subcall function 00E01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00E00BB1,?), ref: 00E011B7
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                          • String ID:
                                          • API String ID: 4175595110-0
                                          • Opcode ID: 9b4e9bc80e3acc011bb300225f15ae9e1bf38164a79a6d2cab42fa759cfbb472
                                          • Instruction ID: b3347691099518833f9e10bbfb5b88d191c04cfaa9b44ae2bef1b2ab23744928
                                          • Opcode Fuzzy Hash: 9b4e9bc80e3acc011bb300225f15ae9e1bf38164a79a6d2cab42fa759cfbb472
                                          • Instruction Fuzzy Hash: 9E71477290020AAFDF10DFA5DC48BAEBBB8BF04314F144515E914B6291D771EA89CBB0
                                          APIs
                                          • OpenClipboard.USER32(00E3CC08), ref: 00E1EB29
                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00E1EB37
                                          • GetClipboardData.USER32(0000000D), ref: 00E1EB43
                                          • CloseClipboard.USER32 ref: 00E1EB4F
                                          • GlobalLock.KERNEL32(00000000), ref: 00E1EB87
                                          • CloseClipboard.USER32 ref: 00E1EB91
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E1EBBC
                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00E1EBC9
                                          • GetClipboardData.USER32(00000001), ref: 00E1EBD1
                                          • GlobalLock.KERNEL32(00000000), ref: 00E1EBE2
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E1EC22
                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 00E1EC38
                                          • GetClipboardData.USER32(0000000F), ref: 00E1EC44
                                          • GlobalLock.KERNEL32(00000000), ref: 00E1EC55
                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00E1EC77
                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00E1EC94
                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00E1ECD2
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E1ECF3
                                          • CountClipboardFormats.USER32 ref: 00E1ED14
                                          • CloseClipboard.USER32 ref: 00E1ED59
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                          • String ID:
                                          • API String ID: 420908878-0
                                          • Opcode ID: 51f1667e3fad1291c9b6b0569243363a62844591b13e7b576216c5da43a1301a
                                          • Instruction ID: eb76b74552e34c41eda4e24e146d7de438c1aadd06708669679615f27c073347
                                          • Opcode Fuzzy Hash: 51f1667e3fad1291c9b6b0569243363a62844591b13e7b576216c5da43a1301a
                                          • Instruction Fuzzy Hash: 5161D0352043059FD310EF25D889FAABBE4EF85708F185519F856B72A1CB30DD89CBA2
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E169BE
                                          • FindClose.KERNEL32(00000000), ref: 00E16A12
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E16A4E
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E16A75
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E16AB2
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E16ADF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                          • API String ID: 3830820486-3289030164
                                          • Opcode ID: 60252bee5642f77202254e0ff2591d33c2397a167d65e0170f782f40986c175d
                                          • Instruction ID: f7706b54fab98518ca4b8a67497de0c6fe53826ffa11b17fa30fd226d106cc36
                                          • Opcode Fuzzy Hash: 60252bee5642f77202254e0ff2591d33c2397a167d65e0170f782f40986c175d
                                          • Instruction Fuzzy Hash: CBD14CB2508300AEC714EBA4CC96EABB7ECEF89704F44491DF585D6191EB74DA48CB72
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00E19663
                                          • GetFileAttributesW.KERNEL32(?), ref: 00E196A1
                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00E196BB
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00E196D3
                                          • FindClose.KERNEL32(00000000), ref: 00E196DE
                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00E196FA
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E1974A
                                          • SetCurrentDirectoryW.KERNEL32(00E66B7C), ref: 00E19768
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E19772
                                          • FindClose.KERNEL32(00000000), ref: 00E1977F
                                          • FindClose.KERNEL32(00000000), ref: 00E1978F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                          • String ID: *.*
                                          • API String ID: 1409584000-438819550
                                          • Opcode ID: 44d0d81bc65ef663a03a7ea1ca57374523cd224b25dbfa88890a874d12bfe003
                                          • Instruction ID: 6c1c344e4fcee3d8fe60bd75dfa52b357098028a671c198c32ea42acc8a81fb5
                                          • Opcode Fuzzy Hash: 44d0d81bc65ef663a03a7ea1ca57374523cd224b25dbfa88890a874d12bfe003
                                          • Instruction Fuzzy Hash: F731A23254061A6EDB14AFB5EC5DADE7BAC9F09324F205196F815F30E1DB34D9848B24
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00E197BE
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00E19819
                                          • FindClose.KERNEL32(00000000), ref: 00E19824
                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00E19840
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E19890
                                          • SetCurrentDirectoryW.KERNEL32(00E66B7C), ref: 00E198AE
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E198B8
                                          • FindClose.KERNEL32(00000000), ref: 00E198C5
                                          • FindClose.KERNEL32(00000000), ref: 00E198D5
                                            • Part of subcall function 00E0DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00E0DB00
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                          • String ID: *.*
                                          • API String ID: 2640511053-438819550
                                          • Opcode ID: 57df03b351bfeaddb101a47cf5ef8929590daa772ab077c98fd705fe51907fd0
                                          • Instruction ID: e611f6d213e6b8eb59111d8724ed283586bf4f56d369f89f19fc74750fa214e5
                                          • Opcode Fuzzy Hash: 57df03b351bfeaddb101a47cf5ef8929590daa772ab077c98fd705fe51907fd0
                                          • Instruction Fuzzy Hash: 0331C33254061A6EDB14AFB5EC58ADE7BACEF06324F2051A5E814B30A1DB30D9C9CB24
                                          APIs
                                          • GetLocalTime.KERNEL32(?), ref: 00E18257
                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00E18267
                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00E18273
                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E18310
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E18324
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E18356
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E1838C
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E18395
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CurrentDirectoryTime$File$Local$System
                                          • String ID: *.*
                                          • API String ID: 1464919966-438819550
                                          • Opcode ID: 98990ad1254c50e99f7ee32560100f8d5e720f3369b73f5080dbedf48e25d0b9
                                          • Instruction ID: e2e1623381117cd9c09ed1d36e6498fbb2e149a2396f10cd3935df0014243855
                                          • Opcode Fuzzy Hash: 98990ad1254c50e99f7ee32560100f8d5e720f3369b73f5080dbedf48e25d0b9
                                          • Instruction Fuzzy Hash: 1A616C725043459FC710EF60C84499EB3E8FF89314F04491EF999A7251EB31E989CBA2
                                          APIs
                                            • Part of subcall function 00DA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA3A97,?,?,00DA2E7F,?,?,?,00000000), ref: 00DA3AC2
                                            • Part of subcall function 00E0E199: GetFileAttributesW.KERNEL32(?,00E0CF95), ref: 00E0E19A
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E0D122
                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00E0D1DD
                                          • MoveFileW.KERNEL32(?,?), ref: 00E0D1F0
                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E0D20D
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E0D237
                                            • Part of subcall function 00E0D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00E0D21C,?,?), ref: 00E0D2B2
                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 00E0D253
                                          • FindClose.KERNEL32(00000000), ref: 00E0D264
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                          • String ID: \*.*
                                          • API String ID: 1946585618-1173974218
                                          • Opcode ID: 4c11b5984a1c4614319e29d740da0d2a48858afe07bd152dbf79efd73530b00f
                                          • Instruction ID: 98bb51478be6ec31e4f22c9cbbfcfeb606da7845bba1e1f501e24d26d2d000fa
                                          • Opcode Fuzzy Hash: 4c11b5984a1c4614319e29d740da0d2a48858afe07bd152dbf79efd73530b00f
                                          • Instruction Fuzzy Hash: B361393180511DAACF05EBE0DE929EEB7B5EF56304F249165E402771A1EB34AF49CB70
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                          • String ID:
                                          • API String ID: 1737998785-0
                                          • Opcode ID: 8c709212fb7ff441051e07a0f6ba549652ed0f91d1043d750ab77a56bc354920
                                          • Instruction ID: c265a14f780c7ba13d4a5b5a15787391d2cfed90fdd7cfb3929819b6dfe209c9
                                          • Opcode Fuzzy Hash: 8c709212fb7ff441051e07a0f6ba549652ed0f91d1043d750ab77a56bc354920
                                          • Instruction Fuzzy Hash: 5841A035204611AFD310DF26E849F59BBE1EF84328F14D099F819AB762C735EC85CBA0
                                          APIs
                                            • Part of subcall function 00E016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E0170D
                                            • Part of subcall function 00E016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E0173A
                                            • Part of subcall function 00E016C3: GetLastError.KERNEL32 ref: 00E0174A
                                          • ExitWindowsEx.USER32(?,00000000), ref: 00E0E932
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                          • String ID: $ $@$SeShutdownPrivilege
                                          • API String ID: 2234035333-3163812486
                                          • Opcode ID: 26b1173f39d2b0838d519ecdcff2810aa8f24f3b14fc2248b7990911ba0d7da8
                                          • Instruction ID: 28e259dee0e615504e0b9bda722ef59c9add36e09d5638189df14a894e017fa5
                                          • Opcode Fuzzy Hash: 26b1173f39d2b0838d519ecdcff2810aa8f24f3b14fc2248b7990911ba0d7da8
                                          • Instruction Fuzzy Hash: F8012633610316AFEB5422B5AC8ABBB729CA754744F642D71FC02F22D1D5A19CC48290
                                          APIs
                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00E21276
                                          • WSAGetLastError.WSOCK32 ref: 00E21283
                                          • bind.WSOCK32(00000000,?,00000010), ref: 00E212BA
                                          • WSAGetLastError.WSOCK32 ref: 00E212C5
                                          • closesocket.WSOCK32(00000000), ref: 00E212F4
                                          • listen.WSOCK32(00000000,00000005), ref: 00E21303
                                          • WSAGetLastError.WSOCK32 ref: 00E2130D
                                          • closesocket.WSOCK32(00000000), ref: 00E2133C
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                          • String ID:
                                          • API String ID: 540024437-0
                                          • Opcode ID: 6528cb2402748b00f1b86a98961a7c19f3f1774f2cf1bb8f53d18ed539755fde
                                          • Instruction ID: 198ba7248e2d553168a82e51916759c2e72f7b8e5427aeddf4d746db32c00f6f
                                          • Opcode Fuzzy Hash: 6528cb2402748b00f1b86a98961a7c19f3f1774f2cf1bb8f53d18ed539755fde
                                          • Instruction Fuzzy Hash: 9341A531600110DFD714DF24D488B29BBE6EF56318F2890C8E856AF2A2C771EE85CBE1
                                          APIs
                                          • _free.LIBCMT ref: 00DDB9D4
                                          • _free.LIBCMT ref: 00DDB9F8
                                          • _free.LIBCMT ref: 00DDBB7F
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E43700), ref: 00DDBB91
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00E7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00DDBC09
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00E71270,000000FF,?,0000003F,00000000,?), ref: 00DDBC36
                                          • _free.LIBCMT ref: 00DDBD4B
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                          • String ID:
                                          • API String ID: 314583886-0
                                          • Opcode ID: f2869375d8636f867759ff80113fde6d55352315c90a5c9cd7082e116c12d0ac
                                          • Instruction ID: 067dff094a34e5d48eca6ddd89cad7163f95662fc263b96f171834d6c3efd8a2
                                          • Opcode Fuzzy Hash: f2869375d8636f867759ff80113fde6d55352315c90a5c9cd7082e116c12d0ac
                                          • Instruction Fuzzy Hash: 7EC12471900245EFCB20DF799C41BAA7BA8EF41378F1A419BE494E7352EB709E419B70
                                          APIs
                                            • Part of subcall function 00DA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA3A97,?,?,00DA2E7F,?,?,?,00000000), ref: 00DA3AC2
                                            • Part of subcall function 00E0E199: GetFileAttributesW.KERNEL32(?,00E0CF95), ref: 00E0E19A
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E0D420
                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E0D470
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E0D481
                                          • FindClose.KERNEL32(00000000), ref: 00E0D498
                                          • FindClose.KERNEL32(00000000), ref: 00E0D4A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                          • String ID: \*.*
                                          • API String ID: 2649000838-1173974218
                                          • Opcode ID: 69d19d2526469603c18c96bf48e008f841a49a3accc85b14ad7f0e9faeb4f8d5
                                          • Instruction ID: ec54e709ff8c0ee13ab799444e62d578298ccc32721ffe99d3cfa8ddb637698d
                                          • Opcode Fuzzy Hash: 69d19d2526469603c18c96bf48e008f841a49a3accc85b14ad7f0e9faeb4f8d5
                                          • Instruction Fuzzy Hash: 1B314F7100C3559FC204EF64D8558AFB7A8EE96314F445A1DF4E563191EB34EA09CB72
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: __floor_pentium4
                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                          • API String ID: 4168288129-2761157908
                                          • Opcode ID: c9564c7e88fbff5919433aad068851432ecbd12489300fd1b00659bb98ef9c72
                                          • Instruction ID: bd101aa680c0d9bcc117b28670d87b7831ed674ec6a106922f1278fa5e8040ec
                                          • Opcode Fuzzy Hash: c9564c7e88fbff5919433aad068851432ecbd12489300fd1b00659bb98ef9c72
                                          • Instruction Fuzzy Hash: 7CC22871E046298BDB25DF28DD407EAB7B5EB49304F1941EBD84EE7240E774AE818F60
                                          APIs
                                          • _wcslen.LIBCMT ref: 00E164DC
                                          • CoInitialize.OLE32(00000000), ref: 00E16639
                                          • CoCreateInstance.OLE32(00E3FCF8,00000000,00000001,00E3FB68,?), ref: 00E16650
                                          • CoUninitialize.OLE32 ref: 00E168D4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                          • String ID: .lnk
                                          • API String ID: 886957087-24824748
                                          • Opcode ID: daa01783e0f750ddc09387faca3310de92171d7c8dd705a357a5999cd6410f17
                                          • Instruction ID: 4c294fd502dffbe045dd57b79e44c373b8f9e4b76311ad82f765b987ce113cf0
                                          • Opcode Fuzzy Hash: daa01783e0f750ddc09387faca3310de92171d7c8dd705a357a5999cd6410f17
                                          • Instruction Fuzzy Hash: 62D15971508301AFC304EF24C891EABB7E9FF95304F00496DF5959B291EB31E945CBA2
                                          APIs
                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 00E222E8
                                            • Part of subcall function 00E1E4EC: GetWindowRect.USER32(?,?), ref: 00E1E504
                                          • GetDesktopWindow.USER32 ref: 00E22312
                                          • GetWindowRect.USER32(00000000), ref: 00E22319
                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00E22355
                                          • GetCursorPos.USER32(?), ref: 00E22381
                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00E223DF
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                          • String ID:
                                          • API String ID: 2387181109-0
                                          • Opcode ID: 5acec5544e478bd2f29170ef748e51fb98a99a106cce6eec81476cbf0fb8989a
                                          • Instruction ID: 2c51f2aba086ce9f43dce7140113ce483b3f3d5e391d03822f5fa8e8b29627d2
                                          • Opcode Fuzzy Hash: 5acec5544e478bd2f29170ef748e51fb98a99a106cce6eec81476cbf0fb8989a
                                          • Instruction Fuzzy Hash: 3231EF72104316AFCB20DF15D809A9BBBE9FF84314F101A1DF985B7181DB34E908CB92
                                          APIs
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00E19B78
                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00E19C8B
                                            • Part of subcall function 00E13874: GetInputState.USER32 ref: 00E138CB
                                            • Part of subcall function 00E13874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E13966
                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00E19BA8
                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00E19C75
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                          • String ID: *.*
                                          • API String ID: 1972594611-438819550
                                          • Opcode ID: f2b867fd48072bcdcf72fea99d42ae1b0b3f878ac17484c8dae370b37bce70e3
                                          • Instruction ID: 22eec255fe2122c7d115148c19ce1693e278a762d2cbf48faaa23fcb51bfbd20
                                          • Opcode Fuzzy Hash: f2b867fd48072bcdcf72fea99d42ae1b0b3f878ac17484c8dae370b37bce70e3
                                          • Instruction Fuzzy Hash: AF415F7190420A9FCF14DF64C899AEEBBF8EF05314F245156E855B7292EB309E84CFA4
                                          APIs
                                            • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00DB9A4E
                                          • GetSysColor.USER32(0000000F), ref: 00DB9B23
                                          • SetBkColor.GDI32(?,00000000), ref: 00DB9B36
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Color$LongProcWindow
                                          • String ID:
                                          • API String ID: 3131106179-0
                                          • Opcode ID: ca2c23792f1e8e36e7a2a15b3c5359ac73f7453ecb606182b1ba9ef55af3758e
                                          • Instruction ID: 527a56fc104d1b97213299a8f7867eb97837d0042b1ec1ff179713de0c15980c
                                          • Opcode Fuzzy Hash: ca2c23792f1e8e36e7a2a15b3c5359ac73f7453ecb606182b1ba9ef55af3758e
                                          • Instruction Fuzzy Hash: 8EA13E70108588FEE728AA3D8CADEFBBA9DDF42350F1A4109F743E6691CA25DD41C275
                                          APIs
                                            • Part of subcall function 00E2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E2307A
                                            • Part of subcall function 00E2304E: _wcslen.LIBCMT ref: 00E2309B
                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00E2185D
                                          • WSAGetLastError.WSOCK32 ref: 00E21884
                                          • bind.WSOCK32(00000000,?,00000010), ref: 00E218DB
                                          • WSAGetLastError.WSOCK32 ref: 00E218E6
                                          • closesocket.WSOCK32(00000000), ref: 00E21915
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                          • String ID:
                                          • API String ID: 1601658205-0
                                          • Opcode ID: c83851afa336b42fd7ba39a39183ad4a34852560e4e557694f2c003fdc84d098
                                          • Instruction ID: f059009607b0675427c3695319a9053668859b60cb40770f9f79393c615bc2fa
                                          • Opcode Fuzzy Hash: c83851afa336b42fd7ba39a39183ad4a34852560e4e557694f2c003fdc84d098
                                          • Instruction Fuzzy Hash: 7D519371A002109FD714AF24D886F6A77E5EB45718F188498F9066F3D3D771EE418BB1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                          • String ID:
                                          • API String ID: 292994002-0
                                          • Opcode ID: 44897bac43eef949e8d6b8715d85cfd51c12db610dd7aba2190a61bb34422bd9
                                          • Instruction ID: b9638a393ccbe1481befef2cdf4f8bc39c3ff2495d09a144557c197d0e85438a
                                          • Opcode Fuzzy Hash: 44897bac43eef949e8d6b8715d85cfd51c12db610dd7aba2190a61bb34422bd9
                                          • Instruction Fuzzy Hash: FB21A6317402105FD7248F2AC85CB66BFE5EF85315F19A09CE845AB351C771DC46CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                          • API String ID: 0-1546025612
                                          • Opcode ID: 1de3e8042257681a4d8c3273739c1930b6a645eb1deb463f9cd8a96426ef6f11
                                          • Instruction ID: b23c0036b6d6ba2e9c7c95f3231a01600b350bce2be8cea11056bf7d6d5cb60a
                                          • Opcode Fuzzy Hash: 1de3e8042257681a4d8c3273739c1930b6a645eb1deb463f9cd8a96426ef6f11
                                          • Instruction Fuzzy Hash: 1BA2BE70E0025ACBDF24DF59C8407AEB7B1BF55354F2881AAEC55A7284EB70DD81DBA0
                                          APIs
                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00E082AA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: lstrlen
                                          • String ID: ($tb$|
                                          • API String ID: 1659193697-1968160224
                                          • Opcode ID: 5bc91f80c56f4fa8be1d1725ae291389aae72ad41ab3e98a37d16c13a6bb6b75
                                          • Instruction ID: 5992c5387f556e7636c9f8e0ebcb3a737a3fb440e356aaf3cd54d0c001ada086
                                          • Opcode Fuzzy Hash: 5bc91f80c56f4fa8be1d1725ae291389aae72ad41ab3e98a37d16c13a6bb6b75
                                          • Instruction Fuzzy Hash: 55323774A00605DFC728CF19C581AAAB7F0FF48714B15D56EE49AEB3A1EB70E981CB50
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00E2A6AC
                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00E2A6BA
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                          • Process32NextW.KERNEL32(00000000,?), ref: 00E2A79C
                                          • CloseHandle.KERNEL32(00000000), ref: 00E2A7AB
                                            • Part of subcall function 00DBCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00DE3303,?), ref: 00DBCE8A
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                          • String ID:
                                          • API String ID: 1991900642-0
                                          • Opcode ID: 45c96b285cceaa7412b7427eca73be87e50a4df2a45d27626f510353cb1a66e2
                                          • Instruction ID: 7e1d99c72004c12bca0c92b628d3da009c6ca07c1e24e5f1d7f97575abb8e5a4
                                          • Opcode Fuzzy Hash: 45c96b285cceaa7412b7427eca73be87e50a4df2a45d27626f510353cb1a66e2
                                          • Instruction Fuzzy Hash: 49515F715083109FD714EF24D886A6BBBF8FF89754F04892DF585A7251EB30D904CBA2
                                          APIs
                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00E0AAAC
                                          • SetKeyboardState.USER32(00000080), ref: 00E0AAC8
                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00E0AB36
                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00E0AB88
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: KeyboardState$InputMessagePostSend
                                          • String ID:
                                          • API String ID: 432972143-0
                                          • Opcode ID: f7adced98155a1f83c0958878e5a3fe04ee1613560f65a50233371600f2c2e8b
                                          • Instruction ID: ee9c2a0cfaa576eb77e0abc55f01deffe8ba2b10d78554193b428d5756391909
                                          • Opcode Fuzzy Hash: f7adced98155a1f83c0958878e5a3fe04ee1613560f65a50233371600f2c2e8b
                                          • Instruction Fuzzy Hash: 2C311631A4030CAEFB358B65CC09BFA7BA6AB44314F1C622AF081761D1D374C9C5CB62
                                          APIs
                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 00E1CE89
                                          • GetLastError.KERNEL32(?,00000000), ref: 00E1CEEA
                                          • SetEvent.KERNEL32(?,?,00000000), ref: 00E1CEFE
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorEventFileInternetLastRead
                                          • String ID:
                                          • API String ID: 234945975-0
                                          • Opcode ID: 444ffdf410c200b37463bd5348d8b7edee85f7d3564416a9ded9a7cd1f2a16d2
                                          • Instruction ID: 28ea9371bd527b5671f8ad3a5001e28fdd9c239124b04db2cf57422203ae61ed
                                          • Opcode Fuzzy Hash: 444ffdf410c200b37463bd5348d8b7edee85f7d3564416a9ded9a7cd1f2a16d2
                                          • Instruction Fuzzy Hash: 3921B0B15407059FD720CFA5C948BEBBBF9EB00358F20441EE546F2151E774ED858B60
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E15CC1
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00E15D17
                                          • FindClose.KERNEL32(?), ref: 00E15D5F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Find$File$CloseFirstNext
                                          • String ID:
                                          • API String ID: 3541575487-0
                                          • Opcode ID: b211e5db1b3a814b57491690468605f847432febb20ad987f745b0dad9388db2
                                          • Instruction ID: 9e2681fa9b37fe0d10c9f0f7b673651d442bf0d5bd7a5dcd093c2ac077ab90eb
                                          • Opcode Fuzzy Hash: b211e5db1b3a814b57491690468605f847432febb20ad987f745b0dad9388db2
                                          • Instruction Fuzzy Hash: 91519B75604A01DFC714CF28D484E96BBE4FF8A324F14855DE95A9B3A1CB30ED84CBA1
                                          APIs
                                          • IsDebuggerPresent.KERNEL32 ref: 00DD271A
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00DD2724
                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00DD2731
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: 4bd3199d706cf0bcc94041bba1004fee7e6512ff645369dc7237ceaa79ddc0e7
                                          • Instruction ID: 525031bce3d13dbe4b0f608c65fd3428e9e39c52d229b5994eea81104c5ab50b
                                          • Opcode Fuzzy Hash: 4bd3199d706cf0bcc94041bba1004fee7e6512ff645369dc7237ceaa79ddc0e7
                                          • Instruction Fuzzy Hash: 1731D57590121DABCB21DF64DC88B9DBBB8EF18310F5041EAE81CA7260E7349F858F54
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 00E151DA
                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00E15238
                                          • SetErrorMode.KERNEL32(00000000), ref: 00E152A1
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DiskFreeSpace
                                          • String ID:
                                          • API String ID: 1682464887-0
                                          • Opcode ID: aa06f5b6b59f2ec71f1b4e7d3af3bc934cbd1ec3caf2339061b428de8632e9eb
                                          • Instruction ID: 90ab1dded918b42ed94f8203df44f84d2dc9b47b9c818a66f41ca88334662e81
                                          • Opcode Fuzzy Hash: aa06f5b6b59f2ec71f1b4e7d3af3bc934cbd1ec3caf2339061b428de8632e9eb
                                          • Instruction Fuzzy Hash: 53312F75A00518DFDB00DF55D884EADBBB4FF49318F148499E805AB3A2DB31E855CB60
                                          APIs
                                            • Part of subcall function 00DBFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00DC0668
                                            • Part of subcall function 00DBFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00DC0685
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E0170D
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E0173A
                                          • GetLastError.KERNEL32 ref: 00E0174A
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                          • String ID:
                                          • API String ID: 577356006-0
                                          • Opcode ID: a9e7be5274448b45f3db077217f0b40940014b2725ca1c73e1a9c3a9677aae95
                                          • Instruction ID: 40930c94c3708606c2276c2b53082c4e10ee67e5370fbb2712f29fbffcfe69cc
                                          • Opcode Fuzzy Hash: a9e7be5274448b45f3db077217f0b40940014b2725ca1c73e1a9c3a9677aae95
                                          • Instruction Fuzzy Hash: 3E1191B2504308AFD7189F54DC86DAABBB9EB44714B24856EE05667281EB70FC858B30
                                          APIs
                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E0D608
                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00E0D645
                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E0D650
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CloseControlCreateDeviceFileHandle
                                          • String ID:
                                          • API String ID: 33631002-0
                                          • Opcode ID: 004d5542ce0b96e3dde26fdbe29f545130c2453d6797c10c9bdf4b258ca29076
                                          • Instruction ID: 7c6921e5c5a90b538dd04dc469a9efca655945942c53a967ba2ff13165e8a9d3
                                          • Opcode Fuzzy Hash: 004d5542ce0b96e3dde26fdbe29f545130c2453d6797c10c9bdf4b258ca29076
                                          • Instruction Fuzzy Hash: AE113CB5E05228BFDB108F95AC49FAFBFBCEB45B50F108155F904F7290D6704A058BA1
                                          APIs
                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00E0168C
                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00E016A1
                                          • FreeSid.ADVAPI32(?), ref: 00E016B1
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                          • String ID:
                                          • API String ID: 3429775523-0
                                          • Opcode ID: 972ec387441f720f9818839504ce57ce3e32371b5d2ceb6416eed01f1cc476cd
                                          • Instruction ID: 7eb83bd3e1512ceb1aa84b6e0472e9b958ea6f15690ae215d5c44299663cb64d
                                          • Opcode Fuzzy Hash: 972ec387441f720f9818839504ce57ce3e32371b5d2ceb6416eed01f1cc476cd
                                          • Instruction Fuzzy Hash: 00F0F47195030DFFDB00DFE59D89AAEBBBCEB08704F5045A5E501F2181E774EA489B50
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00DD28E9,?,00DC4CBE,00DD28E9,00E688B8,0000000C,00DC4E15,00DD28E9,00000002,00000000,?,00DD28E9), ref: 00DC4D09
                                          • TerminateProcess.KERNEL32(00000000,?,00DC4CBE,00DD28E9,00E688B8,0000000C,00DC4E15,00DD28E9,00000002,00000000,?,00DD28E9), ref: 00DC4D10
                                          • ExitProcess.KERNEL32 ref: 00DC4D22
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID:
                                          • API String ID: 1703294689-0
                                          • Opcode ID: c929ae477fee482fedbd8d6ba88aae6ba07716d88731e82afc2adf28a784d0ba
                                          • Instruction ID: f35ced797c49fb37468527411f3ba4d873d0d026c8ff60c08c2a883a63fcc890
                                          • Opcode Fuzzy Hash: c929ae477fee482fedbd8d6ba88aae6ba07716d88731e82afc2adf28a784d0ba
                                          • Instruction Fuzzy Hash: A6E0B631000149AFCF11BF65DD1EF983F69EB41791B244458FC06AB222CB35DD56DBA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: /
                                          • API String ID: 0-2043925204
                                          • Opcode ID: e4461f25a64621733de1bc4c938140059fa9ffaf4a80cf6cc20134eecc06b02d
                                          • Instruction ID: 8664379b6443d8011f54a9f33464243a7faa7a53381fa499db6b403c3f1e34a8
                                          • Opcode Fuzzy Hash: e4461f25a64621733de1bc4c938140059fa9ffaf4a80cf6cc20134eecc06b02d
                                          • Instruction Fuzzy Hash: C9413B7650021AAFCB249FB9DC49EBB7BB8EB84354F14426EF905D7280E6709D41CB74
                                          APIs
                                          • GetUserNameW.ADVAPI32(?,?), ref: 00DFD28C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: NameUser
                                          • String ID: X64
                                          • API String ID: 2645101109-893830106
                                          • Opcode ID: a505e34c9b0af0677d0a61bd6c34880a7634c8a4e3b9f73d30aab990a9d577a9
                                          • Instruction ID: fc60fcc4df5954866ba61f169034f463bcf76f381e13f6bd42a57426b7cf9c8c
                                          • Opcode Fuzzy Hash: a505e34c9b0af0677d0a61bd6c34880a7634c8a4e3b9f73d30aab990a9d577a9
                                          • Instruction Fuzzy Hash: 7CD0C9B480111DEECB94DB90DC88DD9B77DBB04305F104151F146B2000D730D5488F20
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                          • Instruction ID: 5dc4bcfe422ef24fa7609d292c733694efee9fd176c218297720165655a5b44b
                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                          • Instruction Fuzzy Hash: 26021C71E1121A9BDF14CFA9C980BADBBF5EF48314F29416DE919E7380D731AD418B90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Variable is not of type 'Object'.$p#
                                          • API String ID: 0-1086706999
                                          • Opcode ID: 0724b77b622c2ea5b25e1f8b7d1c4359eb23e1f81070002befb647e4abc1eb41
                                          • Instruction ID: c48620032df288a9e69c6cedbb703242eb4fa0a43a3785640cb5bcd65ae3aa98
                                          • Opcode Fuzzy Hash: 0724b77b622c2ea5b25e1f8b7d1c4359eb23e1f81070002befb647e4abc1eb41
                                          • Instruction Fuzzy Hash: 02327970910218DFCF14DF94C980AEDBBB5FF06324F189059E946AB292DB75AE46CB70
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E16918
                                          • FindClose.KERNEL32(00000000), ref: 00E16961
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileFirst
                                          • String ID:
                                          • API String ID: 2295610775-0
                                          • Opcode ID: 624631b2d3cfbcc27d60ed4c7137fa9860f937fc30ceba492bcb373aa7e76789
                                          • Instruction ID: af7955df4f15386fd6391d09cdf1427beb4dad640d68e8e569d05c4fda79cd9a
                                          • Opcode Fuzzy Hash: 624631b2d3cfbcc27d60ed4c7137fa9860f937fc30ceba492bcb373aa7e76789
                                          • Instruction Fuzzy Hash: 721190716146109FC710DF29D888A16BBE5FF85328F14C699E8699F2A2C730EC45CBA1
                                          APIs
                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00E24891,?,?,00000035,?), ref: 00E137E4
                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00E24891,?,?,00000035,?), ref: 00E137F4
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorFormatLastMessage
                                          • String ID:
                                          • API String ID: 3479602957-0
                                          • Opcode ID: 9cd100a50045a5d4265b37a169cd90724b42c0a1f22e42096410ade53d7e948d
                                          • Instruction ID: ef405d07b601ca1fda80bceb79e8bcbb7c870d822478bb72d812cd7cc00d8039
                                          • Opcode Fuzzy Hash: 9cd100a50045a5d4265b37a169cd90724b42c0a1f22e42096410ade53d7e948d
                                          • Instruction Fuzzy Hash: A9F0A0B16042282AE62027B68C4DFEB7AAEEF85761F000176B509F2291D960994487B0
                                          APIs
                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00E0B25D
                                          • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 00E0B270
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: InputSendkeybd_event
                                          • String ID:
                                          • API String ID: 3536248340-0
                                          • Opcode ID: feef35b030a5defbfe237d8700b84f5ab96dfec419911b5d0b5d94ae7f470cb5
                                          • Instruction ID: c22010f879f744067c731708c5ef01cab0fe4d76b60983d53ed3782b2d60e6a4
                                          • Opcode Fuzzy Hash: feef35b030a5defbfe237d8700b84f5ab96dfec419911b5d0b5d94ae7f470cb5
                                          • Instruction Fuzzy Hash: 32F01D7180424EAFDB059FA1C805BEE7FB4FF08309F10900AF955B51A1C379C6559F94
                                          APIs
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E011FC), ref: 00E010D4
                                          • CloseHandle.KERNEL32(?,?,00E011FC), ref: 00E010E9
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AdjustCloseHandlePrivilegesToken
                                          • String ID:
                                          • API String ID: 81990902-0
                                          • Opcode ID: 3e94b0e42aed14611c7fe0841f75201bd2842d6195615cc0df4b1303c3aa07a6
                                          • Instruction ID: 4401d73f3755e7e912446ac5ce1e65528869c4b43298fc87b6f5fbcab046ccb5
                                          • Opcode Fuzzy Hash: 3e94b0e42aed14611c7fe0841f75201bd2842d6195615cc0df4b1303c3aa07a6
                                          • Instruction Fuzzy Hash: FBE0BF72018610EEE7252B51FC09EB77BE9EB04310F24886DF5A6944B5DB62ACA0DB60
                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00DD6766,?,?,00000008,?,?,00DDFEFE,00000000), ref: 00DD6998
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: 8f5fae307ff53aaf4cfb55851413f2c361a8365dac30e8db35c8e70271e39d57
                                          • Instruction ID: 5271265e494beb98268a852e84d995219e10829313e45c75f7d83f10c116b2b3
                                          • Opcode Fuzzy Hash: 8f5fae307ff53aaf4cfb55851413f2c361a8365dac30e8db35c8e70271e39d57
                                          • Instruction Fuzzy Hash: FCB148316106099FD719CF28C48AB657BE0FF45364F29865AE8D9CF3A2C335E985CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID: 0-3916222277
                                          • Opcode ID: 7d9f243a4cf490ef519f37e1d45eaf020f01de94938380e1bf38a36b690c85db
                                          • Instruction ID: f4637cadb1d539d3cb07b7f0651101ccc5644528c6cf5a30ff646dd3e2c849b5
                                          • Opcode Fuzzy Hash: 7d9f243a4cf490ef519f37e1d45eaf020f01de94938380e1bf38a36b690c85db
                                          • Instruction Fuzzy Hash: 58124F71900229DFCB24CF58C8806FEB7F5FF48710F15819AE94AEB251DB709A85DBA1
                                          APIs
                                          • BlockInput.USER32(00000001), ref: 00E1EABD
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: BlockInput
                                          • String ID:
                                          • API String ID: 3456056419-0
                                          • Opcode ID: 06a1b1f424b4831fc386ce996ddd127ced4977ceb85d0f2c8d3214971f530423
                                          • Instruction ID: edfdec75f51fbc4a9b7906d3535f01dcd773e91805dec382d5448c5fc4a69a09
                                          • Opcode Fuzzy Hash: 06a1b1f424b4831fc386ce996ddd127ced4977ceb85d0f2c8d3214971f530423
                                          • Instruction Fuzzy Hash: 45E012312102049FC710DF59D405D9AB7D9FF99770F009416FC45D7351D670E8418BA1
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00DC03EE), ref: 00DC09DA
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: e2c65098ee22e7f9032aed60c4d135f5a5ff7cf5302d1c5176fc2165e851ee6f
                                          • Instruction ID: 077aa4e5ca2a7d0961c598a72bd38f2733319bc3484ace5ffcb6fd596289610f
                                          • Opcode Fuzzy Hash: e2c65098ee22e7f9032aed60c4d135f5a5ff7cf5302d1c5176fc2165e851ee6f
                                          • Instruction Fuzzy Hash:
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0
                                          • API String ID: 0-4108050209
                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                          • Instruction ID: 08e3c4b440333a6127c280463f5bb45b0c3220a7ddd148a95efb8d00f9b654e0
                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                          • Instruction Fuzzy Hash: A151677160C7075BDF388568885AFBE2799DF12340F5C060DEA86D7282CA21DE02EF72
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0&
                                          • API String ID: 0-2523485602
                                          • Opcode ID: 12f3384c890931e5dcf1a8cc5e4a905cc7afb8a3c18938652142926918026824
                                          • Instruction ID: aee82a5adef8795560856ba42754d9f5952d5654683c0cbf16abe62d044dd27f
                                          • Opcode Fuzzy Hash: 12f3384c890931e5dcf1a8cc5e4a905cc7afb8a3c18938652142926918026824
                                          • Instruction Fuzzy Hash: 2321C3322206118BDB28CE79C8226BA73E5A754310F14862EE5A7E37D1DE39A944CB90
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7fd70dd7a40e92f3bfaefd92cbf8659a1319d02f0944c381b454a6018a4456bc
                                          • Instruction ID: 9690f7c0e2bb65d9adf50dc670f41b09fc50e65c90714702001e5a660b2bb7ff
                                          • Opcode Fuzzy Hash: 7fd70dd7a40e92f3bfaefd92cbf8659a1319d02f0944c381b454a6018a4456bc
                                          • Instruction Fuzzy Hash: 55325626D29F014DD7239639DC22335A689AFB73C5F55D73BF81AB5AA6EB28C4C34100
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: abeabae3535f41db37cfedafd2d6d6bcdf666dea581804c8f9f89099f2562560
                                          • Instruction ID: acbd535803ef5b95d13d660951751869d3812f58a1d4e21666164617cadb60c1
                                          • Opcode Fuzzy Hash: abeabae3535f41db37cfedafd2d6d6bcdf666dea581804c8f9f89099f2562560
                                          • Instruction Fuzzy Hash: D0320731A2410DCBCF24CB29C6906BE7BA1FB45300F2EE566D69ADB291D630DD91DB70
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d0ac87584d83c6f4b3b56f96a3dda7dc3c9fca58e1b2dc17a2c8d4ff73838394
                                          • Instruction ID: d6a6dcf4e9948749f87b83d506845ea6023bf32da0d374163a351c49d3982629
                                          • Opcode Fuzzy Hash: d0ac87584d83c6f4b3b56f96a3dda7dc3c9fca58e1b2dc17a2c8d4ff73838394
                                          • Instruction Fuzzy Hash: 1022DFB0A0060ADFDF14DF69D881AAEB3F5FF45344F144229E856A7291EB35E910CB70
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 74b58f48946f2a0e5ac15d9da321e4463395f4e860b8ef49f1643eaec4b3bd9a
                                          • Instruction ID: f68527fef743cce5b37441e79573fb1d7748b5447aba8ae0066f931ce516f7fb
                                          • Opcode Fuzzy Hash: 74b58f48946f2a0e5ac15d9da321e4463395f4e860b8ef49f1643eaec4b3bd9a
                                          • Instruction Fuzzy Hash: BD02B6B0A00205EFDB04EF65D881AAEB7B5FF44300F548169F8569B291EB31EE15CBA5
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                          • Instruction ID: f63cbb4b7069edfcb8e4b425f41819e3d6d6d48506defa13170c7df8e2ec6a52
                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                          • Instruction Fuzzy Hash: F59165761080B34ADB29463A8574A7DFFE15A933A131E079DE4F3CB1C2EE20C969D630
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                          • Instruction ID: 112824f65b667d9c8f40fd614464d20acd2a3bf6a6b3b8be752736629b886bb8
                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                          • Instruction Fuzzy Hash: C691347A2090B349DB2D467A8574A3DFFE15A933A131E079DD4F2CB1C2FD24C9699A30
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 05c70dc5e8fea14cc072751cd6d8562b58c10847fcc1043a757002f831ba0b6a
                                          • Instruction ID: b533b0f33a08db80ac92befa3fd7b0e7b5d20f2558c54baa6dbe3a90468fa850
                                          • Opcode Fuzzy Hash: 05c70dc5e8fea14cc072751cd6d8562b58c10847fcc1043a757002f831ba0b6a
                                          • Instruction Fuzzy Hash: 1E61487160870BA6DF349A288995FBE2396DF41710F28091EE886DB281DA21DE42DF75
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0901028c12d368bc1a73691163f9708e9295f903eb902114f3fede839560a4c9
                                          • Instruction ID: 600b2c9dd09b6219525dd810c4c9b0e1afc63648a035ef2496288b75e259fe30
                                          • Opcode Fuzzy Hash: 0901028c12d368bc1a73691163f9708e9295f903eb902114f3fede839560a4c9
                                          • Instruction Fuzzy Hash: 9F617B7260870BE7DE385A684856FBF2398EF41740F18095DF883DB281DA22DD42DE75
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                          • Instruction ID: 83b40f152af216c6ff74778548d627eeea480edb083f519b75906588a5dce992
                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                          • Instruction Fuzzy Hash: 4781417A5090B349DB6942398574A3EFFE15E933A131E079DD4F2CB1C2EE24C558EA30
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1317732673.0000000001447000.00000040.00000020.00020000.00000000.sdmp, Offset: 01447000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_1447000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                          • Instruction ID: 70b3dcd9a8f75ce1f72e2a3c0bb3c0be3ed351c5a47f785c19821985d796c3ff
                                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                          • Instruction Fuzzy Hash: 1841E2B1D1051CEBDF48CFADC891AAEBBF2AF88201F548299D516AB345C730AB01DB40
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1317732673.0000000001447000.00000040.00000020.00020000.00000000.sdmp, Offset: 01447000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_1447000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                          • Instruction ID: 239aac0d02a8337f73539032775d3cf6d2b4da50efe7c5583a5bd9fa7451eb88
                                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                          • Instruction Fuzzy Hash: C501A478A40209EFDB54DF98C5909AEF7F5FF48310F20859AD819A7711D730AE41DB80
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1317732673.0000000001447000.00000040.00000020.00020000.00000000.sdmp, Offset: 01447000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_1447000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                          • Instruction ID: 736a4e3c52cd7357e3e18eef643948c9fdc8abd2f1ccb2a4fb74e3c0c6c882d1
                                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                          • Instruction Fuzzy Hash: 2001A478A40109EFDB54DF98C5909AEF7F5FF48310F60859AD919A7711D730AE42DB80
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1317732673.0000000001447000.00000040.00000020.00020000.00000000.sdmp, Offset: 01447000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_1447000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                          APIs
                                          • DeleteObject.GDI32(00000000), ref: 00E22B30
                                          • DeleteObject.GDI32(00000000), ref: 00E22B43
                                          • DestroyWindow.USER32 ref: 00E22B52
                                          • GetDesktopWindow.USER32 ref: 00E22B6D
                                          • GetWindowRect.USER32(00000000), ref: 00E22B74
                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00E22CA3
                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00E22CB1
                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22CF8
                                          • GetClientRect.USER32(00000000,?), ref: 00E22D04
                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00E22D40
                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22D62
                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22D75
                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22D80
                                          • GlobalLock.KERNEL32(00000000), ref: 00E22D89
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22D98
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E22DA1
                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22DA8
                                          • GlobalFree.KERNEL32(00000000), ref: 00E22DB3
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22DC5
                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E3FC38,00000000), ref: 00E22DDB
                                          • GlobalFree.KERNEL32(00000000), ref: 00E22DEB
                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00E22E11
                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00E22E30
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E22E52
                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E2303F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                          • String ID: $AutoIt v3$DISPLAY$static
                                          • API String ID: 2211948467-2373415609
                                          • Opcode ID: 7568e16b852255aeacfef4781d868ee71e03fa5e461c7b98c3bdbe13dc3eab0e
                                          • Instruction ID: b5faf29f61f1843a937d49218d63109f88bcc14af6a427951dc5e07a8066f907
                                          • Opcode Fuzzy Hash: 7568e16b852255aeacfef4781d868ee71e03fa5e461c7b98c3bdbe13dc3eab0e
                                          • Instruction Fuzzy Hash: DA028971A00218AFDB14DFA5DC89EAE7BB9EF49710F148158F915BB2A1CB30ED05CB60
                                          APIs
                                          • SetTextColor.GDI32(?,00000000), ref: 00E3712F
                                          • GetSysColorBrush.USER32(0000000F), ref: 00E37160
                                          • GetSysColor.USER32(0000000F), ref: 00E3716C
                                          • SetBkColor.GDI32(?,000000FF), ref: 00E37186
                                          • SelectObject.GDI32(?,?), ref: 00E37195
                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00E371C0
                                          • GetSysColor.USER32(00000010), ref: 00E371C8
                                          • CreateSolidBrush.GDI32(00000000), ref: 00E371CF
                                          • FrameRect.USER32(?,?,00000000), ref: 00E371DE
                                          • DeleteObject.GDI32(00000000), ref: 00E371E5
                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00E37230
                                          • FillRect.USER32(?,?,?), ref: 00E37262
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E37284
                                            • Part of subcall function 00E373E8: GetSysColor.USER32(00000012), ref: 00E37421
                                            • Part of subcall function 00E373E8: SetTextColor.GDI32(?,?), ref: 00E37425
                                            • Part of subcall function 00E373E8: GetSysColorBrush.USER32(0000000F), ref: 00E3743B
                                            • Part of subcall function 00E373E8: GetSysColor.USER32(0000000F), ref: 00E37446
                                            • Part of subcall function 00E373E8: GetSysColor.USER32(00000011), ref: 00E37463
                                            • Part of subcall function 00E373E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E37471
                                            • Part of subcall function 00E373E8: SelectObject.GDI32(?,00000000), ref: 00E37482
                                            • Part of subcall function 00E373E8: SetBkColor.GDI32(?,00000000), ref: 00E3748B
                                            • Part of subcall function 00E373E8: SelectObject.GDI32(?,?), ref: 00E37498
                                            • Part of subcall function 00E373E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00E374B7
                                            • Part of subcall function 00E373E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E374CE
                                            • Part of subcall function 00E373E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00E374DB
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                          • String ID:
                                          • API String ID: 4124339563-0
                                          • Opcode ID: a63ea9491462c4fa3237b6f643284cbb0485153ba72d01cb047eea9195b254c8
                                          • Instruction ID: f991f3f040a383fec3e07cb8ba980d3a314775cc988da5339cbd2f717e63f91b
                                          • Opcode Fuzzy Hash: a63ea9491462c4fa3237b6f643284cbb0485153ba72d01cb047eea9195b254c8
                                          • Instruction Fuzzy Hash: 8CA18FB2009305BFDB109F61DC4CA6B7FA9FB49320F201A19F9A2B61E1D771E948DB51
                                          APIs
                                          • DestroyWindow.USER32(?,?), ref: 00DB8E14
                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00DF6AC5
                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00DF6AFE
                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00DF6F43
                                            • Part of subcall function 00DB8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DB8BE8,?,00000000,?,?,?,?,00DB8BBA,00000000,?), ref: 00DB8FC5
                                          • SendMessageW.USER32(?,00001053), ref: 00DF6F7F
                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00DF6F96
                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00DF6FAC
                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00DF6FB7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                          • String ID: 0
                                          • API String ID: 2760611726-4108050209
                                          • Opcode ID: c79864cb953d891a49d86df614a79686cf4d3b06572bfcee6347a982c374f13e
                                          • Instruction ID: 6c7777c06aad7578616ec9e61f906502108f73e7cf4046e41ca6c8e92a7e0506
                                          • Opcode Fuzzy Hash: c79864cb953d891a49d86df614a79686cf4d3b06572bfcee6347a982c374f13e
                                          • Instruction Fuzzy Hash: F7128E31200205EFD725DF18C848BB5BBE5FF44301F198469F68AAB661CB32EC96DB61
                                          APIs
                                          • DestroyWindow.USER32(00000000), ref: 00E2273E
                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00E2286A
                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00E228A9
                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00E228B9
                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00E22900
                                          • GetClientRect.USER32(00000000,?), ref: 00E2290C
                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00E22955
                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00E22964
                                          • GetStockObject.GDI32(00000011), ref: 00E22974
                                          • SelectObject.GDI32(00000000,00000000), ref: 00E22978
                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00E22988
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E22991
                                          • DeleteDC.GDI32(00000000), ref: 00E2299A
                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00E229C6
                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00E229DD
                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00E22A1D
                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00E22A31
                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00E22A42
                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00E22A77
                                          • GetStockObject.GDI32(00000011), ref: 00E22A82
                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00E22A8D
                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00E22A97
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                          • API String ID: 2910397461-517079104
                                          • Opcode ID: 9299a10a2226e32b529b7f56beb073a803d200bae9ddb7e04820ba319aab7586
                                          • Instruction ID: 8a29d66912693f5e948a3e2d7c7d27e2a92b4850af7c9ecec4be8fdc7f608554
                                          • Opcode Fuzzy Hash: 9299a10a2226e32b529b7f56beb073a803d200bae9ddb7e04820ba319aab7586
                                          • Instruction Fuzzy Hash: 3EB15B71A40219BFEB14DF69DC8AEAE7BA9EB08710F104159FA14F7290D770ED44CBA0
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 00E14AED
                                          • GetDriveTypeW.KERNEL32(?,00E3CB68,?,\\.\,00E3CC08), ref: 00E14BCA
                                          • SetErrorMode.KERNEL32(00000000,00E3CB68,?,\\.\,00E3CC08), ref: 00E14D36
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DriveType
                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                          • API String ID: 2907320926-4222207086
                                          • Opcode ID: 3f2f1a23cd1fdd4f158cd966683168fef4cc4a51ef1673e14a0de56b490b9791
                                          • Instruction ID: dd2342e92822f00818a3eb1d569c7c46b51c4c87959a7db79c27f4328485aad9
                                          • Opcode Fuzzy Hash: 3f2f1a23cd1fdd4f158cd966683168fef4cc4a51ef1673e14a0de56b490b9791
                                          • Instruction Fuzzy Hash: E361C1B1645205DBDB04EF24DA82EE8F7A0EB45784B24A415F806BB3D1DB31ED81DB91
                                          APIs
                                          • GetSysColor.USER32(00000012), ref: 00E37421
                                          • SetTextColor.GDI32(?,?), ref: 00E37425
                                          • GetSysColorBrush.USER32(0000000F), ref: 00E3743B
                                          • GetSysColor.USER32(0000000F), ref: 00E37446
                                          • CreateSolidBrush.GDI32(?), ref: 00E3744B
                                          • GetSysColor.USER32(00000011), ref: 00E37463
                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E37471
                                          • SelectObject.GDI32(?,00000000), ref: 00E37482
                                          • SetBkColor.GDI32(?,00000000), ref: 00E3748B
                                          • SelectObject.GDI32(?,?), ref: 00E37498
                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00E374B7
                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E374CE
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00E374DB
                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E3752A
                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00E37554
                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00E37572
                                          • DrawFocusRect.USER32(?,?), ref: 00E3757D
                                          • GetSysColor.USER32(00000011), ref: 00E3758E
                                          • SetTextColor.GDI32(?,00000000), ref: 00E37596
                                          • DrawTextW.USER32(?,00E370F5,000000FF,?,00000000), ref: 00E375A8
                                          • SelectObject.GDI32(?,?), ref: 00E375BF
                                          • DeleteObject.GDI32(?), ref: 00E375CA
                                          • SelectObject.GDI32(?,?), ref: 00E375D0
                                          • DeleteObject.GDI32(?), ref: 00E375D5
                                          • SetTextColor.GDI32(?,?), ref: 00E375DB
                                          • SetBkColor.GDI32(?,?), ref: 00E375E5
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                          • String ID:
                                          • API String ID: 1996641542-0
                                          • Opcode ID: 761788f35e7b58a045ede95f3226870efabbca3b842f2d0a60c7a741d657426a
                                          • Instruction ID: e5266882c478e960395173e75acff98e01d3a091ec4ee266e5af574aa0c031c0
                                          • Opcode Fuzzy Hash: 761788f35e7b58a045ede95f3226870efabbca3b842f2d0a60c7a741d657426a
                                          • Instruction Fuzzy Hash: 31615972900218BFDF119FA5DC49AEEBFB9EB08320F214115F915BB2A1D775E940DBA0
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 00E31128
                                          • GetDesktopWindow.USER32 ref: 00E3113D
                                          • GetWindowRect.USER32(00000000), ref: 00E31144
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E31199
                                          • DestroyWindow.USER32(?), ref: 00E311B9
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00E311ED
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E3120B
                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E3121D
                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 00E31232
                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00E31245
                                          • IsWindowVisible.USER32(00000000), ref: 00E312A1
                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00E312BC
                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00E312D0
                                          • GetWindowRect.USER32(00000000,?), ref: 00E312E8
                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00E3130E
                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00E31328
                                          • CopyRect.USER32(?,?), ref: 00E3133F
                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 00E313AA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                          • String ID: ($0$tooltips_class32
                                          • API String ID: 698492251-4156429822
                                          • Opcode ID: cffc92992390e9a44ffbafc5b1cb2e8248332329437d00d844035902bb0ce423
                                          • Instruction ID: 63bf5a47d6975251536ffea5ff16852df94b6dc34221d6b7d55a96a94bd153fd
                                          • Opcode Fuzzy Hash: cffc92992390e9a44ffbafc5b1cb2e8248332329437d00d844035902bb0ce423
                                          • Instruction Fuzzy Hash: D8B19D71604340AFD704DF65C889B6ABFE4FF84754F00895CF999AB2A1C731E844CBA2
                                          APIs
                                          • CharUpperBuffW.USER32(?,?), ref: 00E302E5
                                          • _wcslen.LIBCMT ref: 00E3031F
                                          • _wcslen.LIBCMT ref: 00E30389
                                          • _wcslen.LIBCMT ref: 00E303F1
                                          • _wcslen.LIBCMT ref: 00E30475
                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00E304C5
                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E30504
                                            • Part of subcall function 00DBF9F2: _wcslen.LIBCMT ref: 00DBF9FD
                                            • Part of subcall function 00E0223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E02258
                                            • Part of subcall function 00E0223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E0228A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                          • API String ID: 1103490817-719923060
                                          • Opcode ID: 7dd9ffc309670e33e2e2f93322ca5ee46feccc547d7a28763ee0e80ce868244b
                                          • Instruction ID: f245d56e61dd0af7e114343bf958180712646ec9ebaa21befed6568a28e912f3
                                          • Opcode Fuzzy Hash: 7dd9ffc309670e33e2e2f93322ca5ee46feccc547d7a28763ee0e80ce868244b
                                          • Instruction Fuzzy Hash: DEE1DD312082018FC714DF24C86586ABBE2FFC8758F14596CF896BB6A2DB30ED45CB61
                                          APIs
                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DB8968
                                          • GetSystemMetrics.USER32(00000007), ref: 00DB8970
                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DB899B
                                          • GetSystemMetrics.USER32(00000008), ref: 00DB89A3
                                          • GetSystemMetrics.USER32(00000004), ref: 00DB89C8
                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00DB89E5
                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00DB89F5
                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00DB8A28
                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00DB8A3C
                                          • GetClientRect.USER32(00000000,000000FF), ref: 00DB8A5A
                                          • GetStockObject.GDI32(00000011), ref: 00DB8A76
                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DB8A81
                                            • Part of subcall function 00DB912D: GetCursorPos.USER32(?), ref: 00DB9141
                                            • Part of subcall function 00DB912D: ScreenToClient.USER32(00000000,?), ref: 00DB915E
                                            • Part of subcall function 00DB912D: GetAsyncKeyState.USER32(00000001), ref: 00DB9183
                                            • Part of subcall function 00DB912D: GetAsyncKeyState.USER32(00000002), ref: 00DB919D
                                          • SetTimer.USER32(00000000,00000000,00000028,00DB90FC), ref: 00DB8AA8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                          • String ID: AutoIt v3 GUI
                                          • API String ID: 1458621304-248962490
                                          • Opcode ID: d0e4b52d004b8ef4ea65c0230dc1f5a853172fa80123ce4ca69956d673280501
                                          • Instruction ID: f0006c57c254f69ef66b9ad8fc901decf2579adf7cded3e3663ba1056c8e0d9d
                                          • Opcode Fuzzy Hash: d0e4b52d004b8ef4ea65c0230dc1f5a853172fa80123ce4ca69956d673280501
                                          • Instruction Fuzzy Hash: 2EB17B35A00209EFDF14DF69DC49BEA3BB5FB48314F158229FA16A7290DB30E841CB61
                                          APIs
                                            • Part of subcall function 00E010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E01114
                                            • Part of subcall function 00E010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01120
                                            • Part of subcall function 00E010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E0112F
                                            • Part of subcall function 00E010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01136
                                            • Part of subcall function 00E010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E0114D
                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E00DF5
                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E00E29
                                          • GetLengthSid.ADVAPI32(?), ref: 00E00E40
                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00E00E7A
                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E00E96
                                          • GetLengthSid.ADVAPI32(?), ref: 00E00EAD
                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00E00EB5
                                          • HeapAlloc.KERNEL32(00000000), ref: 00E00EBC
                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E00EDD
                                          • CopySid.ADVAPI32(00000000), ref: 00E00EE4
                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E00F13
                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E00F35
                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E00F47
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00F6E
                                          • HeapFree.KERNEL32(00000000), ref: 00E00F75
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00F7E
                                          • HeapFree.KERNEL32(00000000), ref: 00E00F85
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E00F8E
                                          • HeapFree.KERNEL32(00000000), ref: 00E00F95
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00E00FA1
                                          • HeapFree.KERNEL32(00000000), ref: 00E00FA8
                                            • Part of subcall function 00E01193: GetProcessHeap.KERNEL32(00000008,00E00BB1,?,00000000,?,00E00BB1,?), ref: 00E011A1
                                            • Part of subcall function 00E01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E00BB1,?), ref: 00E011A8
                                            • Part of subcall function 00E01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00E00BB1,?), ref: 00E011B7
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                          • String ID:
                                          • API String ID: 4175595110-0
                                          • Opcode ID: e0cfd281eaf3003df3c8d1c14e9c023e6275935d23c689facba1671a825f7234
                                          • Instruction ID: 992f06df5cadb37eabe05ca1b1439cdcd9223bad4ec4ae191c19484a1f9b5e1d
                                          • Opcode Fuzzy Hash: e0cfd281eaf3003df3c8d1c14e9c023e6275935d23c689facba1671a825f7234
                                          • Instruction Fuzzy Hash: 5F716A72A0020AAFDF209FA5DC48FAEBBB8FF05305F144115FA59B6191D731DA89DB60
                                          APIs
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E2C4BD
                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00E3CC08,00000000,?,00000000,?,?), ref: 00E2C544
                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00E2C5A4
                                          • _wcslen.LIBCMT ref: 00E2C5F4
                                          • _wcslen.LIBCMT ref: 00E2C66F
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00E2C6B2
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00E2C7C1
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00E2C84D
                                          • RegCloseKey.ADVAPI32(?), ref: 00E2C881
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E2C88E
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00E2C960
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                          • API String ID: 9721498-966354055
                                          • Opcode ID: dfff193c066a5a6f77d3bdcefda95532e8d836feff54ad9e5d2b5bc08cc6719b
                                          • Instruction ID: c940b82e4559dfe964feeafbe99f20e883187023c53e43d2c4150f8e3cdaa327
                                          • Opcode Fuzzy Hash: dfff193c066a5a6f77d3bdcefda95532e8d836feff54ad9e5d2b5bc08cc6719b
                                          • Instruction Fuzzy Hash: EB127A356042119FC718DF24D891A2AB7E5FF89714F14885DF88AAB3A2DB31FC41CBA1
                                          APIs
                                          • CharUpperBuffW.USER32(?,?), ref: 00E309C6
                                          • _wcslen.LIBCMT ref: 00E30A01
                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E30A54
                                          • _wcslen.LIBCMT ref: 00E30A8A
                                          • _wcslen.LIBCMT ref: 00E30B06
                                          • _wcslen.LIBCMT ref: 00E30B81
                                            • Part of subcall function 00DBF9F2: _wcslen.LIBCMT ref: 00DBF9FD
                                            • Part of subcall function 00E02BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E02BFA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                          • API String ID: 1103490817-4258414348
                                          • Opcode ID: 046d1818a792fea29eabeb9b364c30ac2f81ab5fa32e3316fd35b32bb6e23149
                                          • Instruction ID: 6a2f88288510429a009f41c1ad233b05f43597f8d787c772625f19951ef4e3ba
                                          • Opcode Fuzzy Hash: 046d1818a792fea29eabeb9b364c30ac2f81ab5fa32e3316fd35b32bb6e23149
                                          • Instruction Fuzzy Hash: C8E1BC312083018FCB14EF24C46496ABBE1FF99358F10995CF896AB3A2D731ED45CBA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharUpper
                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                          • API String ID: 1256254125-909552448
                                          • Opcode ID: 74a05c10c4e132be9b9e149163799ff70d484e498a2846bcc0255339dbe6eaad
                                          • Instruction ID: 67e46c505cc41b9b6a1bf5c799d15846e5ff4837ee8d1c389734beaca6c70413
                                          • Opcode Fuzzy Hash: 74a05c10c4e132be9b9e149163799ff70d484e498a2846bcc0255339dbe6eaad
                                          • Instruction Fuzzy Hash: 5271077260053A8BCB20DE7CED525FE3391AFA1798B352528F856B7284EA71DD44C7B0
                                          APIs
                                          • _wcslen.LIBCMT ref: 00E3835A
                                          • _wcslen.LIBCMT ref: 00E3836E
                                          • _wcslen.LIBCMT ref: 00E38391
                                          • _wcslen.LIBCMT ref: 00E383B4
                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00E383F2
                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00E35BF2), ref: 00E3844E
                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E38487
                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00E384CA
                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E38501
                                          • FreeLibrary.KERNEL32(?), ref: 00E3850D
                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E3851D
                                          • DestroyIcon.USER32(?,?,?,?,?,00E35BF2), ref: 00E3852C
                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00E38549
                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00E38555
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                          • String ID: .dll$.exe$.icl
                                          • API String ID: 799131459-1154884017
                                          • Opcode ID: 391aaf5d7ed19a71e61037cc3129e6ca94264e71c9061f8f4498305070929411
                                          • Instruction ID: 24a9b21b497eed4babd8e7c499cef5c9224a78ac7577802a330187a56d5149a9
                                          • Opcode Fuzzy Hash: 391aaf5d7ed19a71e61037cc3129e6ca94264e71c9061f8f4498305070929411
                                          • Instruction Fuzzy Hash: C861DE71540319BEEB149F64CD49BBE7BA8EB08B20F105609F815F61D1DB74A984CBA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                          • API String ID: 0-1645009161
                                          • Opcode ID: 752fe98eb74ed895ae991db3b36e1a1a52a51ec91e271de9c423657964d6a2b9
                                          • Instruction ID: f8c1b6ba441ac34b758699fdd541fbb18b4066f03c467a9da968b5dbc6468842
                                          • Opcode Fuzzy Hash: 752fe98eb74ed895ae991db3b36e1a1a52a51ec91e271de9c423657964d6a2b9
                                          • Instruction Fuzzy Hash: F1810571A44706BBDB20BF61DC42FAE7BA8EF16340F084424F905AB196EB71DA11D7B1
                                          APIs
                                          • LoadIconW.USER32(00000063), ref: 00E05A2E
                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00E05A40
                                          • SetWindowTextW.USER32(?,?), ref: 00E05A57
                                          • GetDlgItem.USER32(?,000003EA), ref: 00E05A6C
                                          • SetWindowTextW.USER32(00000000,?), ref: 00E05A72
                                          • GetDlgItem.USER32(?,000003E9), ref: 00E05A82
                                          • SetWindowTextW.USER32(00000000,?), ref: 00E05A88
                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00E05AA9
                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00E05AC3
                                          • GetWindowRect.USER32(?,?), ref: 00E05ACC
                                          • _wcslen.LIBCMT ref: 00E05B33
                                          • SetWindowTextW.USER32(?,?), ref: 00E05B6F
                                          • GetDesktopWindow.USER32 ref: 00E05B75
                                          • GetWindowRect.USER32(00000000), ref: 00E05B7C
                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00E05BD3
                                          • GetClientRect.USER32(?,?), ref: 00E05BE0
                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 00E05C05
                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00E05C2F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                          • String ID:
                                          • API String ID: 895679908-0
                                          • Opcode ID: d4d84140b94efcda2a7453f5021e700d34d3bead616d1c35cef45be2df083b0a
                                          • Instruction ID: 91dcf5ef5acec5455deac1194a04495e97b2f52d3a42a7a0f2a2f85c424a16ce
                                          • Opcode Fuzzy Hash: d4d84140b94efcda2a7453f5021e700d34d3bead616d1c35cef45be2df083b0a
                                          • Instruction Fuzzy Hash: 52713C32900B09AFDB20DFA9CE89AAFBBF5FB48704F105519E542B25A0D775E984CF50
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen
                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[
                                          • API String ID: 176396367-1901692981
                                          • Opcode ID: d32d56ffa2b6785b121699373356cdde5d15db7119bd0628b529b05cc2ad6654
                                          • Instruction ID: ea53d03c21563dfcfa39e11d36f5004dd9120ca0ea0048bcdbc351ab1408c360
                                          • Opcode Fuzzy Hash: d32d56ffa2b6785b121699373356cdde5d15db7119bd0628b529b05cc2ad6654
                                          • Instruction Fuzzy Hash: D0E10832A005169BCB189FB8C8517EDFBB8FF44754F54A119E466B7290DB30AEC5CBA0
                                          APIs
                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00DC00C6
                                            • Part of subcall function 00DC00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00E7070C,00000FA0,F601CC6F,?,?,?,?,00DE23B3,000000FF), ref: 00DC011C
                                            • Part of subcall function 00DC00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00DE23B3,000000FF), ref: 00DC0127
                                            • Part of subcall function 00DC00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00DE23B3,000000FF), ref: 00DC0138
                                            • Part of subcall function 00DC00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00DC014E
                                            • Part of subcall function 00DC00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00DC015C
                                            • Part of subcall function 00DC00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00DC016A
                                            • Part of subcall function 00DC00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DC0195
                                            • Part of subcall function 00DC00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DC01A0
                                          • ___scrt_fastfail.LIBCMT ref: 00DC00E7
                                            • Part of subcall function 00DC00A3: __onexit.LIBCMT ref: 00DC00A9
                                          Strings
                                          • SleepConditionVariableCS, xrefs: 00DC0154
                                          • WakeAllConditionVariable, xrefs: 00DC0162
                                          • InitializeConditionVariable, xrefs: 00DC0148
                                          • kernel32.dll, xrefs: 00DC0133
                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00DC0122
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                          • API String ID: 66158676-1714406822
                                          • Opcode ID: 43467ee80342c5c1770ee55c82a2abedb3faedb1436d975da11acbc616722923
                                          • Instruction ID: e89803d181e149157b39dfb3b0b9803348d81cc48e3864cadcb590da0e6fd2b4
                                          • Opcode Fuzzy Hash: 43467ee80342c5c1770ee55c82a2abedb3faedb1436d975da11acbc616722923
                                          • Instruction Fuzzy Hash: DA21F932A45716EFD7116BA5AC0DF6A7FA4DB04B51F28012EF905F3291DBB0DC048AB0
                                          APIs
                                          • CharLowerBuffW.USER32(00000000,00000000,00E3CC08), ref: 00E14527
                                          • _wcslen.LIBCMT ref: 00E1453B
                                          • _wcslen.LIBCMT ref: 00E14599
                                          • _wcslen.LIBCMT ref: 00E145F4
                                          • _wcslen.LIBCMT ref: 00E1463F
                                          • _wcslen.LIBCMT ref: 00E146A7
                                            • Part of subcall function 00DBF9F2: _wcslen.LIBCMT ref: 00DBF9FD
                                          • GetDriveTypeW.KERNEL32(?,00E66BF0,00000061), ref: 00E14743
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharDriveLowerType
                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                          • API String ID: 2055661098-1000479233
                                          • Opcode ID: 832cb046f53fa39d390c2fe8d9439b6ebc89a735f86b7f3e6588bb928afada1e
                                          • Instruction ID: e5a3479feae986c62719b07488d4a164fe90a95aba225c27225f4764c0a2a6ff
                                          • Opcode Fuzzy Hash: 832cb046f53fa39d390c2fe8d9439b6ebc89a735f86b7f3e6588bb928afada1e
                                          • Instruction Fuzzy Hash: 1AB1D3B16083029FC710DF28C890AAAB7E5EF96768F50591DF496E73D1D730D984CB62
                                          APIs
                                            • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                                          • DragQueryPoint.SHELL32(?,?), ref: 00E39147
                                            • Part of subcall function 00E37674: ClientToScreen.USER32(?,?), ref: 00E3769A
                                            • Part of subcall function 00E37674: GetWindowRect.USER32(?,?), ref: 00E37710
                                            • Part of subcall function 00E37674: PtInRect.USER32(?,?,00E38B89), ref: 00E37720
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00E391B0
                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00E391BB
                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00E391DE
                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00E39225
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00E3923E
                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00E39255
                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00E39277
                                          • DragFinish.SHELL32(?), ref: 00E3927E
                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00E39371
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#
                                          • API String ID: 221274066-136824727
                                          • Opcode ID: 17ad651ae7a51a6a5ac5715aa9df63226fff1ef7a6883ae3e8aef92868184863
                                          • Instruction ID: d8c9d0168f42aadd0f60f2b88b2fc16454516542db8360b38aad40d3263b85ee
                                          • Opcode Fuzzy Hash: 17ad651ae7a51a6a5ac5715aa9df63226fff1ef7a6883ae3e8aef92868184863
                                          • Instruction Fuzzy Hash: 38618971108301AFC701EF65DC89DAFBBE8EF89750F101A1DF595A22A1DB70DA49CB62
                                          APIs
                                          • _wcslen.LIBCMT ref: 00E2B198
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E2B1B0
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E2B1D4
                                          • _wcslen.LIBCMT ref: 00E2B200
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E2B214
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E2B236
                                          • _wcslen.LIBCMT ref: 00E2B332
                                            • Part of subcall function 00E105A7: GetStdHandle.KERNEL32(000000F6), ref: 00E105C6
                                          • _wcslen.LIBCMT ref: 00E2B34B
                                          • _wcslen.LIBCMT ref: 00E2B366
                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E2B3B6
                                          • GetLastError.KERNEL32(00000000), ref: 00E2B407
                                          • CloseHandle.KERNEL32(?), ref: 00E2B439
                                          • CloseHandle.KERNEL32(00000000), ref: 00E2B44A
                                          • CloseHandle.KERNEL32(00000000), ref: 00E2B45C
                                          • CloseHandle.KERNEL32(00000000), ref: 00E2B46E
                                          • CloseHandle.KERNEL32(?), ref: 00E2B4E3
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                          • String ID:
                                          • API String ID: 2178637699-0
                                          • Opcode ID: 1d0a46718d02fde246194e4d9c6032bfb4d4d4e1ed276220e8d730f76cd4f8cd
                                          • Instruction ID: 1e1683503e07ecd56560dfa2a052a159f9f453e14c0e1a1f276af6c4d0b34cf8
                                          • Opcode Fuzzy Hash: 1d0a46718d02fde246194e4d9c6032bfb4d4d4e1ed276220e8d730f76cd4f8cd
                                          • Instruction Fuzzy Hash: 5BF19A31604310DFC714EF24D891B6ABBE1EF85314F18995DF899AB2A2DB70EC44CB62
                                          APIs
                                          • GetMenuItemCount.USER32(00E71990), ref: 00DE2F8D
                                          • GetMenuItemCount.USER32(00E71990), ref: 00DE303D
                                          • GetCursorPos.USER32(?), ref: 00DE3081
                                          • SetForegroundWindow.USER32(00000000), ref: 00DE308A
                                          • TrackPopupMenuEx.USER32(00E71990,00000000,?,00000000,00000000,00000000), ref: 00DE309D
                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00DE30A9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                          • String ID: 0
                                          • API String ID: 36266755-4108050209
                                          • Opcode ID: 90328b003b56120079b0c21159440bb6cc068d4b089698e7f75d47bce1100e57
                                          • Instruction ID: 6f377f4a4fc013debcf2b33dbd7793d9067e149e93323b4e90b7824821e5ff58
                                          • Opcode Fuzzy Hash: 90328b003b56120079b0c21159440bb6cc068d4b089698e7f75d47bce1100e57
                                          • Instruction Fuzzy Hash: AA712731640255BEEB219F2ACC49FAABF69FF01364F244206F5147A1E0C7B1ED54CBA0
                                          APIs
                                          • DestroyWindow.USER32(?,?), ref: 00E36DEB
                                            • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00E36E5F
                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00E36E81
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E36E94
                                          • DestroyWindow.USER32(?), ref: 00E36EB5
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00DA0000,00000000), ref: 00E36EE4
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E36EFD
                                          • GetDesktopWindow.USER32 ref: 00E36F16
                                          • GetWindowRect.USER32(00000000), ref: 00E36F1D
                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E36F35
                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00E36F4D
                                            • Part of subcall function 00DB9944: GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                          • String ID: 0$tooltips_class32
                                          • API String ID: 2429346358-3619404913
                                          • Opcode ID: daaf5406e61c5e6c88ce10f17a56513af3629a010ce94f0bc325cd1d20890c49
                                          • Instruction ID: c037022fe44eff9399ef971734aacd10c7d0043806d6b3ba963e139d2918c70f
                                          • Opcode Fuzzy Hash: daaf5406e61c5e6c88ce10f17a56513af3629a010ce94f0bc325cd1d20890c49
                                          • Instruction Fuzzy Hash: E5716E74104344AFDB21CF29D848A66BBF9FB89708F14541DF699A7261C770E949CB22
                                          APIs
                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E1C4B0
                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00E1C4C3
                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00E1C4D7
                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00E1C4F0
                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00E1C533
                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00E1C549
                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E1C554
                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E1C584
                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00E1C5DC
                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00E1C5F0
                                          • InternetCloseHandle.WININET(00000000), ref: 00E1C5FB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                          • String ID:
                                          • API String ID: 3800310941-3916222277
                                          • Opcode ID: 691c9106e149ca43702f8adc684ad757c8f7eeaeb6974a0284088c073ba34782
                                          • Instruction ID: c3a83ce651cc9c78ea20da1a2468b853b02d1b59425b1e89bd3aa19b77f66f81
                                          • Opcode Fuzzy Hash: 691c9106e149ca43702f8adc684ad757c8f7eeaeb6974a0284088c073ba34782
                                          • Instruction Fuzzy Hash: E1513AB1540608BFDB218F65C988AFB7BFDFB08758F20541AF945F6210DB34E9889B61
                                          APIs
                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00E38592
                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E385A2
                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E385AD
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E385BA
                                          • GlobalLock.KERNEL32(00000000), ref: 00E385C8
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E385D7
                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E385E0
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E385E7
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E385F8
                                          • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00E3FC38,?), ref: 00E38611
                                          • GlobalFree.KERNEL32(00000000), ref: 00E38621
                                          • GetObjectW.GDI32(?,00000018,?), ref: 00E38641
                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00E38671
                                          • DeleteObject.GDI32(?), ref: 00E38699
                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00E386AF
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                          • String ID:
                                          • API String ID: 3840717409-0
                                          • Opcode ID: bfd8c638f0d643b3bd9989e6f851a51a2275a7432ab596c8ba440562ad1e9b5a
                                          • Instruction ID: 3bcb69233a6fc6b3e037643f3ac7de8caeae0addde662d6867eb0aeb2e675f25
                                          • Opcode Fuzzy Hash: bfd8c638f0d643b3bd9989e6f851a51a2275a7432ab596c8ba440562ad1e9b5a
                                          • Instruction Fuzzy Hash: E541E875600208AFDB119FA6DD8DEAA7FB8EF89B15F208058F905F7260DB30D905DB60
                                          APIs
                                          • VariantInit.OLEAUT32(00000000), ref: 00E11502
                                          • VariantCopy.OLEAUT32(?,?), ref: 00E1150B
                                          • VariantClear.OLEAUT32(?), ref: 00E11517
                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00E115FB
                                          • VarR8FromDec.OLEAUT32(?,?), ref: 00E11657
                                          • VariantInit.OLEAUT32(?), ref: 00E11708
                                          • SysFreeString.OLEAUT32(?), ref: 00E1178C
                                          • VariantClear.OLEAUT32(?), ref: 00E117D8
                                          • VariantClear.OLEAUT32(?), ref: 00E117E7
                                          • VariantInit.OLEAUT32(00000000), ref: 00E11823
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                          • API String ID: 1234038744-3931177956
                                          • Opcode ID: ec8bcc69e1236702efbebb35ee7ab2673547c116ca92dee69501a66512e5be6c
                                          • Instruction ID: 502f2837f9e53c1879ddacde271b50bad60a7ae97dc05833d28e278fc59e6c3c
                                          • Opcode Fuzzy Hash: ec8bcc69e1236702efbebb35ee7ab2673547c116ca92dee69501a66512e5be6c
                                          • Instruction Fuzzy Hash: 0FD1EE31A00615EBDB109F65D885BFDB7B6FF45700F20819AE646BB280DB30ED84DB62
                                          APIs
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                            • Part of subcall function 00E2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E2B6AE,?,?), ref: 00E2C9B5
                                            • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2C9F1
                                            • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA68
                                            • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA9E
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E2B6F4
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E2B772
                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 00E2B80A
                                          • RegCloseKey.ADVAPI32(?), ref: 00E2B87E
                                          • RegCloseKey.ADVAPI32(?), ref: 00E2B89C
                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00E2B8F2
                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E2B904
                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E2B922
                                          • FreeLibrary.KERNEL32(00000000), ref: 00E2B983
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E2B994
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                          • API String ID: 146587525-4033151799
                                          • Opcode ID: ec0ebe1d09b2e353d4a278bb74e43c18c8d7f56a93788c3c4ba65a46a21c0347
                                          • Instruction ID: a5772e756933fc407dfab059a354c7d20caf6ffffc5aee9fcfb3f3d82a263ad0
                                          • Opcode Fuzzy Hash: ec0ebe1d09b2e353d4a278bb74e43c18c8d7f56a93788c3c4ba65a46a21c0347
                                          • Instruction Fuzzy Hash: D1C1BE30204211AFD714DF24D495F2ABBE5FF85318F18955CF59AAB2A2CB31EC45CBA1
                                          APIs
                                          • GetDC.USER32(00000000), ref: 00E225D8
                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00E225E8
                                          • CreateCompatibleDC.GDI32(?), ref: 00E225F4
                                          • SelectObject.GDI32(00000000,?), ref: 00E22601
                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00E2266D
                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00E226AC
                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00E226D0
                                          • SelectObject.GDI32(?,?), ref: 00E226D8
                                          • DeleteObject.GDI32(?), ref: 00E226E1
                                          • DeleteDC.GDI32(?), ref: 00E226E8
                                          • ReleaseDC.USER32(00000000,?), ref: 00E226F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                          • String ID: (
                                          • API String ID: 2598888154-3887548279
                                          • Opcode ID: 0c3fab2a7b5c0feeb35d5558ab4cd1cadd07f48b15a7c40bc034553cde46c0b0
                                          • Instruction ID: abcd70bbb89a89122d58a8ee6bef8e5d09aa4ad874617a917ec67d8d0485eb04
                                          • Opcode Fuzzy Hash: 0c3fab2a7b5c0feeb35d5558ab4cd1cadd07f48b15a7c40bc034553cde46c0b0
                                          • Instruction Fuzzy Hash: 9F61D276D00219EFCB14CFA4D888AAEBBF5FF48310F208529EA55B7250D774A951DFA0
                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 00DDDAA1
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD659
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD66B
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD67D
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD68F
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6A1
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6B3
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6C5
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6D7
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6E9
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD6FB
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD70D
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD71F
                                            • Part of subcall function 00DDD63C: _free.LIBCMT ref: 00DDD731
                                          • _free.LIBCMT ref: 00DDDA96
                                            • Part of subcall function 00DD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000), ref: 00DD29DE
                                            • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                                          • _free.LIBCMT ref: 00DDDAB8
                                          • _free.LIBCMT ref: 00DDDACD
                                          • _free.LIBCMT ref: 00DDDAD8
                                          • _free.LIBCMT ref: 00DDDAFA
                                          • _free.LIBCMT ref: 00DDDB0D
                                          • _free.LIBCMT ref: 00DDDB1B
                                          • _free.LIBCMT ref: 00DDDB26
                                          • _free.LIBCMT ref: 00DDDB5E
                                          • _free.LIBCMT ref: 00DDDB65
                                          • _free.LIBCMT ref: 00DDDB82
                                          • _free.LIBCMT ref: 00DDDB9A
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID:
                                          • API String ID: 161543041-0
                                          • Opcode ID: 9064d0ce1542ba19d3659116b0450715dc6a4f226a8c2ba704a7982b66d57011
                                          • Instruction ID: f4060620117c392e0250281765c6beb7e209f2f4f608b34848027ef6e1f5bac2
                                          • Opcode Fuzzy Hash: 9064d0ce1542ba19d3659116b0450715dc6a4f226a8c2ba704a7982b66d57011
                                          • Instruction Fuzzy Hash: 26314A316446059FEF21AA39EC45B6A77EAFF20314F29941BE459D7391DB31AC409B30
                                          APIs
                                          • GetClassNameW.USER32(?,?,00000100), ref: 00E0369C
                                          • _wcslen.LIBCMT ref: 00E036A7
                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00E03797
                                          • GetClassNameW.USER32(?,?,00000400), ref: 00E0380C
                                          • GetDlgCtrlID.USER32(?), ref: 00E0385D
                                          • GetWindowRect.USER32(?,?), ref: 00E03882
                                          • GetParent.USER32(?), ref: 00E038A0
                                          • ScreenToClient.USER32(00000000), ref: 00E038A7
                                          • GetClassNameW.USER32(?,?,00000100), ref: 00E03921
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00E0395D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                          • String ID: %s%u
                                          • API String ID: 4010501982-679674701
                                          • Opcode ID: 10980aeb77b177cee4f1d915f961e9375d04b0be6b19057bad326f4baf6ff45f
                                          • Instruction ID: b3657b6c9185cb0ed9b649571fd0057b432597ed9a647bb7e4eab1904f6b2c1e
                                          • Opcode Fuzzy Hash: 10980aeb77b177cee4f1d915f961e9375d04b0be6b19057bad326f4baf6ff45f
                                          • Instruction Fuzzy Hash: 3B91BE71204606AFD718DF34C885FAAF7ACFF44354F509629F999A21D0DB30EA85CBA1
                                          APIs
                                          • GetClassNameW.USER32(?,?,00000400), ref: 00E04994
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00E049DA
                                          • _wcslen.LIBCMT ref: 00E049EB
                                          • CharUpperBuffW.USER32(?,00000000), ref: 00E049F7
                                          • _wcsstr.LIBVCRUNTIME ref: 00E04A2C
                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00E04A64
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00E04A9D
                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00E04AE6
                                          • GetClassNameW.USER32(?,?,00000400), ref: 00E04B20
                                          • GetWindowRect.USER32(?,?), ref: 00E04B8B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                          • String ID: ThumbnailClass
                                          • API String ID: 1311036022-1241985126
                                          • Opcode ID: b3c07acf4dac08a26bd5312bee0109515cbcad0fb73b5ae96135559540095c37
                                          • Instruction ID: d74686f322de3a1b76a5ae18d071f5cef4facac108aae9885ae4525ba2de3dcb
                                          • Opcode Fuzzy Hash: b3c07acf4dac08a26bd5312bee0109515cbcad0fb73b5ae96135559540095c37
                                          • Instruction Fuzzy Hash: 829190F11042059FDB04DF14CA85BAAB7E8EF84758F045469FE85AA0D6EB30ED85CBA1
                                          APIs
                                            • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E38D5A
                                          • GetFocus.USER32 ref: 00E38D6A
                                          • GetDlgCtrlID.USER32(00000000), ref: 00E38D75
                                          • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00E38E1D
                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00E38ECF
                                          • GetMenuItemCount.USER32(?), ref: 00E38EEC
                                          • GetMenuItemID.USER32(?,00000000), ref: 00E38EFC
                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00E38F2E
                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00E38F70
                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E38FA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                          • String ID: 0
                                          • API String ID: 1026556194-4108050209
                                          • Opcode ID: 01b07ad03260e8fbb54a8ad3f081384148a3854f5379beccfd4cf5ae7a3966e5
                                          • Instruction ID: 7314da0239becc8930ba6f4b82effcae8e97f53425c9487d96f01d0532f72102
                                          • Opcode Fuzzy Hash: 01b07ad03260e8fbb54a8ad3f081384148a3854f5379beccfd4cf5ae7a3966e5
                                          • Instruction Fuzzy Hash: 69819C71604305AFDB20CF25CD88AABBFE9FB88718F141959F985B7291DB30D904CB62
                                          APIs
                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00E2CC64
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00E2CC8D
                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00E2CD48
                                            • Part of subcall function 00E2CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00E2CCAA
                                            • Part of subcall function 00E2CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00E2CCBD
                                            • Part of subcall function 00E2CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E2CCCF
                                            • Part of subcall function 00E2CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00E2CD05
                                            • Part of subcall function 00E2CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00E2CD28
                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E2CCF3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                          • API String ID: 2734957052-4033151799
                                          • Opcode ID: c32e0c8974fffe7d9fbba8f103ee3b72ffb58d36342ece44c899864f698c1746
                                          • Instruction ID: c4c0cb8f92b9313d329ffdc1b204dc23b92d57506b195c5fb14fc3ed505ad77d
                                          • Opcode Fuzzy Hash: c32e0c8974fffe7d9fbba8f103ee3b72ffb58d36342ece44c899864f698c1746
                                          • Instruction Fuzzy Hash: 8A316B76901128BBDB208B61EC88EEFBF7CEF05744F200165A905F3240DA749A49EBA0
                                          APIs
                                          • timeGetTime.WINMM ref: 00E0E6B4
                                            • Part of subcall function 00DBE551: timeGetTime.WINMM(?,?,00E0E6D4), ref: 00DBE555
                                          • Sleep.KERNEL32(0000000A), ref: 00E0E6E1
                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00E0E705
                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00E0E727
                                          • SetActiveWindow.USER32 ref: 00E0E746
                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00E0E754
                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00E0E773
                                          • Sleep.KERNEL32(000000FA), ref: 00E0E77E
                                          • IsWindow.USER32 ref: 00E0E78A
                                          • EndDialog.USER32(00000000), ref: 00E0E79B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                          • String ID: BUTTON
                                          • API String ID: 1194449130-3405671355
                                          • Opcode ID: 9fc3c274ad9052070c84eaceb06da66974da9ed2eaaa4095c6cd847b309d2dbf
                                          • Instruction ID: ff38a3eafc2b2ffd70fd471719bb72ebcad1a3d82447c21b7493cd1867ced1fc
                                          • Opcode Fuzzy Hash: 9fc3c274ad9052070c84eaceb06da66974da9ed2eaaa4095c6cd847b309d2dbf
                                          • Instruction Fuzzy Hash: 79216570200205BFEB00AF66FC8DA253F69E75474DF242836F51AB12E1DB71DC889B25
                                          APIs
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00E0EA5D
                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00E0EA73
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E0EA84
                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00E0EA96
                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00E0EAA7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: SendString$_wcslen
                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                          • API String ID: 2420728520-1007645807
                                          • Opcode ID: ce0fb216da3327167ebd3a622d8d5765c23473c22c0b99238e94718402302761
                                          • Instruction ID: c7919ab28f725f1a53b208f48a0fc7fc41a9b76708d31d0054b83798e7dca5d9
                                          • Opcode Fuzzy Hash: ce0fb216da3327167ebd3a622d8d5765c23473c22c0b99238e94718402302761
                                          • Instruction Fuzzy Hash: 67117731A9035979D710A765EC4ADFF6B7CEBD6B44F041839B801B20D1EFB04945CAB0
                                          APIs
                                          • GetDlgItem.USER32(?,00000001), ref: 00E05CE2
                                          • GetWindowRect.USER32(00000000,?), ref: 00E05CFB
                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00E05D59
                                          • GetDlgItem.USER32(?,00000002), ref: 00E05D69
                                          • GetWindowRect.USER32(00000000,?), ref: 00E05D7B
                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00E05DCF
                                          • GetDlgItem.USER32(?,000003E9), ref: 00E05DDD
                                          • GetWindowRect.USER32(00000000,?), ref: 00E05DEF
                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00E05E31
                                          • GetDlgItem.USER32(?,000003EA), ref: 00E05E44
                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00E05E5A
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E05E67
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$ItemMoveRect$Invalidate
                                          • String ID:
                                          • API String ID: 3096461208-0
                                          • Opcode ID: d3817b595ee6a86ba933607f7fbc073ddd551eee520bb8ddc0c1a7e584b6ef01
                                          • Instruction ID: 3c6354c68c286421fe4639ff61b9310c5e980200c77201fbef931016056d2a1e
                                          • Opcode Fuzzy Hash: d3817b595ee6a86ba933607f7fbc073ddd551eee520bb8ddc0c1a7e584b6ef01
                                          • Instruction Fuzzy Hash: C6511CB1A00619AFDB18CF69DD89AAEBBB5EB48700F209129F915F6290D770DE44CF50
                                          APIs
                                            • Part of subcall function 00DB8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DB8BE8,?,00000000,?,?,?,?,00DB8BBA,00000000,?), ref: 00DB8FC5
                                          • DestroyWindow.USER32(?), ref: 00DB8C81
                                          • KillTimer.USER32(00000000,?,?,?,?,00DB8BBA,00000000,?), ref: 00DB8D1B
                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00DF6973
                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00DB8BBA,00000000,?), ref: 00DF69A1
                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00DB8BBA,00000000,?), ref: 00DF69B8
                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00DB8BBA,00000000), ref: 00DF69D4
                                          • DeleteObject.GDI32(00000000), ref: 00DF69E6
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                          • String ID:
                                          • API String ID: 641708696-0
                                          • Opcode ID: 5cb31e2751571b92b6b6e3a776ef43599bc5e31b62de8a40afc4c98422a09e23
                                          • Instruction ID: e01c04fbd9792517b2a6734ffbb8507c255ad38147253de2217eea5d9e68b400
                                          • Opcode Fuzzy Hash: 5cb31e2751571b92b6b6e3a776ef43599bc5e31b62de8a40afc4c98422a09e23
                                          • Instruction Fuzzy Hash: 5D61AA31501704DFCB25CF2AC948BA57BF5FB40312F288559E287AA960CB71E885EF70
                                          APIs
                                            • Part of subcall function 00DB9944: GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                                          • GetSysColor.USER32(0000000F), ref: 00DB9862
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ColorLongWindow
                                          • String ID:
                                          • API String ID: 259745315-0
                                          • Opcode ID: 1ea075921c9946edc8b5888eed08831aaa5008140900dd3db547b6f2e9f18ffb
                                          • Instruction ID: 7095b14c09d451ecb02731ac1c404038077d2b803c4a951faec7a5e08670ce76
                                          • Opcode Fuzzy Hash: 1ea075921c9946edc8b5888eed08831aaa5008140900dd3db547b6f2e9f18ffb
                                          • Instruction Fuzzy Hash: 10419335104684EFDB215F399C58BF97B75AB06320F288659FAA6A72E1C731DC42DB30
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00DEF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00E09717
                                          • LoadStringW.USER32(00000000,?,00DEF7F8,00000001), ref: 00E09720
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00DEF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00E09742
                                          • LoadStringW.USER32(00000000,?,00DEF7F8,00000001), ref: 00E09745
                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00E09866
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString$Message_wcslen
                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                          • API String ID: 747408836-2268648507
                                          • Opcode ID: 5533f93b19f527b991c77473dc1359be3d49e6040908b14bfa8b5818eeebb39b
                                          • Instruction ID: 6d41abb5bab7aad471c3b2308a33e7363c7ca53fea3dc09b7f7f1dabd1580273
                                          • Opcode Fuzzy Hash: 5533f93b19f527b991c77473dc1359be3d49e6040908b14bfa8b5818eeebb39b
                                          • Instruction Fuzzy Hash: 4D413872800219AACF04EBE1DE96DEEB779EF56340F645025F60572092EB356F48CBB1
                                          APIs
                                            • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00E007A2
                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00E007BE
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00E007DA
                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00E00804
                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00E0082C
                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E00837
                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E0083C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                          • API String ID: 323675364-22481851
                                          • Opcode ID: c98bc269f5f2a7a1b70cc96fa1522fdff35340b057fc134003509b0a846f04cc
                                          • Instruction ID: 1027cfc6d76aa8ffc6cf68120b04f20b569b512bf7e0901359054d070b50f613
                                          • Opcode Fuzzy Hash: c98bc269f5f2a7a1b70cc96fa1522fdff35340b057fc134003509b0a846f04cc
                                          • Instruction Fuzzy Hash: D541E372810229AEDF15EBA4DC959EEB778FF44350F544129E911B31A1EB349E48CFA0
                                          APIs
                                          • CoInitialize.OLE32(00000000), ref: 00E17AF3
                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00E17B8F
                                          • SHGetDesktopFolder.SHELL32(?), ref: 00E17BA3
                                          • CoCreateInstance.OLE32(00E3FD08,00000000,00000001,00E66E6C,?), ref: 00E17BEF
                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00E17C74
                                          • CoTaskMemFree.OLE32(?,?), ref: 00E17CCC
                                          • SHBrowseForFolderW.SHELL32(?), ref: 00E17D57
                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00E17D7A
                                          • CoTaskMemFree.OLE32(00000000), ref: 00E17D81
                                          • CoTaskMemFree.OLE32(00000000), ref: 00E17DD6
                                          • CoUninitialize.OLE32 ref: 00E17DDC
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                          • String ID:
                                          • API String ID: 2762341140-0
                                          • Opcode ID: 1fba5d254fbb8663da78a623d5808b8c835888ddfc26d6c757224ea68902a7ab
                                          • Instruction ID: de28712b82f892f08d5dde120aa2035de6d0487a9e67858003f5aa3b15ead0f5
                                          • Opcode Fuzzy Hash: 1fba5d254fbb8663da78a623d5808b8c835888ddfc26d6c757224ea68902a7ab
                                          • Instruction Fuzzy Hash: 51C13C75A04109AFCB14DF64C888DAEBBF5FF49314B148499F456EB261D730EE85CBA0
                                          APIs
                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00E35504
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E35515
                                          • CharNextW.USER32(00000158), ref: 00E35544
                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00E35585
                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00E3559B
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E355AC
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$CharNext
                                          • String ID:
                                          • API String ID: 1350042424-0
                                          • Opcode ID: fd043c7955e68493c1af0ceed8a55c5377254b3e8aca46f01b5e06bef4b29f5e
                                          • Instruction ID: f9e3a1f266c906f177a3335008143adc103ff14c62143567a80a86bc4d91cb50
                                          • Opcode Fuzzy Hash: fd043c7955e68493c1af0ceed8a55c5377254b3e8aca46f01b5e06bef4b29f5e
                                          • Instruction Fuzzy Hash: D8618B72900608EFDB20CF55CC89AFE7FB9EB0A724F105145F926B6390D7709A84DB61
                                          APIs
                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00DFFAAF
                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00DFFB08
                                          • VariantInit.OLEAUT32(?), ref: 00DFFB1A
                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00DFFB3A
                                          • VariantCopy.OLEAUT32(?,?), ref: 00DFFB8D
                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00DFFBA1
                                          • VariantClear.OLEAUT32(?), ref: 00DFFBB6
                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00DFFBC3
                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DFFBCC
                                          • VariantClear.OLEAUT32(?), ref: 00DFFBDE
                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00DFFBE9
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                          • String ID:
                                          • API String ID: 2706829360-0
                                          • Opcode ID: 28f155cf5e134ff85f8f2725833f33346d7839bc700d7410649dc0ad3132a48d
                                          • Instruction ID: 5d124668ccc71b161f3f2a10ec926389bc8467d8d55e572835918e68e4a78da3
                                          • Opcode Fuzzy Hash: 28f155cf5e134ff85f8f2725833f33346d7839bc700d7410649dc0ad3132a48d
                                          • Instruction Fuzzy Hash: B9414E35A0021D9FCB00DFA9D8589BEBBB9EF48354F11C069E956B7261CB30E945CBA0
                                          APIs
                                          • GetKeyboardState.USER32(?), ref: 00E09CA1
                                          • GetAsyncKeyState.USER32(000000A0), ref: 00E09D22
                                          • GetKeyState.USER32(000000A0), ref: 00E09D3D
                                          • GetAsyncKeyState.USER32(000000A1), ref: 00E09D57
                                          • GetKeyState.USER32(000000A1), ref: 00E09D6C
                                          • GetAsyncKeyState.USER32(00000011), ref: 00E09D84
                                          • GetKeyState.USER32(00000011), ref: 00E09D96
                                          • GetAsyncKeyState.USER32(00000012), ref: 00E09DAE
                                          • GetKeyState.USER32(00000012), ref: 00E09DC0
                                          • GetAsyncKeyState.USER32(0000005B), ref: 00E09DD8
                                          • GetKeyState.USER32(0000005B), ref: 00E09DEA
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: State$Async$Keyboard
                                          • String ID:
                                          • API String ID: 541375521-0
                                          • Opcode ID: 1707d4940659271b62050ae79754027796a443c7f5127ac5ec27bba3d27d625b
                                          • Instruction ID: 12a9c47488b58d03eaf1e3f35ccb79efd117cf5f46cfe62b20b8ea63318f6c99
                                          • Opcode Fuzzy Hash: 1707d4940659271b62050ae79754027796a443c7f5127ac5ec27bba3d27d625b
                                          • Instruction Fuzzy Hash: 6B41A5349447C96EFF319E61C8443A5FEE06F11348F08905ADAC67A5C3DBA59DC8C792
                                          APIs
                                          • WSAStartup.WSOCK32(00000101,?), ref: 00E205BC
                                          • inet_addr.WSOCK32(?), ref: 00E2061C
                                          • gethostbyname.WSOCK32(?), ref: 00E20628
                                          • IcmpCreateFile.IPHLPAPI ref: 00E20636
                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00E206C6
                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00E206E5
                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 00E207B9
                                          • WSACleanup.WSOCK32 ref: 00E207BF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                          • String ID: Ping
                                          • API String ID: 1028309954-2246546115
                                          • Opcode ID: 1ae5c3ce95c048b1934179ddf4b039714be2912606570da9f06191bd991fdae5
                                          • Instruction ID: 53a39667616e51b326dc763ce4d27fb52ed854f7fcae225fc2ae00209a473cc3
                                          • Opcode Fuzzy Hash: 1ae5c3ce95c048b1934179ddf4b039714be2912606570da9f06191bd991fdae5
                                          • Instruction Fuzzy Hash: B1919E356042119FD320DF25E888F1ABBE0EF44318F1495AAF46AAB6A3C770ED45CF91
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharLower
                                          • String ID: cdecl$none$stdcall$winapi
                                          • API String ID: 707087890-567219261
                                          • Opcode ID: afadcc9d39006b1eee3ead5a09fa7b7c529ab4c6635dfc2b43c19367014cf64f
                                          • Instruction ID: e9e82feb6cff75d05e9d02ab9fcac753c7c3ef06921e32dd2c0b5982ac9bff1d
                                          • Opcode Fuzzy Hash: afadcc9d39006b1eee3ead5a09fa7b7c529ab4c6635dfc2b43c19367014cf64f
                                          • Instruction Fuzzy Hash: CD51C032A011269BCB24DF68DE509BEB3A5FF65368B255229E426F72C4DF30DD44C7A0
                                          APIs
                                          • CoInitialize.OLE32 ref: 00E23774
                                          • CoUninitialize.OLE32 ref: 00E2377F
                                          • CoCreateInstance.OLE32(?,00000000,00000017,00E3FB78,?), ref: 00E237D9
                                          • IIDFromString.OLE32(?,?), ref: 00E2384C
                                          • VariantInit.OLEAUT32(?), ref: 00E238E4
                                          • VariantClear.OLEAUT32(?), ref: 00E23936
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                          • API String ID: 636576611-1287834457
                                          • Opcode ID: fcc673d38dc6116fd43dd4111763d0160913bb3f713c4bc326c3e82e6d2e977b
                                          • Instruction ID: a0dd5896207bfd41861ef5f5cff23ed9b690e63ab50a4816acb1b2e9a11c6d66
                                          • Opcode Fuzzy Hash: fcc673d38dc6116fd43dd4111763d0160913bb3f713c4bc326c3e82e6d2e977b
                                          • Instruction Fuzzy Hash: EB61B270608311AFD714DF64E849F9ABBE4EF45714F10180AF585AB291D774EE88CFA2
                                          APIs
                                            • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                                            • Part of subcall function 00DB912D: GetCursorPos.USER32(?), ref: 00DB9141
                                            • Part of subcall function 00DB912D: ScreenToClient.USER32(00000000,?), ref: 00DB915E
                                            • Part of subcall function 00DB912D: GetAsyncKeyState.USER32(00000001), ref: 00DB9183
                                            • Part of subcall function 00DB912D: GetAsyncKeyState.USER32(00000002), ref: 00DB919D
                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00E38B6B
                                          • ImageList_EndDrag.COMCTL32 ref: 00E38B71
                                          • ReleaseCapture.USER32 ref: 00E38B77
                                          • SetWindowTextW.USER32(?,00000000), ref: 00E38C12
                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00E38C25
                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00E38CFF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#
                                          • API String ID: 1924731296-655930031
                                          • Opcode ID: 1c4a77b3d4d97dba0ecb7cda782f10aedd1e0c5542d8085bf51de40ec5357f65
                                          • Instruction ID: af4e7a186c9999b91e533c1d04cd54d52d67910075ba302962799c1f3667cc82
                                          • Opcode Fuzzy Hash: 1c4a77b3d4d97dba0ecb7cda782f10aedd1e0c5542d8085bf51de40ec5357f65
                                          • Instruction Fuzzy Hash: 1451AD71204304AFD704DF24DC5AFAABBE4FB88754F10166DF996672E1CB70A948CB62
                                          APIs
                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00E133CF
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00E133F0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: LoadString$_wcslen
                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                          • API String ID: 4099089115-3080491070
                                          • Opcode ID: 4c1da01f96c32175f7ea6cdc1b242ed1f1377d661acacfef08324f7a75d523a3
                                          • Instruction ID: 642aa09f6ab748528cce57bb866ffa00475694fa579202a6c1e80dc5b8425ec4
                                          • Opcode Fuzzy Hash: 4c1da01f96c32175f7ea6cdc1b242ed1f1377d661acacfef08324f7a75d523a3
                                          • Instruction Fuzzy Hash: 8C51AB72900209AADF15EBE0DD46EEEB7B9EF05740F205065F409720A2EB316F98DB70
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharUpper
                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                          • API String ID: 1256254125-769500911
                                          • Opcode ID: 1432f1fefbd6e457032a15eeb736265729fa5403abad3b38b928d19ef4c3adad
                                          • Instruction ID: 0f8b725b823dde625f4388644f011ebf1874033e883739b7860b9e36b7e18c03
                                          • Opcode Fuzzy Hash: 1432f1fefbd6e457032a15eeb736265729fa5403abad3b38b928d19ef4c3adad
                                          • Instruction Fuzzy Hash: 7D41A932A001279BCB105F7DD8915BE77A5FBA1758B25522AE461F72C4E732CDC1C7A0
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 00E153A0
                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00E15416
                                          • GetLastError.KERNEL32 ref: 00E15420
                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00E154A7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Error$Mode$DiskFreeLastSpace
                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                          • API String ID: 4194297153-14809454
                                          • Opcode ID: f7a49d9cbe44ec03e363630542bcc90f1f3ffbeefb2711a4ce4fc6119de3648a
                                          • Instruction ID: caef85d252e02af076c098d6222e3b1bc948d5dad70ed1ea4fc75d6339b284c2
                                          • Opcode Fuzzy Hash: f7a49d9cbe44ec03e363630542bcc90f1f3ffbeefb2711a4ce4fc6119de3648a
                                          • Instruction Fuzzy Hash: 0831C336A00504DFC710DF68D489BEABBB4EF85349F149066E416EB292D771DDC6CBA0
                                          APIs
                                          • CreateMenu.USER32 ref: 00E33C79
                                          • SetMenu.USER32(?,00000000), ref: 00E33C88
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E33D10
                                          • IsMenu.USER32(?), ref: 00E33D24
                                          • CreatePopupMenu.USER32 ref: 00E33D2E
                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E33D5B
                                          • DrawMenuBar.USER32 ref: 00E33D63
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                          • String ID: 0$F
                                          • API String ID: 161812096-3044882817
                                          • Opcode ID: 407d23b3fa5dfd1311c67ea8febf248e3defd146cb8222303df4d3c75f2e6a5a
                                          • Instruction ID: c75ece11b635700a0fc1d9b1ec3a4f21ec1996e99b2d35a4474d50fba413a699
                                          • Opcode Fuzzy Hash: 407d23b3fa5dfd1311c67ea8febf248e3defd146cb8222303df4d3c75f2e6a5a
                                          • Instruction Fuzzy Hash: 05414875A01209AFDB14CF65D848EEA7BB5FF49354F140029FA46B7360D731EA14CBA4
                                          APIs
                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00E33A9D
                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00E33AA0
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E33AC7
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E33AEA
                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00E33B62
                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00E33BAC
                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00E33BC7
                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00E33BE2
                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00E33BF6
                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00E33C13
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$LongWindow
                                          • String ID:
                                          • API String ID: 312131281-0
                                          • Opcode ID: 16827d49649291faec0f69306d9af8bb8f966174be73de100a78a8eb8e64e769
                                          • Instruction ID: dc60c32391494f27787190a3916148bb434dea2afdf004e1cac813995ea612a9
                                          • Opcode Fuzzy Hash: 16827d49649291faec0f69306d9af8bb8f966174be73de100a78a8eb8e64e769
                                          • Instruction Fuzzy Hash: 0F616A75900248AFDB10DF68CC85EEEBBF8EB49704F105199FA15B72A2C770AE45DB60
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 00E0B151
                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00E0A1E1,?,00000001), ref: 00E0B165
                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00E0B16C
                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E0A1E1,?,00000001), ref: 00E0B17B
                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E0B18D
                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00E0A1E1,?,00000001), ref: 00E0B1A6
                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E0A1E1,?,00000001), ref: 00E0B1B8
                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00E0A1E1,?,00000001), ref: 00E0B1FD
                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00E0A1E1,?,00000001), ref: 00E0B212
                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00E0A1E1,?,00000001), ref: 00E0B21D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                          • String ID:
                                          • API String ID: 2156557900-0
                                          • Opcode ID: a62cd7f2347c17a49f8939fd76ef92df3705d13a3ef17b982f6645115c4fa5a4
                                          • Instruction ID: ecb84a836f5e587bc071222a1143e08a2734d487378b77e029edd6fd9256d7ce
                                          • Opcode Fuzzy Hash: a62cd7f2347c17a49f8939fd76ef92df3705d13a3ef17b982f6645115c4fa5a4
                                          • Instruction Fuzzy Hash: 74319E71500208BFDB10DF26EC49BAD7BAABB61715F205405FA09F61E0D7B4DAC88F60
                                          APIs
                                          • _free.LIBCMT ref: 00DD2C94
                                            • Part of subcall function 00DD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000), ref: 00DD29DE
                                            • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                                          • _free.LIBCMT ref: 00DD2CA0
                                          • _free.LIBCMT ref: 00DD2CAB
                                          • _free.LIBCMT ref: 00DD2CB6
                                          • _free.LIBCMT ref: 00DD2CC1
                                          • _free.LIBCMT ref: 00DD2CCC
                                          • _free.LIBCMT ref: 00DD2CD7
                                          • _free.LIBCMT ref: 00DD2CE2
                                          • _free.LIBCMT ref: 00DD2CED
                                          • _free.LIBCMT ref: 00DD2CFB
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 910ea247b02ea594771925ecabc85ac20073afde8b834e5fdd7e178e508c48e5
                                          • Instruction ID: 45ea96b86da200d62f7c737c65417aedd9534218a2b39fa0ccac32a01410737b
                                          • Opcode Fuzzy Hash: 910ea247b02ea594771925ecabc85ac20073afde8b834e5fdd7e178e508c48e5
                                          • Instruction Fuzzy Hash: C3118076140108AFCB02EF54DC92CAD3BA9FF15350F4144A6FA489B322DB31EA50AFB0
                                          APIs
                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00DA1459
                                          • OleUninitialize.OLE32(?,00000000), ref: 00DA14F8
                                          • UnregisterHotKey.USER32(?), ref: 00DA16DD
                                          • DestroyWindow.USER32(?), ref: 00DE24B9
                                          • FreeLibrary.KERNEL32(?), ref: 00DE251E
                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00DE254B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                          • String ID: close all
                                          • API String ID: 469580280-3243417748
                                          • Opcode ID: 7532ebc3e44d46f8fa8c467e504d053ff5293d0108388e9ad90afdda546931d7
                                          • Instruction ID: 0189fcd1ddef1521f8125b5db2391920a96be2c73ff679f3f150045a651b5a00
                                          • Opcode Fuzzy Hash: 7532ebc3e44d46f8fa8c467e504d053ff5293d0108388e9ad90afdda546931d7
                                          • Instruction Fuzzy Hash: FCD14A35701252CFCB19EF15C999A69F7A4BF46700F2942ADE44AAB251CB30ED12CF70
                                          APIs
                                          • SetWindowLongW.USER32(?,000000EB), ref: 00DA5C7A
                                            • Part of subcall function 00DA5D0A: GetClientRect.USER32(?,?), ref: 00DA5D30
                                            • Part of subcall function 00DA5D0A: GetWindowRect.USER32(?,?), ref: 00DA5D71
                                            • Part of subcall function 00DA5D0A: ScreenToClient.USER32(?,?), ref: 00DA5D99
                                          • GetDC.USER32 ref: 00DE46F5
                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00DE4708
                                          • SelectObject.GDI32(00000000,00000000), ref: 00DE4716
                                          • SelectObject.GDI32(00000000,00000000), ref: 00DE472B
                                          • ReleaseDC.USER32(?,00000000), ref: 00DE4733
                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00DE47C4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                          • String ID: U
                                          • API String ID: 4009187628-3372436214
                                          • Opcode ID: ff4a7508c05834da9fb66a768241bf09aa5f1db3cb37335c41551c5f1c4dc372
                                          • Instruction ID: 456bda372acc82705eb0d097bd9cb31794b2342f849f5c0c73068a8878bc46e3
                                          • Opcode Fuzzy Hash: ff4a7508c05834da9fb66a768241bf09aa5f1db3cb37335c41551c5f1c4dc372
                                          • Instruction Fuzzy Hash: 1671D131400245DFCF21AF65C988AEA7BB5FF4A364F184269ED956A16AC731C881DFB0
                                          APIs
                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00E135E4
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                          • LoadStringW.USER32(00E72390,?,00000FFF,?), ref: 00E1360A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: LoadString$_wcslen
                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                          • API String ID: 4099089115-2391861430
                                          • Opcode ID: 0913fb7be32cf27b740005774b7abe257ba18d4887f5d95866db7450abe48bbf
                                          • Instruction ID: 7915f589e115829c6f4b21b709acd837178aa7be736265f4c60f550b3fd89436
                                          • Opcode Fuzzy Hash: 0913fb7be32cf27b740005774b7abe257ba18d4887f5d95866db7450abe48bbf
                                          • Instruction Fuzzy Hash: C4518AB2800219BADF15EBA0DC52EEEBB79EF05340F145165F115721A2EB306AD9DFB0
                                          APIs
                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E1C272
                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E1C29A
                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E1C2CA
                                          • GetLastError.KERNEL32 ref: 00E1C322
                                          • SetEvent.KERNEL32(?), ref: 00E1C336
                                          • InternetCloseHandle.WININET(00000000), ref: 00E1C341
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                          • String ID:
                                          • API String ID: 3113390036-3916222277
                                          • Opcode ID: be1509ffdd521b4dc5c193deb212e7effc0a99b5cab733efc3fb0ea1f40d22f9
                                          • Instruction ID: 73c7ad24ec28094730f19a700288fd25185867e0d46e7a6eedd50bae4a77e051
                                          • Opcode Fuzzy Hash: be1509ffdd521b4dc5c193deb212e7effc0a99b5cab733efc3fb0ea1f40d22f9
                                          • Instruction Fuzzy Hash: 263180B1640608AFD7219F65CC88AEB7BFCEB49744F20951EF456F2210DB30DD899B61
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00DE3AAF,?,?,Bad directive syntax error,00E3CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00E098BC
                                          • LoadStringW.USER32(00000000,?,00DE3AAF,?), ref: 00E098C3
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00E09987
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: HandleLoadMessageModuleString_wcslen
                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                          • API String ID: 858772685-4153970271
                                          • Opcode ID: 87ed8ddcbe3c5a9ee2b0b541afe81fa66ce20e3953d28aec9a147051251f9c97
                                          • Instruction ID: cc47ce6f85bf3d1b0a0bef9f924dfa0b175a83870eecfa0ecc775f952e7fc6b8
                                          • Opcode Fuzzy Hash: 87ed8ddcbe3c5a9ee2b0b541afe81fa66ce20e3953d28aec9a147051251f9c97
                                          • Instruction Fuzzy Hash: 28218D3284021EABCF11AF90CC0AEEE7B75FF19344F045469F515720A2EB719A68DB70
                                          APIs
                                          • GetParent.USER32 ref: 00E020AB
                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00E020C0
                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00E0214D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameParentSend
                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                          • API String ID: 1290815626-3381328864
                                          • Opcode ID: 270b455686ae7a9b61852cf20a48ab65c7ca78f9390b0d2a69f7042b98e2a279
                                          • Instruction ID: 6c311b9f46fe69ebbcdc4b425371c434baf92420abff1b0d1f085019d410a1c6
                                          • Opcode Fuzzy Hash: 270b455686ae7a9b61852cf20a48ab65c7ca78f9390b0d2a69f7042b98e2a279
                                          • Instruction Fuzzy Hash: A31106776C8707B9FA152620EC0FDE677DCCB15768F20211EFB04F50D1EA61A8865624
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                          • String ID:
                                          • API String ID: 1282221369-0
                                          • Opcode ID: 06404804e4eb3a101c1bfc354f37aec923c0446dd6dbeb3d510bdab413208202
                                          • Instruction ID: ddbbebcb80e076b610a397e633c75eb3f2f9e66f86489ac2fdc51b5f983ef0be
                                          • Opcode Fuzzy Hash: 06404804e4eb3a101c1bfc354f37aec923c0446dd6dbeb3d510bdab413208202
                                          • Instruction Fuzzy Hash: F46103B1905302AFDF21AFB49C85AB97BAAEF45320F08416FF944A7381E7319945D7B0
                                          APIs
                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00E35186
                                          • ShowWindow.USER32(?,00000000), ref: 00E351C7
                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 00E351CD
                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00E351D1
                                            • Part of subcall function 00E36FBA: DeleteObject.GDI32(00000000), ref: 00E36FE6
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E3520D
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E3521A
                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00E3524D
                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00E35287
                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00E35296
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                          • String ID:
                                          • API String ID: 3210457359-0
                                          • Opcode ID: 7ffb33acba5d5661ebbfe6183c761c1d6d807589128eef83013fa34b75b7e216
                                          • Instruction ID: 3c9df636e345007ec1a52bad583dfc06bdf3de85da35d4e51c39fefcc034488d
                                          • Opcode Fuzzy Hash: 7ffb33acba5d5661ebbfe6183c761c1d6d807589128eef83013fa34b75b7e216
                                          • Instruction Fuzzy Hash: B451BD32A41A08BEEF209F25CC4EBD93FB5EB05324F246402FA15B63E0C771A984DB51
                                          APIs
                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00DF6890
                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00DF68A9
                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00DF68B9
                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00DF68D1
                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00DF68F2
                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00DB8874,00000000,00000000,00000000,000000FF,00000000), ref: 00DF6901
                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00DF691E
                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00DB8874,00000000,00000000,00000000,000000FF,00000000), ref: 00DF692D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                          • String ID:
                                          • API String ID: 1268354404-0
                                          • Opcode ID: 9b76a02e32e5a3ac678312a63ea19fd4533a319099340fad426f3372e2ccacb8
                                          • Instruction ID: d575935d8979c396b075438c4ca4f161a62101ae793cc4d6d4d9ae6b81479167
                                          • Opcode Fuzzy Hash: 9b76a02e32e5a3ac678312a63ea19fd4533a319099340fad426f3372e2ccacb8
                                          • Instruction Fuzzy Hash: B1516C70600209EFDB20CF25CC55FAA7BB9FB58750F148518FA56A72A0DB70E991EB60
                                          APIs
                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E1C182
                                          • GetLastError.KERNEL32 ref: 00E1C195
                                          • SetEvent.KERNEL32(?), ref: 00E1C1A9
                                            • Part of subcall function 00E1C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E1C272
                                            • Part of subcall function 00E1C253: GetLastError.KERNEL32 ref: 00E1C322
                                            • Part of subcall function 00E1C253: SetEvent.KERNEL32(?), ref: 00E1C336
                                            • Part of subcall function 00E1C253: InternetCloseHandle.WININET(00000000), ref: 00E1C341
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                          • String ID:
                                          • API String ID: 337547030-0
                                          • Opcode ID: aaac44cb059337eeadb34e89e9327836ab8c3d1750cac7d98f76c6068f5e44aa
                                          • Instruction ID: 1c7c7e9f9076e6c3a08355bba1f72d166f5a9b7ad247ad9efe979ab39dd4b845
                                          • Opcode Fuzzy Hash: aaac44cb059337eeadb34e89e9327836ab8c3d1750cac7d98f76c6068f5e44aa
                                          • Instruction Fuzzy Hash: 7F317E71280A05AFDB219FA5DC48AEABBF9FF18304B20541EF956E2620D730E855DB60
                                          APIs
                                            • Part of subcall function 00E03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E03A57
                                            • Part of subcall function 00E03A3D: GetCurrentThreadId.KERNEL32 ref: 00E03A5E
                                            • Part of subcall function 00E03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E025B3), ref: 00E03A65
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E025BD
                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00E025DB
                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00E025DF
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E025E9
                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00E02601
                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00E02605
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E0260F
                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00E02623
                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00E02627
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                          • String ID:
                                          • API String ID: 2014098862-0
                                          • Opcode ID: 19205597a83e9651ada4dba760264875393a0aebc8bfe8ac3c8080fadc779f8e
                                          • Instruction ID: 2040544ab63da1d0a188cc1b5c8de51c22c6a4331df707ae6ec98ce1f7470edf
                                          • Opcode Fuzzy Hash: 19205597a83e9651ada4dba760264875393a0aebc8bfe8ac3c8080fadc779f8e
                                          • Instruction Fuzzy Hash: 0701D431390214BBFB1067699C8EF597FA9DB4EB12F201005F318BE0D1C9E264889A6A
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00E01449,?,?,00000000), ref: 00E0180C
                                          • HeapAlloc.KERNEL32(00000000,?,00E01449,?,?,00000000), ref: 00E01813
                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E01449,?,?,00000000), ref: 00E01828
                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00E01449,?,?,00000000), ref: 00E01830
                                          • DuplicateHandle.KERNEL32(00000000,?,00E01449,?,?,00000000), ref: 00E01833
                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E01449,?,?,00000000), ref: 00E01843
                                          • GetCurrentProcess.KERNEL32(00E01449,00000000,?,00E01449,?,?,00000000), ref: 00E0184B
                                          • DuplicateHandle.KERNEL32(00000000,?,00E01449,?,?,00000000), ref: 00E0184E
                                          • CreateThread.KERNEL32(00000000,00000000,00E01874,00000000,00000000,00000000), ref: 00E01868
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                          • String ID:
                                          • API String ID: 1957940570-0
                                          • Opcode ID: 4c85986f7be295eb9c9139289a6acdeea317e4a44b0fba010b90605749ec2c1a
                                          • Instruction ID: 9a8169e49de7c3ae770dcc15399e46112575489a15a306e845ebe381fe7b828d
                                          • Opcode Fuzzy Hash: 4c85986f7be295eb9c9139289a6acdeea317e4a44b0fba010b90605749ec2c1a
                                          • Instruction Fuzzy Hash: 7501BF75241308BFE710AB65DC4DF573F6CEB89B11F114451FA05EB192C671D814DB20
                                          APIs
                                            • Part of subcall function 00E0D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00E0D501
                                            • Part of subcall function 00E0D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00E0D50F
                                            • Part of subcall function 00E0D4DC: CloseHandle.KERNEL32(00000000), ref: 00E0D5DC
                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E2A16D
                                          • GetLastError.KERNEL32 ref: 00E2A180
                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E2A1B3
                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00E2A268
                                          • GetLastError.KERNEL32(00000000), ref: 00E2A273
                                          • CloseHandle.KERNEL32(00000000), ref: 00E2A2C4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                          • String ID: SeDebugPrivilege
                                          • API String ID: 2533919879-2896544425
                                          • Opcode ID: 62ec9fdb7d67b5f8d29ec665f302d25b54368c09160fa5d98ea638fdf74e0d45
                                          • Instruction ID: 29492d912e6a66de79d85e4161df3ef2420968d60fe63317cf1474883a3ddf50
                                          • Opcode Fuzzy Hash: 62ec9fdb7d67b5f8d29ec665f302d25b54368c09160fa5d98ea638fdf74e0d45
                                          • Instruction Fuzzy Hash: AB61D071205212DFD720DF14D894F15BBE1AF44318F18849CE466AB7A3C772EC49CBA2
                                          APIs
                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00E33925
                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00E3393A
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00E33954
                                          • _wcslen.LIBCMT ref: 00E33999
                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00E339C6
                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00E339F4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window_wcslen
                                          • String ID: SysListView32
                                          • API String ID: 2147712094-78025650
                                          • Opcode ID: 8eb2cdb70792f95b41c9c678ec6cfa4c81d2ac2c30b83ce332fef45751cc07db
                                          • Instruction ID: bb19e9ae49a41c8656e466627e61f461f287fcc72ca64dca7590d66034ba746b
                                          • Opcode Fuzzy Hash: 8eb2cdb70792f95b41c9c678ec6cfa4c81d2ac2c30b83ce332fef45751cc07db
                                          • Instruction Fuzzy Hash: 1341B171A00319ABEB219F64CC49FEA7BA9EF48354F10152AF948F7281D771DE84CB90
                                          APIs
                                          • LoadIconW.USER32(00000000,00007F03), ref: 00E0C913
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: IconLoad
                                          • String ID: blank$info$question$stop$warning
                                          • API String ID: 2457776203-404129466
                                          • Opcode ID: cbd5fd70dec44252c62d9f35cbca2d9e04de67547f078a375e78eec4b2a2682b
                                          • Instruction ID: 9dd619e55e4f9c4e2694eecff65faad87d464c875e212d375364f64452a7d9d5
                                          • Opcode Fuzzy Hash: cbd5fd70dec44252c62d9f35cbca2d9e04de67547f078a375e78eec4b2a2682b
                                          • Instruction Fuzzy Hash: 2A112B316C9307BAE7055B14EC82DEA679CDF15358B70512FF904F61C2D770AD815278
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$LocalTime
                                          • String ID:
                                          • API String ID: 952045576-0
                                          • Opcode ID: 2d65f06bcd062df0d06e841249ac88c157e287011af5570a97024857bdc1fd2e
                                          • Instruction ID: aae215a9d7a9ceeca8899a14fcfbe181d862a4b54522a85598fcd2a509920f8a
                                          • Opcode Fuzzy Hash: 2d65f06bcd062df0d06e841249ac88c157e287011af5570a97024857bdc1fd2e
                                          • Instruction Fuzzy Hash: 01418E65C1021965CB11EBF4CC8AECFB7A8EF45310F50886AE518F3261EB34E245C7B9
                                          APIs
                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00DF682C,00000004,00000000,00000000), ref: 00DBF953
                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00DF682C,00000004,00000000,00000000), ref: 00DFF3D1
                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00DF682C,00000004,00000000,00000000), ref: 00DFF454
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ShowWindow
                                          • String ID:
                                          • API String ID: 1268545403-0
                                          • Opcode ID: ef82c5d72437a36f79a19ff350f07854f6425f1c030476fcdcf132b60cee615a
                                          • Instruction ID: c058b4d714f19a033243a17e2d80f1d662fbbb20968227ee5cbb4f380600cbbf
                                          • Opcode Fuzzy Hash: ef82c5d72437a36f79a19ff350f07854f6425f1c030476fcdcf132b60cee615a
                                          • Instruction Fuzzy Hash: 4741F431608784FECF398B298C887BE7B92AF56314F19843DE58762560C672E884DF31
                                          APIs
                                          • DeleteObject.GDI32(00000000), ref: 00E32D1B
                                          • GetDC.USER32(00000000), ref: 00E32D23
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E32D2E
                                          • ReleaseDC.USER32(00000000,00000000), ref: 00E32D3A
                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00E32D76
                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00E32D87
                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00E35A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00E32DC2
                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00E32DE1
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                          • String ID:
                                          • API String ID: 3864802216-0
                                          • Opcode ID: 7310027319ed20b009089f2a57e6ffd4229bb31d1ccf621e69f7c67c70c8a7c0
                                          • Instruction ID: ac7ad831d62f4dd1c8c8d3686d5d0c2d0f63d74ec2152845ab436ef373a3922f
                                          • Opcode Fuzzy Hash: 7310027319ed20b009089f2a57e6ffd4229bb31d1ccf621e69f7c67c70c8a7c0
                                          • Instruction Fuzzy Hash: 33319C72201214BFEB218F51CC8AFEB3FA9EF49715F144055FE48BA291C6759C41CBA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _memcmp
                                          • String ID:
                                          • API String ID: 2931989736-0
                                          • Opcode ID: ae5836e34969c02f83db924d1f5c3521ff97eb9ab079dfbeff5af3ff1bd23b60
                                          • Instruction ID: 4feda979d296e9feb9c2d35ed657eb41afde6cb125e77c0ee1b212e3b80f2851
                                          • Opcode Fuzzy Hash: ae5836e34969c02f83db924d1f5c3521ff97eb9ab079dfbeff5af3ff1bd23b60
                                          • Instruction Fuzzy Hash: 0721C867A40B1AB7D2145510AE92FFB635CEE22388F442025FD047B5C2F722ED51CDB5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: NULL Pointer assignment$Not an Object type
                                          • API String ID: 0-572801152
                                          • Opcode ID: 43306b52b0f1eb7389504db6a9a21ab33b2299506b95127e0dc835c300632970
                                          • Instruction ID: 636f3c420d9395645a40bad0e6ce2e94939a0b00f9513671fb90614ca252c294
                                          • Opcode Fuzzy Hash: 43306b52b0f1eb7389504db6a9a21ab33b2299506b95127e0dc835c300632970
                                          • Instruction Fuzzy Hash: 28D1A072A0061A9FDF10CF98E984FAEB7B5BF48348F149069E915BB281D770DD45CBA0
                                          APIs
                                          • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00DE17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00DE15CE
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00DE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DE1651
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00DE17FB,?,00DE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DE16E4
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00DE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DE16FB
                                            • Part of subcall function 00DD3820: RtlAllocateHeap.NTDLL(00000000,?,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6,?,00DA1129), ref: 00DD3852
                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00DE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DE1777
                                          • __freea.LIBCMT ref: 00DE17A2
                                          • __freea.LIBCMT ref: 00DE17AE
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                          • String ID:
                                          • API String ID: 2829977744-0
                                          • Opcode ID: acf247e6bc501dbd3f3d2596ce470c6c399b68365dc77487252b3117ad1472e5
                                          • Instruction ID: 598b084f83059b2b8f43b6ea98720d2c72f8b463ca1f8c96fb511943299b62da
                                          • Opcode Fuzzy Hash: acf247e6bc501dbd3f3d2596ce470c6c399b68365dc77487252b3117ad1472e5
                                          • Instruction Fuzzy Hash: EF91B17AF002969ADB20AF66C881EEE7BB5EF49710F184659E846E7281D735CC44CB70
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit
                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                          • API String ID: 2610073882-625585964
                                          • Opcode ID: 6f1c4968912c4199c3d525f4e7f6e295138d03bacc4e7a142559e2a7b49a60ac
                                          • Instruction ID: 50c2403e4c78ace8eebe662f755d89ad1fbaefae3e8e9869629c2480c3af35c8
                                          • Opcode Fuzzy Hash: 6f1c4968912c4199c3d525f4e7f6e295138d03bacc4e7a142559e2a7b49a60ac
                                          • Instruction Fuzzy Hash: 199193B1A00229AFDF24CFA5D844FAEBBB8EF46714F10955AF515BB280D7709941CFA0
                                          APIs
                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00E1125C
                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00E11284
                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00E112A8
                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E112D8
                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E1135F
                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E113C4
                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E11430
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                          • String ID:
                                          • API String ID: 2550207440-0
                                          • Opcode ID: 35800117f51e5a332f1548f53b97c778780488f37790ca93eb657b7822a70bba
                                          • Instruction ID: f1c27b9fabeb18dbed1343841873474fcc27db779dbcf8e5b70ac51da2ee4942
                                          • Opcode Fuzzy Hash: 35800117f51e5a332f1548f53b97c778780488f37790ca93eb657b7822a70bba
                                          • Instruction Fuzzy Hash: DA91EF71A00219AFDB00DFA4D884BFEB7B5FF45714F1050A9EA51FB2A1D774A981CBA0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ObjectSelect$BeginCreatePath
                                          • String ID:
                                          • API String ID: 3225163088-0
                                          • Opcode ID: 749de3e54cf2f644800d5276b06c3b7c29d8d52838163cbe2fc538b36084fb8c
                                          • Instruction ID: 69232fc820396bb5e217f0bffa2bb310c842f996dc9dcab33515bdec32a7a502
                                          • Opcode Fuzzy Hash: 749de3e54cf2f644800d5276b06c3b7c29d8d52838163cbe2fc538b36084fb8c
                                          • Instruction Fuzzy Hash: 25911571940259EFCB14CFA9CC88AEEBBB8FF49320F148055E616B7251D674AA42CB70
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 00E2396B
                                          • CharUpperBuffW.USER32(?,?), ref: 00E23A7A
                                          • _wcslen.LIBCMT ref: 00E23A8A
                                          • VariantClear.OLEAUT32(?), ref: 00E23C1F
                                            • Part of subcall function 00E10CDF: VariantInit.OLEAUT32(00000000), ref: 00E10D1F
                                            • Part of subcall function 00E10CDF: VariantCopy.OLEAUT32(?,?), ref: 00E10D28
                                            • Part of subcall function 00E10CDF: VariantClear.OLEAUT32(?), ref: 00E10D34
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                          • API String ID: 4137639002-1221869570
                                          • Opcode ID: e4f8b1729138b2621600b50fb43c5ac0879e10b9f395896a47931c9230bed78f
                                          • Instruction ID: 7f85977e36b4f04f5f3d3d0c5ab97213835049011ed155d439ab648d6cf5e80e
                                          • Opcode Fuzzy Hash: e4f8b1729138b2621600b50fb43c5ac0879e10b9f395896a47931c9230bed78f
                                          • Instruction Fuzzy Hash: A19133746083159FC704EF24D48196AB7E5FB89314F14882EF88AA7351DB35EE45CFA2
                                          APIs
                                            • Part of subcall function 00E0000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?,?,?,00E0035E), ref: 00E0002B
                                            • Part of subcall function 00E0000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?,?), ref: 00E00046
                                            • Part of subcall function 00E0000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?,?), ref: 00E00054
                                            • Part of subcall function 00E0000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?), ref: 00E00064
                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00E24C51
                                          • _wcslen.LIBCMT ref: 00E24D59
                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00E24DCF
                                          • CoTaskMemFree.OLE32(?), ref: 00E24DDA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                          • String ID: NULL Pointer assignment
                                          • API String ID: 614568839-2785691316
                                          • Opcode ID: 9e520f6fbdff6ae4d7b0b35d7361fdac104b65fd50e21287c1530a5b63cd6982
                                          • Instruction ID: a4c71d60f98908684210f4ab28eeed26ab6b0910e35a5d11757c6451c7bebbcd
                                          • Opcode Fuzzy Hash: 9e520f6fbdff6ae4d7b0b35d7361fdac104b65fd50e21287c1530a5b63cd6982
                                          • Instruction Fuzzy Hash: DB91E5B1D002299FDB14DFA4D891AEEBBB9FB08314F108569E915BB291DB349A44CF60
                                          APIs
                                          • GetMenu.USER32(?), ref: 00E32183
                                          • GetMenuItemCount.USER32(00000000), ref: 00E321B5
                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00E321DD
                                          • _wcslen.LIBCMT ref: 00E32213
                                          • GetMenuItemID.USER32(?,?), ref: 00E3224D
                                          • GetSubMenu.USER32(?,?), ref: 00E3225B
                                            • Part of subcall function 00E03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E03A57
                                            • Part of subcall function 00E03A3D: GetCurrentThreadId.KERNEL32 ref: 00E03A5E
                                            • Part of subcall function 00E03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E025B3), ref: 00E03A65
                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E322E3
                                            • Part of subcall function 00E0E97B: Sleep.KERNEL32 ref: 00E0E9F3
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                          • String ID:
                                          • API String ID: 4196846111-0
                                          • Opcode ID: 93ed11f08b35f74bcf4db3cb85bc1fb32141b508d061af9e52dd0e80e9342258
                                          • Instruction ID: 4347fb6f5bf2bc984ad8bff65135d4f57d0a37dfe8bb285547a755eed7fd40d4
                                          • Opcode Fuzzy Hash: 93ed11f08b35f74bcf4db3cb85bc1fb32141b508d061af9e52dd0e80e9342258
                                          • Instruction Fuzzy Hash: E3718D35A00205AFCB10DF64C849AAEBBF5EF89324F14945DE956BB351DB34ED41CBA0
                                          APIs
                                          • GetParent.USER32(?), ref: 00E0AEF9
                                          • GetKeyboardState.USER32(?), ref: 00E0AF0E
                                          • SetKeyboardState.USER32(?), ref: 00E0AF6F
                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00E0AF9D
                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00E0AFBC
                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00E0AFFD
                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00E0B020
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$Parent
                                          • String ID:
                                          • API String ID: 87235514-0
                                          • Opcode ID: 07cafe238257e8c0aaf63d114a4f676d1351777ff2e51c36f53d1c7cd326ea27
                                          • Instruction ID: e1673238bf17e43629c9845d5472e2a1b2a6f4ca056641ed887b801bf63ba494
                                          • Opcode Fuzzy Hash: 07cafe238257e8c0aaf63d114a4f676d1351777ff2e51c36f53d1c7cd326ea27
                                          • Instruction Fuzzy Hash: 4851B2A06047DA7DFB368334C845BBABEE96B06308F0C9599E1D9A54D2C398A8C8D751
                                          APIs
                                          • GetParent.USER32(00000000), ref: 00E0AD19
                                          • GetKeyboardState.USER32(?), ref: 00E0AD2E
                                          • SetKeyboardState.USER32(?), ref: 00E0AD8F
                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00E0ADBB
                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00E0ADD8
                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00E0AE17
                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00E0AE38
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$Parent
                                          • String ID:
                                          • API String ID: 87235514-0
                                          • Opcode ID: a0ae601916703be5edef6c76788e8a02c6c7899c96f5dabc59ffdf02dfae4712
                                          • Instruction ID: d063caeae5b9fcdabdceb14da3ea569708cfd3cb28aa7a43b6aa80bf6f480537
                                          • Opcode Fuzzy Hash: a0ae601916703be5edef6c76788e8a02c6c7899c96f5dabc59ffdf02dfae4712
                                          • Instruction Fuzzy Hash: D351E3A15047D93DFB328334CC55BBABEE86B46308F0C9499E1D5668C2D294ECC9D762
                                          APIs
                                          • GetConsoleCP.KERNEL32(00DE3CD6,?,?,?,?,?,?,?,?,00DD5BA3,?,?,00DE3CD6,?,?), ref: 00DD5470
                                          • __fassign.LIBCMT ref: 00DD54EB
                                          • __fassign.LIBCMT ref: 00DD5506
                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00DE3CD6,00000005,00000000,00000000), ref: 00DD552C
                                          • WriteFile.KERNEL32(?,00DE3CD6,00000000,00DD5BA3,00000000,?,?,?,?,?,?,?,?,?,00DD5BA3,?), ref: 00DD554B
                                          • WriteFile.KERNEL32(?,?,00000001,00DD5BA3,00000000,?,?,?,?,?,?,?,?,?,00DD5BA3,?), ref: 00DD5584
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                          • String ID:
                                          • API String ID: 1324828854-0
                                          • Opcode ID: b7d8db60c340c08e8eb165e9e1e5dfc2577573e5afef702e51c3041ba3f36b8b
                                          • Instruction ID: 4a6fd77b6d6a6b18b4e3f670252b9d1bf0984b79ab2d24263efac108ba5de3b0
                                          • Opcode Fuzzy Hash: b7d8db60c340c08e8eb165e9e1e5dfc2577573e5afef702e51c3041ba3f36b8b
                                          • Instruction Fuzzy Hash: 7651AE70A00649AFDB11CFA8EC45AEEBBF9EF09300F14415AE555E7395D630DA81CB60
                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 00DC2D4B
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00DC2D53
                                          • _ValidateLocalCookies.LIBCMT ref: 00DC2DE1
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00DC2E0C
                                          • _ValidateLocalCookies.LIBCMT ref: 00DC2E61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: a7445edbf51ce3c6d2dbcd95f80d5f60b28baf17950d482fb67c520bb424c66a
                                          • Instruction ID: 778b62b473353002f5eb839eda02c4147b1226dc5b9ace40435a2ec5a37f627b
                                          • Opcode Fuzzy Hash: a7445edbf51ce3c6d2dbcd95f80d5f60b28baf17950d482fb67c520bb424c66a
                                          • Instruction Fuzzy Hash: 28418134A0020AABCF10DF68C845FAEBBA5FF55324F188159F9156B252DB31EA05CBF1
                                          APIs
                                            • Part of subcall function 00E2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E2307A
                                            • Part of subcall function 00E2304E: _wcslen.LIBCMT ref: 00E2309B
                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00E21112
                                          • WSAGetLastError.WSOCK32 ref: 00E21121
                                          • WSAGetLastError.WSOCK32 ref: 00E211C9
                                          • closesocket.WSOCK32(00000000), ref: 00E211F9
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                          • String ID:
                                          • API String ID: 2675159561-0
                                          • Opcode ID: dbca00127d6a34a2fb841c096f40a62c0c5bcf1e711ff291d654aa381fe98e20
                                          • Instruction ID: 52f669e3c085d3d66f8671a6c0333e4e57e2106a5fe5a72ca8badd0fa9c2fcb8
                                          • Opcode Fuzzy Hash: dbca00127d6a34a2fb841c096f40a62c0c5bcf1e711ff291d654aa381fe98e20
                                          • Instruction Fuzzy Hash: 6C411831601228AFDB109F24D844BA9BBE9FF85328F148099FD05BB291C770EE45CBE1
                                          APIs
                                            • Part of subcall function 00E0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E0CF22,?), ref: 00E0DDFD
                                            • Part of subcall function 00E0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E0CF22,?), ref: 00E0DE16
                                          • lstrcmpiW.KERNEL32(?,?), ref: 00E0CF45
                                          • MoveFileW.KERNEL32(?,?), ref: 00E0CF7F
                                          • _wcslen.LIBCMT ref: 00E0D005
                                          • _wcslen.LIBCMT ref: 00E0D01B
                                          • SHFileOperationW.SHELL32(?), ref: 00E0D061
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                          • String ID: \*.*
                                          • API String ID: 3164238972-1173974218
                                          • Opcode ID: a6bc33121154574e1e45a2b56559b4693feac309982d1cda25456ccbc2eb13ea
                                          • Instruction ID: f031cc98aa5e99ba9a4c7288b11c2e35c4d1dd625c87968f80e4485c4b51c5df
                                          • Opcode Fuzzy Hash: a6bc33121154574e1e45a2b56559b4693feac309982d1cda25456ccbc2eb13ea
                                          • Instruction Fuzzy Hash: BC4158B19452195FDF12EBA4DD81EDEB7F9EF04380F1010E6E505FB181EA34A688CB61
                                          APIs
                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E32E1C
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00E32E4F
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00E32E84
                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00E32EB6
                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00E32EE0
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00E32EF1
                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00E32F0B
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: LongWindow$MessageSend
                                          • String ID:
                                          • API String ID: 2178440468-0
                                          • Opcode ID: b46a722781154c4b8745fdf7825f7d36322940c19bdb8877edd057b954956666
                                          • Instruction ID: 30381024d6379854b9e2bb0e504514c500ff6fcea494283ebdbbedc80b65d1db
                                          • Opcode Fuzzy Hash: b46a722781154c4b8745fdf7825f7d36322940c19bdb8877edd057b954956666
                                          • Instruction Fuzzy Hash: 673128316042549FDB22CF1ADC8AF653BE0FB8AB14F1511A8FA44AF2B1CB71E844DB41
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E07769
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E0778F
                                          • SysAllocString.OLEAUT32(00000000), ref: 00E07792
                                          • SysAllocString.OLEAUT32(?), ref: 00E077B0
                                          • SysFreeString.OLEAUT32(?), ref: 00E077B9
                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00E077DE
                                          • SysAllocString.OLEAUT32(?), ref: 00E077EC
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                          • String ID:
                                          • API String ID: 3761583154-0
                                          • Opcode ID: 43c3477a590f6d0aefe4e37b663dcbac418683dc43dd30d0553096c258481771
                                          • Instruction ID: 4bb567fc0e5cec630d7fe5c8cd8be34ab4c9087d5ec0afa93fb722d1f9670b38
                                          • Opcode Fuzzy Hash: 43c3477a590f6d0aefe4e37b663dcbac418683dc43dd30d0553096c258481771
                                          • Instruction Fuzzy Hash: 6221A176A04219AFDB10DFA9CC88CBB77ACEB093A47148026BA55FB190D670EC85C760
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E07842
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E07868
                                          • SysAllocString.OLEAUT32(00000000), ref: 00E0786B
                                          • SysAllocString.OLEAUT32 ref: 00E0788C
                                          • SysFreeString.OLEAUT32 ref: 00E07895
                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00E078AF
                                          • SysAllocString.OLEAUT32(?), ref: 00E078BD
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                          • String ID:
                                          • API String ID: 3761583154-0
                                          • Opcode ID: f4ce6d6d92dcdb6f2cabeb1e76fd1d8d13c53f1c6617df2d782869fbb0a39b6f
                                          • Instruction ID: b288ee382fdfd823d059b5578e8634318ee0365ebfe01f899b2ca2b69d8ef282
                                          • Opcode Fuzzy Hash: f4ce6d6d92dcdb6f2cabeb1e76fd1d8d13c53f1c6617df2d782869fbb0a39b6f
                                          • Instruction Fuzzy Hash: 75219232A04218AFDB149FA9DC8CDBA77ACEB083647108125F955EB2A1D670EC85CB74
                                          APIs
                                          • GetStdHandle.KERNEL32(0000000C), ref: 00E104F2
                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E1052E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CreateHandlePipe
                                          • String ID: nul
                                          • API String ID: 1424370930-2873401336
                                          • Opcode ID: 3daeaaff547eb69c9ab893a29c3aae6515085118ed3c748fba0199a98fbcd399
                                          • Instruction ID: 4aaf4687e1a627723f5fa9157a6c3d59741fef9767d0496622c792699c59ff40
                                          • Opcode Fuzzy Hash: 3daeaaff547eb69c9ab893a29c3aae6515085118ed3c748fba0199a98fbcd399
                                          • Instruction Fuzzy Hash: 1C212C75500309AFDB309F69D848ADA7BF5AF44768F205A19E8A1F62E0D7B0D9D4CF20
                                          APIs
                                          • GetStdHandle.KERNEL32(000000F6), ref: 00E105C6
                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E10601
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CreateHandlePipe
                                          • String ID: nul
                                          • API String ID: 1424370930-2873401336
                                          • Opcode ID: 0adcceb5a0e3f783f22e2dac33e59c3189a848958f7ca74da6f1833d5958a5d7
                                          • Instruction ID: 1301f7935bfdcc9f99133dab5ff750b27307313ede89e4be73ef2ddb311d1ef2
                                          • Opcode Fuzzy Hash: 0adcceb5a0e3f783f22e2dac33e59c3189a848958f7ca74da6f1833d5958a5d7
                                          • Instruction Fuzzy Hash: C92151755003059FDB209F699C48ADAB7E4AF95724F205A19F8B1F72E0D7F099E0CB60
                                          APIs
                                            • Part of subcall function 00DA600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00DA604C
                                            • Part of subcall function 00DA600E: GetStockObject.GDI32(00000011), ref: 00DA6060
                                            • Part of subcall function 00DA600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA606A
                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00E34112
                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00E3411F
                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E3412A
                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00E34139
                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00E34145
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$CreateObjectStockWindow
                                          • String ID: Msctls_Progress32
                                          • API String ID: 1025951953-3636473452
                                          • Opcode ID: c42877c025522b7dbbe392b988444fb32998f9670cfa49faee5142186284917b
                                          • Instruction ID: 8b47d2cee95e71f6f0afaadcd873ff39a640bc33afef538fdb849d5aff33e178
                                          • Opcode Fuzzy Hash: c42877c025522b7dbbe392b988444fb32998f9670cfa49faee5142186284917b
                                          • Instruction Fuzzy Hash: 881190B2140219BEEF118E64CC86EE77FADEF08798F015111FA18B2090CA72DC61DBA4
                                          APIs
                                            • Part of subcall function 00DDD7A3: _free.LIBCMT ref: 00DDD7CC
                                          • _free.LIBCMT ref: 00DDD82D
                                            • Part of subcall function 00DD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000), ref: 00DD29DE
                                            • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                                          • _free.LIBCMT ref: 00DDD838
                                          • _free.LIBCMT ref: 00DDD843
                                          • _free.LIBCMT ref: 00DDD897
                                          • _free.LIBCMT ref: 00DDD8A2
                                          • _free.LIBCMT ref: 00DDD8AD
                                          • _free.LIBCMT ref: 00DDD8B8
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                          • Instruction ID: 34a6ddbd800b5b5fb21c6e7e8ef0f9a65db9229ca9f0862d04dfa91f9c318e9d
                                          • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                          • Instruction Fuzzy Hash: FD112971580B04BADA31BFB0CC46FDB7B9DEF10700F400826B29EA6292DB75A5059A70
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00E0DA74
                                          • LoadStringW.USER32(00000000), ref: 00E0DA7B
                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00E0DA91
                                          • LoadStringW.USER32(00000000), ref: 00E0DA98
                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E0DADC
                                          Strings
                                          • %s (%d) : ==> %s: %s %s, xrefs: 00E0DAB9
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString$Message
                                          • String ID: %s (%d) : ==> %s: %s %s
                                          • API String ID: 4072794657-3128320259
                                          • Opcode ID: 836b4c79c6b6522373f6ef8cfaee8bebe5efb830618a85352ba41db2224f720f
                                          • Instruction ID: 2f6b50a392f14208ea47b297e9ab47da16c500a168333c1a70a53aa9d7537eb8
                                          • Opcode Fuzzy Hash: 836b4c79c6b6522373f6ef8cfaee8bebe5efb830618a85352ba41db2224f720f
                                          • Instruction Fuzzy Hash: 90014FF25002087FE7109BA19D8DEE6766CE708701F501496B746F2081EA74DE888F74
                                          APIs
                                          • InterlockedExchange.KERNEL32(012BEBD0,012BEBD0), ref: 00E1097B
                                          • EnterCriticalSection.KERNEL32(012BEBB0,00000000), ref: 00E1098D
                                          • TerminateThread.KERNEL32(00000000,000001F6), ref: 00E1099B
                                          • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00E109A9
                                          • CloseHandle.KERNEL32(00000000), ref: 00E109B8
                                          • InterlockedExchange.KERNEL32(012BEBD0,000001F6), ref: 00E109C8
                                          • LeaveCriticalSection.KERNEL32(012BEBB0), ref: 00E109CF
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                          • String ID:
                                          • API String ID: 3495660284-0
                                          • Opcode ID: 8041ec63efdf05dd96a93aea411438c5f5ea28115bf1b3755e987f33a054c5d4
                                          • Instruction ID: 1f4bffd487e5bbc5fa145bfa47e1850a17bd0de82ec440cb42d3f90b08a8c5e7
                                          • Opcode Fuzzy Hash: 8041ec63efdf05dd96a93aea411438c5f5ea28115bf1b3755e987f33a054c5d4
                                          • Instruction Fuzzy Hash: 0EF01D31442906AFD7415B95EE8CAD67A35BF45702F502015F101708B1C7B5D4B9CF90
                                          APIs
                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00E21DC0
                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00E21DE1
                                          • WSAGetLastError.WSOCK32 ref: 00E21DF2
                                          • htons.WSOCK32(?,?,?,?,?), ref: 00E21EDB
                                          • inet_ntoa.WSOCK32(?), ref: 00E21E8C
                                            • Part of subcall function 00E039E8: _strlen.LIBCMT ref: 00E039F2
                                            • Part of subcall function 00E23224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00E1EC0C), ref: 00E23240
                                          • _strlen.LIBCMT ref: 00E21F35
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                          • String ID:
                                          • API String ID: 3203458085-0
                                          • Opcode ID: 3ef2c63099117aa1c69eb41502cd0f53d8e589a0434fb1748886cf796639f64a
                                          • Instruction ID: 03c543f1924d99f49c58e6eeffa03ec2a65f8ac2b4de06a2a8a91774e93bcf61
                                          • Opcode Fuzzy Hash: 3ef2c63099117aa1c69eb41502cd0f53d8e589a0434fb1748886cf796639f64a
                                          • Instruction Fuzzy Hash: E8B12630604350AFD324DF24D895E2A7BE5EF95318F58958CF4566B2E2CB31EE42CBA1
                                          APIs
                                          • __allrem.LIBCMT ref: 00DD00BA
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DD00D6
                                          • __allrem.LIBCMT ref: 00DD00ED
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DD010B
                                          • __allrem.LIBCMT ref: 00DD0122
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DD0140
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                          • String ID:
                                          • API String ID: 1992179935-0
                                          • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                          • Instruction ID: d53fb87b30bf0cbf526241e26ffa89a1ce5ff171c9330a00ec1aca705a7218dc
                                          • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                          • Instruction Fuzzy Hash: 7181E472A00706ABE720AB69CC41BAA77E9EF81764F28453FF551D7381E770D9048BB0
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00DC82D9,00DC82D9,?,?,?,00DD644F,00000001,00000001,8BE85006), ref: 00DD6258
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00DD644F,00000001,00000001,8BE85006,?,?,?), ref: 00DD62DE
                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00DD63D8
                                          • __freea.LIBCMT ref: 00DD63E5
                                            • Part of subcall function 00DD3820: RtlAllocateHeap.NTDLL(00000000,?,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6,?,00DA1129), ref: 00DD3852
                                          • __freea.LIBCMT ref: 00DD63EE
                                          • __freea.LIBCMT ref: 00DD6413
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                          • String ID:
                                          • API String ID: 1414292761-0
                                          • Opcode ID: 2599773f9e4d2b62bd739d0cf590e78a00a170a7604f702aea0c40b55ba3dc9c
                                          • Instruction ID: 9880a1d95afdb09dde2b385da6e3ab66384dded689bc1d82a644ef6eb89052f1
                                          • Opcode Fuzzy Hash: 2599773f9e4d2b62bd739d0cf590e78a00a170a7604f702aea0c40b55ba3dc9c
                                          • Instruction Fuzzy Hash: 5B51E172600216AFDB258FA4DC81EBF7BA9EB44750F1D462AFC05D6241DB34DC54D6B0
                                          APIs
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                            • Part of subcall function 00E2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E2B6AE,?,?), ref: 00E2C9B5
                                            • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2C9F1
                                            • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA68
                                            • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA9E
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E2BCCA
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E2BD25
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E2BD6A
                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00E2BD99
                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00E2BDF3
                                          • RegCloseKey.ADVAPI32(?), ref: 00E2BDFF
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                          • String ID:
                                          • API String ID: 1120388591-0
                                          • Opcode ID: a289cf25d64b6088a4ee74663a08b27b5325d7622e5d5535a652d00742daea8f
                                          • Instruction ID: ed723dd7f03a379167a9de744f1486f355cad374bc10eccf1f707368313fade3
                                          • Opcode Fuzzy Hash: a289cf25d64b6088a4ee74663a08b27b5325d7622e5d5535a652d00742daea8f
                                          • Instruction Fuzzy Hash: B781DF30208241EFC714DF24D895E6ABBE5FF85308F14895CF45A9B2A2DB31ED45CBA2
                                          APIs
                                          • VariantInit.OLEAUT32(00000035), ref: 00DFF7B9
                                          • SysAllocString.OLEAUT32(00000001), ref: 00DFF860
                                          • VariantCopy.OLEAUT32(00DFFA64,00000000), ref: 00DFF889
                                          • VariantClear.OLEAUT32(00DFFA64), ref: 00DFF8AD
                                          • VariantCopy.OLEAUT32(00DFFA64,00000000), ref: 00DFF8B1
                                          • VariantClear.OLEAUT32(?), ref: 00DFF8BB
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Variant$ClearCopy$AllocInitString
                                          • String ID:
                                          • API String ID: 3859894641-0
                                          • Opcode ID: 6c2749f73c476f19542f7efda93868804e0041b8e5755c4ae9071585062e1e60
                                          • Instruction ID: 2fd2fda772b99c574f0f0ece1f6a8563ed9b8f4fc448efe257e36fad62f4e594
                                          • Opcode Fuzzy Hash: 6c2749f73c476f19542f7efda93868804e0041b8e5755c4ae9071585062e1e60
                                          • Instruction Fuzzy Hash: 0851C636500318BACF20AB65D895B3DB3A4EF45710B25D467EA06EF292DBB0CC40DB76
                                          APIs
                                            • Part of subcall function 00DA7620: _wcslen.LIBCMT ref: 00DA7625
                                            • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00E194E5
                                          • _wcslen.LIBCMT ref: 00E19506
                                          • _wcslen.LIBCMT ref: 00E1952D
                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00E19585
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$FileName$OpenSave
                                          • String ID: X
                                          • API String ID: 83654149-3081909835
                                          • Opcode ID: 06610e544e2f8496eaeb3a1a0a7a8d37d01e8607a2f78f044cc177ce33f7e0b1
                                          • Instruction ID: 59e74ef18d93b346b1749562848ded836db835c57ad5abc06c7d44619fe4cf2b
                                          • Opcode Fuzzy Hash: 06610e544e2f8496eaeb3a1a0a7a8d37d01e8607a2f78f044cc177ce33f7e0b1
                                          • Instruction Fuzzy Hash: 0AE190315083108FC714DF24C891AAAB7E5FF85314F14996DF899AB2A2DB30DD45CBB2
                                          APIs
                                            • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                                          • BeginPaint.USER32(?,?,?), ref: 00DB9241
                                          • GetWindowRect.USER32(?,?), ref: 00DB92A5
                                          • ScreenToClient.USER32(?,?), ref: 00DB92C2
                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00DB92D3
                                          • EndPaint.USER32(?,?,?,?,?), ref: 00DB9321
                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00DF71EA
                                            • Part of subcall function 00DB9339: BeginPath.GDI32(00000000), ref: 00DB9357
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                          • String ID:
                                          • API String ID: 3050599898-0
                                          • Opcode ID: 170d3e5311c3418612c828214c6cce4e41de63e259b830e34271dd7c25030f5e
                                          • Instruction ID: f22f88fc3290f027ddce217cecb83f225970c4be4f6ba7449fff8ee081a62e00
                                          • Opcode Fuzzy Hash: 170d3e5311c3418612c828214c6cce4e41de63e259b830e34271dd7c25030f5e
                                          • Instruction Fuzzy Hash: 7341BD30104344EFD711DF29C899FFABBB8EB86720F140269FA95A62A1C7309849DB71
                                          APIs
                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00E1080C
                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00E10847
                                          • EnterCriticalSection.KERNEL32(?), ref: 00E10863
                                          • LeaveCriticalSection.KERNEL32(?), ref: 00E108DC
                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00E108F3
                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E10921
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                          • String ID:
                                          • API String ID: 3368777196-0
                                          • Opcode ID: 2d9449c9b42498e5443d1e8775679ec06dc4292d3f2307a3bd21942ae0f350d8
                                          • Instruction ID: 03576be695183d12f14313fb22d506063399f824948db6ceb7ab7dd9050fea1c
                                          • Opcode Fuzzy Hash: 2d9449c9b42498e5443d1e8775679ec06dc4292d3f2307a3bd21942ae0f350d8
                                          • Instruction Fuzzy Hash: AC415971900205EFDF14AF65DC85AAA7BB9FF44314F1440A9E900AA296D770DEA4DBB0
                                          APIs
                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00DFF3AB,00000000,?,?,00000000,?,00DF682C,00000004,00000000,00000000), ref: 00E3824C
                                          • EnableWindow.USER32(00000000,00000000), ref: 00E38272
                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00E382D1
                                          • ShowWindow.USER32(00000000,00000004), ref: 00E382E5
                                          • EnableWindow.USER32(00000000,00000001), ref: 00E3830B
                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00E3832F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$Show$Enable$MessageSend
                                          • String ID:
                                          • API String ID: 642888154-0
                                          • Opcode ID: 59414346d7df28698929fae208f78c35a8601014e56df6c35f7665aacaaecfda
                                          • Instruction ID: 9af33d0f6c4e4e8f83b52efe8afec91442cb1da870cacb45184d89240cb33dae
                                          • Opcode Fuzzy Hash: 59414346d7df28698929fae208f78c35a8601014e56df6c35f7665aacaaecfda
                                          • Instruction Fuzzy Hash: 5541A430601744EFDB11CF19C99DBA57FE0BB45718F1861A9FA487B272CB32A845CB51
                                          APIs
                                          • IsWindowVisible.USER32(?), ref: 00E04C95
                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00E04CB2
                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00E04CEA
                                          • _wcslen.LIBCMT ref: 00E04D08
                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00E04D10
                                          • _wcsstr.LIBVCRUNTIME ref: 00E04D1A
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                          • String ID:
                                          • API String ID: 72514467-0
                                          • Opcode ID: 62eb6ab21a5cf549a1a912f3001293da42cc86b0a4800443068f5e1419edeed8
                                          • Instruction ID: 7c9ea2e6664a6d169b5983db3e7301a331e23f54cd887c644ff9e67d157e6ce3
                                          • Opcode Fuzzy Hash: 62eb6ab21a5cf549a1a912f3001293da42cc86b0a4800443068f5e1419edeed8
                                          • Instruction Fuzzy Hash: C621F5F1204204BBFB155B259D4AE7B7B98DF45754F10502DF905EA1D1DA71CC4086B1
                                          APIs
                                            • Part of subcall function 00DA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DA3A97,?,?,00DA2E7F,?,?,?,00000000), ref: 00DA3AC2
                                          • _wcslen.LIBCMT ref: 00E1587B
                                          • CoInitialize.OLE32(00000000), ref: 00E15995
                                          • CoCreateInstance.OLE32(00E3FCF8,00000000,00000001,00E3FB68,?), ref: 00E159AE
                                          • CoUninitialize.OLE32 ref: 00E159CC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                          • String ID: .lnk
                                          • API String ID: 3172280962-24824748
                                          • Opcode ID: 2907829b4a90113703d09ddc3eb12561f52bba69dcfc672bbb340567e63d7714
                                          • Instruction ID: 3b6d4634fb50eb93588df2274a02017ce26189aa9bd74b3083cfd8cc68ef9628
                                          • Opcode Fuzzy Hash: 2907829b4a90113703d09ddc3eb12561f52bba69dcfc672bbb340567e63d7714
                                          • Instruction Fuzzy Hash: 0DD15472608701DFC714DF24C480AAABBE1EFC9714F14885DF899AB261D731ED85CBA2
                                          APIs
                                            • Part of subcall function 00E00FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E00FCA
                                            • Part of subcall function 00E00FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E00FD6
                                            • Part of subcall function 00E00FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E00FE5
                                            • Part of subcall function 00E00FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E00FEC
                                            • Part of subcall function 00E00FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E01002
                                          • GetLengthSid.ADVAPI32(?,00000000,00E01335), ref: 00E017AE
                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00E017BA
                                          • HeapAlloc.KERNEL32(00000000), ref: 00E017C1
                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00E017DA
                                          • GetProcessHeap.KERNEL32(00000000,00000000,00E01335), ref: 00E017EE
                                          • HeapFree.KERNEL32(00000000), ref: 00E017F5
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                          • String ID:
                                          • API String ID: 3008561057-0
                                          • Opcode ID: 4d391a0bc708255c2442e97d3fba7970d03aa9b4e3d70ae0a8e664b6a1e29918
                                          • Instruction ID: 18a5985db83f7f2d6d82febe0966ea8dcb265aa047d98966515cdfde992b6eac
                                          • Opcode Fuzzy Hash: 4d391a0bc708255c2442e97d3fba7970d03aa9b4e3d70ae0a8e664b6a1e29918
                                          • Instruction Fuzzy Hash: E411E131505209FFDB148FA4CC48BAE7BF8EB46319F244059F481BB150C732D984DB60
                                          APIs
                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00E014FF
                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00E01506
                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00E01515
                                          • CloseHandle.KERNEL32(00000004), ref: 00E01520
                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E0154F
                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00E01563
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                          • String ID:
                                          • API String ID: 1413079979-0
                                          • Opcode ID: 454cc8edc22aa337cb6f3bbbee4838955df49a618ae4d0fd87f9b0caec0acae5
                                          • Instruction ID: 4dc2847a077aa8d61d47ac260a9b7ca7c0d9dd069fc122962933a09dad176146
                                          • Opcode Fuzzy Hash: 454cc8edc22aa337cb6f3bbbee4838955df49a618ae4d0fd87f9b0caec0acae5
                                          • Instruction Fuzzy Hash: 4C11567250020DAFDF118FA8DD49BDE7BA9EF48748F154065FA05B60A0C371CEA8DB60
                                          APIs
                                          • GetLastError.KERNEL32(?,?,00DC3379,00DC2FE5), ref: 00DC3390
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00DC339E
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DC33B7
                                          • SetLastError.KERNEL32(00000000,?,00DC3379,00DC2FE5), ref: 00DC3409
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: ae3560d6de2e68d3fa6f33017f88adaa4b447feda410e5a1e7f1bcc59885594e
                                          • Instruction ID: cbda732ffc9b2abafd46c943227aa4e26a62ad46a22f28084f0da6c8a5ca91d5
                                          • Opcode Fuzzy Hash: ae3560d6de2e68d3fa6f33017f88adaa4b447feda410e5a1e7f1bcc59885594e
                                          • Instruction Fuzzy Hash: 8701283220C313BEAA142775BC95F672A54DB053B9330832DF410A31F0EF518D0556B4
                                          APIs
                                          • GetLastError.KERNEL32(?,?,00DD5686,00DE3CD6,?,00000000,?,00DD5B6A,?,?,?,?,?,00DCE6D1,?,00E68A48), ref: 00DD2D78
                                          • _free.LIBCMT ref: 00DD2DAB
                                          • _free.LIBCMT ref: 00DD2DD3
                                          • SetLastError.KERNEL32(00000000,?,?,?,?,00DCE6D1,?,00E68A48,00000010,00DA4F4A,?,?,00000000,00DE3CD6), ref: 00DD2DE0
                                          • SetLastError.KERNEL32(00000000,?,?,?,?,00DCE6D1,?,00E68A48,00000010,00DA4F4A,?,?,00000000,00DE3CD6), ref: 00DD2DEC
                                          • _abort.LIBCMT ref: 00DD2DF2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free$_abort
                                          • String ID:
                                          • API String ID: 3160817290-0
                                          • Opcode ID: 737a28d6ca6e1208ea8fd20291d9fd2894a10c52fde37f3f4bf3afa50023314b
                                          • Instruction ID: c13737938cfab4b9a6b1c7ad1a773962a8e50b23377f2b36bebc55da5128b94d
                                          • Opcode Fuzzy Hash: 737a28d6ca6e1208ea8fd20291d9fd2894a10c52fde37f3f4bf3afa50023314b
                                          • Instruction Fuzzy Hash: DEF0A9315456006BC22227757C0AA3B2966EBE27B1F394417F464B2391EF64C80552B1
                                          APIs
                                            • Part of subcall function 00DB9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DB9693
                                            • Part of subcall function 00DB9639: SelectObject.GDI32(?,00000000), ref: 00DB96A2
                                            • Part of subcall function 00DB9639: BeginPath.GDI32(?), ref: 00DB96B9
                                            • Part of subcall function 00DB9639: SelectObject.GDI32(?,00000000), ref: 00DB96E2
                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00E38A4E
                                          • LineTo.GDI32(?,00000003,00000000), ref: 00E38A62
                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00E38A70
                                          • LineTo.GDI32(?,00000000,00000003), ref: 00E38A80
                                          • EndPath.GDI32(?), ref: 00E38A90
                                          • StrokePath.GDI32(?), ref: 00E38AA0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                          • String ID:
                                          • API String ID: 43455801-0
                                          • Opcode ID: 5be73592471570d585094dafc81c33cbff41d3e202fe2dddb69b848a798f3f5b
                                          • Instruction ID: a4f34f852597fffc5b3951c169663f841a7d5d7025998b0203c344445fb89af1
                                          • Opcode Fuzzy Hash: 5be73592471570d585094dafc81c33cbff41d3e202fe2dddb69b848a798f3f5b
                                          • Instruction Fuzzy Hash: 30111B7600024CFFDF129F95DC88EAA7F6CEB08394F108052FA19AA1A1C7719D59DFA0
                                          APIs
                                          • GetDC.USER32(00000000), ref: 00E05218
                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00E05229
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E05230
                                          • ReleaseDC.USER32(00000000,00000000), ref: 00E05238
                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00E0524F
                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00E05261
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CapsDevice$Release
                                          • String ID:
                                          • API String ID: 1035833867-0
                                          • Opcode ID: 190d8deacec6c0d4c332e476c89b2def59d1b42334a9c6fe362044f8ea3ce34a
                                          • Instruction ID: 303d02c3b8c5bbc9d4f9273cc847c69133b28064ae6e4c8f3a7e4fcf1857dfe7
                                          • Opcode Fuzzy Hash: 190d8deacec6c0d4c332e476c89b2def59d1b42334a9c6fe362044f8ea3ce34a
                                          • Instruction Fuzzy Hash: 0D018F76A00709BFEB109BA69C49A5EBFB8EF48751F144066FA04F7290D670D804CFA0
                                          APIs
                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DA1BF4
                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00DA1BFC
                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DA1C07
                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DA1C12
                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00DA1C1A
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DA1C22
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Virtual
                                          • String ID:
                                          • API String ID: 4278518827-0
                                          • Opcode ID: 47717f7934b72365e5ee47f23fb7cd8ad52dc942c18805c4fc6fc51235df21fd
                                          • Instruction ID: d2305cb3d33a47d1f738c28f8c01394d7520ed5a6e1a200b740b9e1c6feea484
                                          • Opcode Fuzzy Hash: 47717f7934b72365e5ee47f23fb7cd8ad52dc942c18805c4fc6fc51235df21fd
                                          • Instruction Fuzzy Hash: 17016CB09027597DE3008F5A8C85B52FFA8FF19754F00411B915C47941C7F5A864CBE5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00E0EB30
                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00E0EB46
                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00E0EB55
                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E0EB64
                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E0EB6E
                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E0EB75
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                          • String ID:
                                          • API String ID: 839392675-0
                                          • Opcode ID: 6b904fd67bd748462ee9a3396b604ca982e7d2b63472db2977c3a498eae6c4cb
                                          • Instruction ID: 3222627dfc763612b099e535456f98a847a24e95c3bd3724297298b2c0b0fbf0
                                          • Opcode Fuzzy Hash: 6b904fd67bd748462ee9a3396b604ca982e7d2b63472db2977c3a498eae6c4cb
                                          • Instruction Fuzzy Hash: 89F01772241158BFE6215B639C0EEAB3E7CEBCAF11F104158F602F119196A09A059BB5
                                          APIs
                                          • GetClientRect.USER32(?), ref: 00DF7452
                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 00DF7469
                                          • GetWindowDC.USER32(?), ref: 00DF7475
                                          • GetPixel.GDI32(00000000,?,?), ref: 00DF7484
                                          • ReleaseDC.USER32(?,00000000), ref: 00DF7496
                                          • GetSysColor.USER32(00000005), ref: 00DF74B0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                          • String ID:
                                          • API String ID: 272304278-0
                                          • Opcode ID: 5f24381f511e4b6ba2677215f58a072971adca29ed046b07ed3526b152d94d2a
                                          • Instruction ID: 77f486e2b9d6e25c08edd368246319d334b7ae7dfa017870fb565e8a485ef397
                                          • Opcode Fuzzy Hash: 5f24381f511e4b6ba2677215f58a072971adca29ed046b07ed3526b152d94d2a
                                          • Instruction Fuzzy Hash: F7018B31400209FFEB105F65DC0DBEA7FB5FB04311F254060FA1AB20A0CB319E55AB61
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E0187F
                                          • UnloadUserProfile.USERENV(?,?), ref: 00E0188B
                                          • CloseHandle.KERNEL32(?), ref: 00E01894
                                          • CloseHandle.KERNEL32(?), ref: 00E0189C
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00E018A5
                                          • HeapFree.KERNEL32(00000000), ref: 00E018AC
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                          • String ID:
                                          • API String ID: 146765662-0
                                          • Opcode ID: bb7f32828fe83df61089914bf9ba0f5a5732dba465f6026e6a44dee2075dea3f
                                          • Instruction ID: 8b4e0d071d753abbea10839d440e398033388bbdc5be4da5a8df31f2ebdfb8ca
                                          • Opcode Fuzzy Hash: bb7f32828fe83df61089914bf9ba0f5a5732dba465f6026e6a44dee2075dea3f
                                          • Instruction Fuzzy Hash: F2E0C236004109BFDA015BA2ED0C90ABF39FB49B22B218221F225B1071CB329474EB50
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 00DABEB3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: D%$D%$D%$D%
                                          • API String ID: 1385522511-2722557190
                                          • Opcode ID: c7db29b89d633be61e0e4b293d6748c8c9d0a7f05a4f591e629d7dc70612173a
                                          • Instruction ID: 92cfa59a6c6aa14a4362b951c65d77f48a16c51eee60b1aed8b47d04db6f0e89
                                          • Opcode Fuzzy Hash: c7db29b89d633be61e0e4b293d6748c8c9d0a7f05a4f591e629d7dc70612173a
                                          • Instruction Fuzzy Hash: 34912D75A00206DFCB14CF69C091AA9B7F1FF5A320F24815ED586AB352D731ED82DBA0
                                          APIs
                                            • Part of subcall function 00DA7620: _wcslen.LIBCMT ref: 00DA7625
                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E0C6EE
                                          • _wcslen.LIBCMT ref: 00E0C735
                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E0C79C
                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00E0C7CA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info_wcslen$Default
                                          • String ID: 0
                                          • API String ID: 1227352736-4108050209
                                          • Opcode ID: e40b4473b82f23aa5d61894f1df27e79e1e91f3a4fe9bc6b240162c382be68ca
                                          • Instruction ID: c00a6c18b0db4c150a45af6c9ec4470bafb112f2bba54dd9ec331eed1896a907
                                          • Opcode Fuzzy Hash: e40b4473b82f23aa5d61894f1df27e79e1e91f3a4fe9bc6b240162c382be68ca
                                          • Instruction Fuzzy Hash: F451C4716043019BD7149F38D845BAA77E4EF89718F28272EF595F31D0DB70D9848B62
                                          APIs
                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00E2AEA3
                                            • Part of subcall function 00DA7620: _wcslen.LIBCMT ref: 00DA7625
                                          • GetProcessId.KERNEL32(00000000), ref: 00E2AF38
                                          • CloseHandle.KERNEL32(00000000), ref: 00E2AF67
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                          • String ID: <$@
                                          • API String ID: 146682121-1426351568
                                          • Opcode ID: a85beca7040d72af91f8dde3b4a1ed3ef6e5970f0be0157bf0312786c1bbf81b
                                          • Instruction ID: d9e8c38a55a67dd911e680b31736ea95d6ad797dcda3ff491e3313e11e502e28
                                          • Opcode Fuzzy Hash: a85beca7040d72af91f8dde3b4a1ed3ef6e5970f0be0157bf0312786c1bbf81b
                                          • Instruction Fuzzy Hash: 78717F71A00625DFCB14EF54D484A9EBBF0FF09314F0984A9E856AB392C774ED45CBA1
                                          APIs
                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00E07206
                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00E0723C
                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00E0724D
                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00E072CF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                          • String ID: DllGetClassObject
                                          • API String ID: 753597075-1075368562
                                          • Opcode ID: d872a4d60f689cc4f3d9dd5d517d4bf94a43e5ef03505203457dde7319e94d2b
                                          • Instruction ID: c0fb258f981f0f1b48117aa090397255de5ad74dec8a45a75f6aa71717c76ef1
                                          • Opcode Fuzzy Hash: d872a4d60f689cc4f3d9dd5d517d4bf94a43e5ef03505203457dde7319e94d2b
                                          • Instruction Fuzzy Hash: F54181B1A04204EFDB15CF54C884A9A7FB9EF44314F2590A9BD45BF25AD7B0ED84CBA0
                                          APIs
                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00E32F8D
                                          • LoadLibraryW.KERNEL32(?), ref: 00E32F94
                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00E32FA9
                                          • DestroyWindow.USER32(?), ref: 00E32FB1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                          • String ID: SysAnimate32
                                          • API String ID: 3529120543-1011021900
                                          • Opcode ID: 8829b6dc96caf47b51922466b906550150ac3bec5c852024ff091b2d89bc56fc
                                          • Instruction ID: c2ea3aedbf39cc8416811698c286082e82d59f373a77bad958a03283c41f1f49
                                          • Opcode Fuzzy Hash: 8829b6dc96caf47b51922466b906550150ac3bec5c852024ff091b2d89bc56fc
                                          • Instruction Fuzzy Hash: 31218B71204209AFEB104F649C89EBB7BB9EB59368F10621CFA90B2190D671DC91D760
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00DC4D1E,00DD28E9,?,00DC4CBE,00DD28E9,00E688B8,0000000C,00DC4E15,00DD28E9,00000002), ref: 00DC4D8D
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00DC4DA0
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00DC4D1E,00DD28E9,?,00DC4CBE,00DD28E9,00E688B8,0000000C,00DC4E15,00DD28E9,00000002,00000000), ref: 00DC4DC3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: 3f3350fd7278cf10d66f52635b26e59756c7c826aead2739398e380e306ea27f
                                          • Instruction ID: a924ed074ad6a4a68c91306ca583a136cd352f4772a3770edd59e9f6745353e9
                                          • Opcode Fuzzy Hash: 3f3350fd7278cf10d66f52635b26e59756c7c826aead2739398e380e306ea27f
                                          • Instruction Fuzzy Hash: BAF03C35A40209BFDB11AF91DC4DBAEBFB5EF44751F1401A9E90AB2260CB709A44DBA1
                                          APIs
                                          • LoadLibraryA.KERNEL32 ref: 00DFD3AD
                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00DFD3BF
                                          • FreeLibrary.KERNEL32(00000000), ref: 00DFD3E5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Library$AddressFreeLoadProc
                                          • String ID: GetSystemWow64DirectoryW$X64
                                          • API String ID: 145871493-2590602151
                                          • Opcode ID: e67ee73b94851f06a84802a8f19677a62224b202138ce702ee11e67a962c2ac0
                                          • Instruction ID: 2ad04520586b5d4272f08c85db852926f3bed565f1e9d0de087e0128970fafed
                                          • Opcode Fuzzy Hash: e67ee73b94851f06a84802a8f19677a62224b202138ce702ee11e67a962c2ac0
                                          • Instruction Fuzzy Hash: 9EF020354066289BE7302B108C0897D3A63AF00B01B6BD098EB82F2104DB20CC44A7FB
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DA4EDD,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4E9C
                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00DA4EAE
                                          • FreeLibrary.KERNEL32(00000000,?,?,00DA4EDD,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4EC0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Library$AddressFreeLoadProc
                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                          • API String ID: 145871493-3689287502
                                          • Opcode ID: f21e72a2fe851eba3cde6533d01cf1f42236d5016347d303c58955ab2cb4f94c
                                          • Instruction ID: 349fb2e4301625cfd8466616ffb47df6a155abf8d0beacedb7c249bc5ea665e3
                                          • Opcode Fuzzy Hash: f21e72a2fe851eba3cde6533d01cf1f42236d5016347d303c58955ab2cb4f94c
                                          • Instruction Fuzzy Hash: CCE0E636A026225F922117267C1DA5B6964AFC2B62B190115FD05F2151DBA4CE0596F1
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DE3CDE,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4E62
                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00DA4E74
                                          • FreeLibrary.KERNEL32(00000000,?,?,00DE3CDE,?,00E71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DA4E87
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Library$AddressFreeLoadProc
                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                          • API String ID: 145871493-1355242751
                                          • Opcode ID: 41c57bed2d20133e63d1c471519e5bd6affd414e7ee1569b9270a9aae0019de2
                                          • Instruction ID: de96a1d1d338614b51d61bd9070afe5fa03eccf9985b634d2439cf374f5fc7b7
                                          • Opcode Fuzzy Hash: 41c57bed2d20133e63d1c471519e5bd6affd414e7ee1569b9270a9aae0019de2
                                          • Instruction Fuzzy Hash: 7AD012365036215B56621B267C1CD8B6E68AFC6B513190515B915F2154CFA0CE05D6E1
                                          APIs
                                          • GetCurrentProcessId.KERNEL32 ref: 00E2A427
                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00E2A435
                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00E2A468
                                          • CloseHandle.KERNEL32(?), ref: 00E2A63D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                          • String ID:
                                          • API String ID: 3488606520-0
                                          • Opcode ID: 44aaaeb51b87f589e55a711ec3cfbb568804607cc7dd6d06902a9029bc54f73a
                                          • Instruction ID: 0fdfd866896e32bbadb9cc74372c2084e26fc366b1a414f4ff29c0147a8cf216
                                          • Opcode Fuzzy Hash: 44aaaeb51b87f589e55a711ec3cfbb568804607cc7dd6d06902a9029bc54f73a
                                          • Instruction Fuzzy Hash: BCA181716043019FD720DF24D886F2AB7E5EF88714F18986DF55AAB2D2D770EC418BA2
                                          APIs
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E43700), ref: 00DDBB91
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00E7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00DDBC09
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00E71270,000000FF,?,0000003F,00000000,?), ref: 00DDBC36
                                          • _free.LIBCMT ref: 00DDBB7F
                                            • Part of subcall function 00DD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000), ref: 00DD29DE
                                            • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                                          • _free.LIBCMT ref: 00DDBD4B
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                          • String ID:
                                          • API String ID: 1286116820-0
                                          • Opcode ID: 2701c255d8b59d4b467ce8ad451bbaaa8587de0f718acc984427ed28e166888d
                                          • Instruction ID: 11afe16c29345662f9bb561f24a3edbc0f743e8392b67cf380a010a4ee77ba11
                                          • Opcode Fuzzy Hash: 2701c255d8b59d4b467ce8ad451bbaaa8587de0f718acc984427ed28e166888d
                                          • Instruction Fuzzy Hash: 8151C871900209EFCB10DF7A9C4196AB7BCFB40374B1642ABE554E73A1EB709D449B70
                                          APIs
                                            • Part of subcall function 00E0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E0CF22,?), ref: 00E0DDFD
                                            • Part of subcall function 00E0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E0CF22,?), ref: 00E0DE16
                                            • Part of subcall function 00E0E199: GetFileAttributesW.KERNEL32(?,00E0CF95), ref: 00E0E19A
                                          • lstrcmpiW.KERNEL32(?,?), ref: 00E0E473
                                          • MoveFileW.KERNEL32(?,?), ref: 00E0E4AC
                                          • _wcslen.LIBCMT ref: 00E0E5EB
                                          • _wcslen.LIBCMT ref: 00E0E603
                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00E0E650
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                          • String ID:
                                          • API String ID: 3183298772-0
                                          • Opcode ID: c512ee31a2acaa7b2152ed10d370adf7523f711177c88b9bfe2535a40d82e5b7
                                          • Instruction ID: 13080aab4f7a3fb6f53aa5b926a35cb8026e8051d4c28a29a96c4a94b2f4058e
                                          • Opcode Fuzzy Hash: c512ee31a2acaa7b2152ed10d370adf7523f711177c88b9bfe2535a40d82e5b7
                                          • Instruction Fuzzy Hash: A95160B24083455BC724EBA0DC91ADBB3ECEF85344F104D2EF589E3191EE75A6888776
                                          APIs
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                            • Part of subcall function 00E2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E2B6AE,?,?), ref: 00E2C9B5
                                            • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2C9F1
                                            • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA68
                                            • Part of subcall function 00E2C998: _wcslen.LIBCMT ref: 00E2CA9E
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E2BAA5
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E2BB00
                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00E2BB63
                                          • RegCloseKey.ADVAPI32(?,?), ref: 00E2BBA6
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E2BBB3
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                          • String ID:
                                          • API String ID: 826366716-0
                                          • Opcode ID: 758349637e1d64037aaacea7b538c2da8615146638ba64fdf878f1e1e1f62cdf
                                          • Instruction ID: cf83302560576e84e558ffc5b0b943968c3a86f3dbc9e9d9f264003cb4fd779e
                                          • Opcode Fuzzy Hash: 758349637e1d64037aaacea7b538c2da8615146638ba64fdf878f1e1e1f62cdf
                                          • Instruction Fuzzy Hash: 1C61C171208241AFC314DF24D894E2ABBE5FF85308F54955CF49A9B2A2CB31ED45CFA2
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 00E08BCD
                                          • VariantClear.OLEAUT32 ref: 00E08C3E
                                          • VariantClear.OLEAUT32 ref: 00E08C9D
                                          • VariantClear.OLEAUT32(?), ref: 00E08D10
                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00E08D3B
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ChangeInitType
                                          • String ID:
                                          • API String ID: 4136290138-0
                                          • Opcode ID: 4225b7cc55d308b894df177e0319f1fd0abc0df8b6c675d6b53d916cf297abde
                                          • Instruction ID: 1a778d0ba892349ea151b3cf2dfdc1ffcccb6b31ca875fa2cb3afb8edee1cb70
                                          • Opcode Fuzzy Hash: 4225b7cc55d308b894df177e0319f1fd0abc0df8b6c675d6b53d916cf297abde
                                          • Instruction Fuzzy Hash: 1D518BB1A00219EFCB14CF68C894AAABBF8FF89314B118559F955EB350E730E951CF90
                                          APIs
                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00E18BAE
                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00E18BDA
                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00E18C32
                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00E18C57
                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00E18C5F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: PrivateProfile$SectionWrite$String
                                          • String ID:
                                          • API String ID: 2832842796-0
                                          • Opcode ID: 5a4c305b191d446dc5ecc59c735c2d68607e93fef1ba4a47c58024e3efd415a3
                                          • Instruction ID: 1787949f79751f3475d43c12ca0a1bddee75a3f484e1787fdbfa902f729296a4
                                          • Opcode Fuzzy Hash: 5a4c305b191d446dc5ecc59c735c2d68607e93fef1ba4a47c58024e3efd415a3
                                          • Instruction Fuzzy Hash: 96514C35A00214DFCB00DF65C881AAABBF5FF49314F088458E849AB3A2CB31ED51CBA1
                                          APIs
                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00E28F40
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00E28FD0
                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00E28FEC
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00E29032
                                          • FreeLibrary.KERNEL32(00000000), ref: 00E29052
                                            • Part of subcall function 00DBF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00E11043,?,75C0E610), ref: 00DBF6E6
                                            • Part of subcall function 00DBF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00DFFA64,00000000,00000000,?,?,00E11043,?,75C0E610,?,00DFFA64), ref: 00DBF70D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                          • String ID:
                                          • API String ID: 666041331-0
                                          • Opcode ID: 8a219e8b6024eaf75a70e34c3c6164c502df8d28970aacd38289230ae8d63eb2
                                          • Instruction ID: 8679b7a01743808be4e92e623d1bd46099c20ff3f8ddd4c72e2e46e0fdafd067
                                          • Opcode Fuzzy Hash: 8a219e8b6024eaf75a70e34c3c6164c502df8d28970aacd38289230ae8d63eb2
                                          • Instruction Fuzzy Hash: 7B512935601219DFC711DF54C5948ADBBB1FF49324F089099E806AB362DB31ED86CBA0
                                          APIs
                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00E36C33
                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 00E36C4A
                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00E36C73
                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00E1AB79,00000000,00000000), ref: 00E36C98
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00E36CC7
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$Long$MessageSendShow
                                          • String ID:
                                          • API String ID: 3688381893-0
                                          • Opcode ID: 6c1646144765ea4d1cd2e62e328cc9d8220f38cd7bac207560051bf354809e9f
                                          • Instruction ID: 19710e0d5a2687365560016d9c95e1c15417ec056c1bac4289d8c80ee56c421b
                                          • Opcode Fuzzy Hash: 6c1646144765ea4d1cd2e62e328cc9d8220f38cd7bac207560051bf354809e9f
                                          • Instruction Fuzzy Hash: 9141AF35A04104BFDB24CF39CC5DFA9BFA5EB49354F14A268E999B72A0C371ED41CA50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 3d2881cb06fcf36962ec480884cefb127a563b9a58e8ec26a0d56c4ec3f19082
                                          • Instruction ID: 50e0562e27e75ea5eef7bbd774226e852f6f6d3149491c8dab4a8f2d0be8d9ab
                                          • Opcode Fuzzy Hash: 3d2881cb06fcf36962ec480884cefb127a563b9a58e8ec26a0d56c4ec3f19082
                                          • Instruction Fuzzy Hash: 5241A132A00200AFCB24DF78C881A7EB7B5EF99314B1985AAE555EB355D731ED01DBA0
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 00DB9141
                                          • ScreenToClient.USER32(00000000,?), ref: 00DB915E
                                          • GetAsyncKeyState.USER32(00000001), ref: 00DB9183
                                          • GetAsyncKeyState.USER32(00000002), ref: 00DB919D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: AsyncState$ClientCursorScreen
                                          • String ID:
                                          • API String ID: 4210589936-0
                                          • Opcode ID: e3bd6b5cc8972323a37bc922128fff4d68945182ea8625f9f711acbd6533bbeb
                                          • Instruction ID: 52d6e59da1c22e82c22528c71fb147a52b8cb7d34df308d813e2caa98ff9a94b
                                          • Opcode Fuzzy Hash: e3bd6b5cc8972323a37bc922128fff4d68945182ea8625f9f711acbd6533bbeb
                                          • Instruction Fuzzy Hash: 77418F3190860AFBDF059F68C858BFEFB74FF05360F258219E569A6290C7309954DB61
                                          APIs
                                          • GetInputState.USER32 ref: 00E138CB
                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00E13922
                                          • TranslateMessage.USER32(?), ref: 00E1394B
                                          • DispatchMessageW.USER32(?), ref: 00E13955
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E13966
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                          • String ID:
                                          • API String ID: 2256411358-0
                                          • Opcode ID: 45731f38d73bbe4b9323174ee5ef8e61e3517c58bae6dd03cf6e5eb77e5aa4a6
                                          • Instruction ID: 56991dcec286d39367b501580894f4acaea274656db2d8e4dd9791c0ae2011d6
                                          • Opcode Fuzzy Hash: 45731f38d73bbe4b9323174ee5ef8e61e3517c58bae6dd03cf6e5eb77e5aa4a6
                                          • Instruction Fuzzy Hash: D631D970504345AEEB35CB359849FF67BA4EB45308F1415ADD466B20D4E3B496C9CB11
                                          APIs
                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00E1C21E,00000000), ref: 00E1CF38
                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 00E1CF6F
                                          • GetLastError.KERNEL32(?,00000000,?,?,?,00E1C21E,00000000), ref: 00E1CFB4
                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00E1C21E,00000000), ref: 00E1CFC8
                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00E1C21E,00000000), ref: 00E1CFF2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                          • String ID:
                                          • API String ID: 3191363074-0
                                          • Opcode ID: 1236d3fa88011fadc28e9da86322244a9565d55d31f28c711bcd769f3eeee6e5
                                          • Instruction ID: 70e7269f7f474f2ac4fe3a46378906555620ba2bbd99f1957cff1218687b40cb
                                          • Opcode Fuzzy Hash: 1236d3fa88011fadc28e9da86322244a9565d55d31f28c711bcd769f3eeee6e5
                                          • Instruction Fuzzy Hash: 19315071644605EFDB20DFA5C888AEBBBF9EB18354B20542EF516F2150DB30ED86DB60
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 00E01915
                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 00E019C1
                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 00E019C9
                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 00E019DA
                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00E019E2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessagePostSleep$RectWindow
                                          • String ID:
                                          • API String ID: 3382505437-0
                                          • Opcode ID: 3eecb679da2a810023595b7495e48972604ebbcc37d969f2e10b20ce3cdb81f2
                                          • Instruction ID: f26771c7152710f0b612348ff22d479b38530e34af407346fc144625238b4b92
                                          • Opcode Fuzzy Hash: 3eecb679da2a810023595b7495e48972604ebbcc37d969f2e10b20ce3cdb81f2
                                          • Instruction Fuzzy Hash: 8E31BF71A00219EFCB00CFA8CD99ADE3BB5EB45319F505269F921BB2D1C770D984DB91
                                          APIs
                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00E35745
                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00E3579D
                                          • _wcslen.LIBCMT ref: 00E357AF
                                          • _wcslen.LIBCMT ref: 00E357BA
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E35816
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$_wcslen
                                          • String ID:
                                          • API String ID: 763830540-0
                                          • Opcode ID: 6c9828673a10c2e6b2b4b8c59e67581b07c446a765188d269f55a0782d25ee4c
                                          • Instruction ID: 6365d7d64cfaf5be040aa3cc4344d1d6c1360cdc329955f040dc88944a720d17
                                          • Opcode Fuzzy Hash: 6c9828673a10c2e6b2b4b8c59e67581b07c446a765188d269f55a0782d25ee4c
                                          • Instruction Fuzzy Hash: C2218572904618DADB209FA5CC89AED7FB8FF44724F109256F929FB280D7708985CF51
                                          APIs
                                          • IsWindow.USER32(00000000), ref: 00E20951
                                          • GetForegroundWindow.USER32 ref: 00E20968
                                          • GetDC.USER32(00000000), ref: 00E209A4
                                          • GetPixel.GDI32(00000000,?,00000003), ref: 00E209B0
                                          • ReleaseDC.USER32(00000000,00000003), ref: 00E209E8
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$ForegroundPixelRelease
                                          • String ID:
                                          • API String ID: 4156661090-0
                                          • Opcode ID: ffe185a727300d73c5ba4964be758adfed04db20424475dafd68dc15b7ef9ee4
                                          • Instruction ID: beec60ec66a1aa003260b82011478b367297b2b50e74aa036006c4d69864d4d6
                                          • Opcode Fuzzy Hash: ffe185a727300d73c5ba4964be758adfed04db20424475dafd68dc15b7ef9ee4
                                          • Instruction Fuzzy Hash: B2218435600214AFD704EF65D849A9EBBF5EF85710F148469F846B7762CB30EC44CB60
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 00DDCDC6
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DDCDE9
                                            • Part of subcall function 00DD3820: RtlAllocateHeap.NTDLL(00000000,?,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6,?,00DA1129), ref: 00DD3852
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00DDCE0F
                                          • _free.LIBCMT ref: 00DDCE22
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00DDCE31
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                          • String ID:
                                          • API String ID: 336800556-0
                                          • Opcode ID: e112fb166557a67208ac902c66646e3fe4e13140be0be6964f4832d15a294dc0
                                          • Instruction ID: dab87e36337d013438662e60d33d3e2c1b1307f99c5f6485d10d5639f60b180e
                                          • Opcode Fuzzy Hash: e112fb166557a67208ac902c66646e3fe4e13140be0be6964f4832d15a294dc0
                                          • Instruction Fuzzy Hash: 990188B26122167F272116BB6C4CD7BBE6DDFC6BA1729112BF905E7301DA61CD01D2B0
                                          APIs
                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DB9693
                                          • SelectObject.GDI32(?,00000000), ref: 00DB96A2
                                          • BeginPath.GDI32(?), ref: 00DB96B9
                                          • SelectObject.GDI32(?,00000000), ref: 00DB96E2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ObjectSelect$BeginCreatePath
                                          • String ID:
                                          • API String ID: 3225163088-0
                                          • Opcode ID: 8c40c6a798c43237a4b3711152d46b1fb90463d0ab2c1cae20f0c533ce7bdd2f
                                          • Instruction ID: 6c7d55dc13a1473819a5df0fced278252fed33d2f7634389f6da05c4d23bee2d
                                          • Opcode Fuzzy Hash: 8c40c6a798c43237a4b3711152d46b1fb90463d0ab2c1cae20f0c533ce7bdd2f
                                          • Instruction Fuzzy Hash: 0521B330802349EFDB10DF2ADC287E9BBB4BB90355F144256F615B60B0D370988ACFA0
                                          APIs
                                          • GetSysColor.USER32(00000008), ref: 00DB98CC
                                          • SetTextColor.GDI32(?,?), ref: 00DB98D6
                                          • SetBkMode.GDI32(?,00000001), ref: 00DB98E9
                                          • GetStockObject.GDI32(00000005), ref: 00DB98F1
                                          • GetWindowLongW.USER32(?,000000EB), ref: 00DB9952
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Color$LongModeObjectStockTextWindow
                                          • String ID:
                                          • API String ID: 1860813098-0
                                          • Opcode ID: 2e0c7a6b6969886a85e362d0ca5bc2acaa7d1e540300a7f144dc4d75702e55e4
                                          • Instruction ID: 3589d21d6caaf3b8633ed58cd7603bfd0296ff3491012b45b5e6073b8c8e754f
                                          • Opcode Fuzzy Hash: 2e0c7a6b6969886a85e362d0ca5bc2acaa7d1e540300a7f144dc4d75702e55e4
                                          • Instruction Fuzzy Hash: BF21F33254A2D4DFCB228B369C69AE67F609B13320B2C015EE797AB1A1C7258941CB61
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _memcmp
                                          • String ID:
                                          • API String ID: 2931989736-0
                                          • Opcode ID: d2e3c2c7a55a6d0f2fa4a7a5e3f2556f07af60a434bf31d7d3a16b14c4074175
                                          • Instruction ID: 233d655fdf84f2bd24cd2a053acafdeb58ee9fa6c4b5a6c6d8eff98e170118fb
                                          • Opcode Fuzzy Hash: d2e3c2c7a55a6d0f2fa4a7a5e3f2556f07af60a434bf31d7d3a16b14c4074175
                                          • Instruction Fuzzy Hash: 2F01D6A7681616BAD70851109E42FFB634CDB21398F081026FD04BB282F620ED61D6B1
                                          APIs
                                          • GetLastError.KERNEL32(?,?,?,00DCF2DE,00DD3863,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6), ref: 00DD2DFD
                                          • _free.LIBCMT ref: 00DD2E32
                                          • _free.LIBCMT ref: 00DD2E59
                                          • SetLastError.KERNEL32(00000000,00DA1129), ref: 00DD2E66
                                          • SetLastError.KERNEL32(00000000,00DA1129), ref: 00DD2E6F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_free
                                          • String ID:
                                          • API String ID: 3170660625-0
                                          • Opcode ID: 578303e10500a01daf7769dca22d82768c8ed6fb4aa026297eae97007d42c3d8
                                          • Instruction ID: f1285439526997bc27fd241522649773ee107808bb1cb8bade9bd63b567f89ad
                                          • Opcode Fuzzy Hash: 578303e10500a01daf7769dca22d82768c8ed6fb4aa026297eae97007d42c3d8
                                          • Instruction Fuzzy Hash: 6901F4326456006FC61227766C4AD3B2B6DEBF13B2B39442BF465B3392EBB1CC054130
                                          APIs
                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?,?,?,00E0035E), ref: 00E0002B
                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?,?), ref: 00E00046
                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?,?), ref: 00E00054
                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?), ref: 00E00064
                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00DFFF41,80070057,?,?), ref: 00E00070
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                          • String ID:
                                          • API String ID: 3897988419-0
                                          • Opcode ID: 35a8ef3cd2b2181b07b4dc78205cd6eba5c14f2ab910a3d21c8c8bc8ab4358c5
                                          • Instruction ID: 15c093716e03cf9d970c207622aaec0e59a3fca8f719ce5fb117184c0dd399c0
                                          • Opcode Fuzzy Hash: 35a8ef3cd2b2181b07b4dc78205cd6eba5c14f2ab910a3d21c8c8bc8ab4358c5
                                          • Instruction Fuzzy Hash: FB01A276600208BFDB154F69DC08BAA7EEDEF44751F245524F905F2250DB71DE849BA0
                                          APIs
                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00E0E997
                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 00E0E9A5
                                          • Sleep.KERNEL32(00000000), ref: 00E0E9AD
                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00E0E9B7
                                          • Sleep.KERNEL32 ref: 00E0E9F3
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                          • String ID:
                                          • API String ID: 2833360925-0
                                          • Opcode ID: 3d76287ee03650e12c38da227904b08ac2c21ba1db88aedf792c7b1c33eff349
                                          • Instruction ID: 6c9074798e201fe94ee86039aa5b97170fb3ba47a289cdcd57306b5194084044
                                          • Opcode Fuzzy Hash: 3d76287ee03650e12c38da227904b08ac2c21ba1db88aedf792c7b1c33eff349
                                          • Instruction Fuzzy Hash: 1C015B31C0162DDBCF04ABE6DC496EDBB78FB48301F5009A6E502B2290CB30959487A1
                                          APIs
                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E01114
                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01120
                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E0112F
                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E00B9B,?,?,?), ref: 00E01136
                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E0114D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 842720411-0
                                          • Opcode ID: 4fd0318da39c133492c96d41cbb07da63c5e780e228c257b85ce9abf6ffddf2c
                                          • Instruction ID: 9f419198837c209743f78ae2de1d27ed300768c94156b8b58f7bbe38e52839b1
                                          • Opcode Fuzzy Hash: 4fd0318da39c133492c96d41cbb07da63c5e780e228c257b85ce9abf6ffddf2c
                                          • Instruction Fuzzy Hash: A5016975201209BFDB154FA6DC4DA6A3F6EEF893A4B200459FA41E73A0DA31DC409B60
                                          APIs
                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E00FCA
                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E00FD6
                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E00FE5
                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E00FEC
                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E01002
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 44706859-0
                                          • Opcode ID: 93a0f995cdcbafe41969f7482c2981f6585981643e9df7fc2578689dd5b4780b
                                          • Instruction ID: 20d54550be715d60cdadae5c254b8cd0785d1ac989e790eab9bd8ee46aa7c048
                                          • Opcode Fuzzy Hash: 93a0f995cdcbafe41969f7482c2981f6585981643e9df7fc2578689dd5b4780b
                                          • Instruction Fuzzy Hash: AFF0AF35200305AFD7210FA59C4DF563F6EEF89761F210454F945FB290CA31DC809B60
                                          APIs
                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E0102A
                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E01036
                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E01045
                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E0104C
                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E01062
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 44706859-0
                                          • Opcode ID: 7ff2225ca8e4d3b045a9a490a4bcc798088c23c927805c978ae38e37287709ee
                                          • Instruction ID: 22e8b83a90b8245d486cfdf1ee0ea1d834c0fd78a7b0795a6b36bb1f1aadca66
                                          • Opcode Fuzzy Hash: 7ff2225ca8e4d3b045a9a490a4bcc798088c23c927805c978ae38e37287709ee
                                          • Instruction Fuzzy Hash: A8F0AF35200305AFD7211FA5EC4CF563F6DEF89761F210414F985FB290CA31D8809B60
                                          APIs
                                          • CloseHandle.KERNEL32(?,?,?,?,00E1017D,?,00E132FC,?,00000001,00DE2592,?), ref: 00E10324
                                          • CloseHandle.KERNEL32(?,?,?,?,00E1017D,?,00E132FC,?,00000001,00DE2592,?), ref: 00E10331
                                          • CloseHandle.KERNEL32(?,?,?,?,00E1017D,?,00E132FC,?,00000001,00DE2592,?), ref: 00E1033E
                                          • CloseHandle.KERNEL32(?,?,?,?,00E1017D,?,00E132FC,?,00000001,00DE2592,?), ref: 00E1034B
                                          • CloseHandle.KERNEL32(?,?,?,?,00E1017D,?,00E132FC,?,00000001,00DE2592,?), ref: 00E10358
                                          • CloseHandle.KERNEL32(?,?,?,?,00E1017D,?,00E132FC,?,00000001,00DE2592,?), ref: 00E10365
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CloseHandle
                                          • String ID:
                                          • API String ID: 2962429428-0
                                          • Opcode ID: 28c029c5af3e5a3f775d94fb1f8686fdfb3fc3d8a489d3c9ab718976e531bef0
                                          • Instruction ID: 7ba9d215114aeb2b6a7a564ddb389b85801b106fbee77a0b0a44c93f069d2898
                                          • Opcode Fuzzy Hash: 28c029c5af3e5a3f775d94fb1f8686fdfb3fc3d8a489d3c9ab718976e531bef0
                                          • Instruction Fuzzy Hash: 8801A272800B159FC730AF66D880452FBF5BF503193159A3FD1A662931C3B1A999DF80
                                          APIs
                                          • _free.LIBCMT ref: 00DDD752
                                            • Part of subcall function 00DD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000), ref: 00DD29DE
                                            • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                                          • _free.LIBCMT ref: 00DDD764
                                          • _free.LIBCMT ref: 00DDD776
                                          • _free.LIBCMT ref: 00DDD788
                                          • _free.LIBCMT ref: 00DDD79A
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: d2de1563eb6176f297e98eb6cf3cec564b5e5be59182a162bbb8beabd79f011a
                                          • Instruction ID: c705328e1346b6f3e08c02955011d0f80ba3d2b21358a7bd5663ce92528cb784
                                          • Opcode Fuzzy Hash: d2de1563eb6176f297e98eb6cf3cec564b5e5be59182a162bbb8beabd79f011a
                                          • Instruction Fuzzy Hash: 6FF0FF32584204BB8A25EB65FDC5C2777DEFB54750BA81847F099E7601C774FC808A74
                                          APIs
                                          • GetDlgItem.USER32(?,000003E9), ref: 00E05C58
                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00E05C6F
                                          • MessageBeep.USER32(00000000), ref: 00E05C87
                                          • KillTimer.USER32(?,0000040A), ref: 00E05CA3
                                          • EndDialog.USER32(?,00000001), ref: 00E05CBD
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                          • String ID:
                                          • API String ID: 3741023627-0
                                          • Opcode ID: e6922128a5e58fcff0392489a52fa0c40c74477e9c86b5584bb9deb7ca664d60
                                          • Instruction ID: 4b74a72b5b0a3a44284cb3e3babd4666b4ac1d631d0bf94680e0be561d2c19b8
                                          • Opcode Fuzzy Hash: e6922128a5e58fcff0392489a52fa0c40c74477e9c86b5584bb9deb7ca664d60
                                          • Instruction Fuzzy Hash: 92011231500B08AFFB215B11DD8FFA6BBB8BB04B05F142559A587B14E1DBF4A9888F90
                                          APIs
                                          • _free.LIBCMT ref: 00DD22BE
                                            • Part of subcall function 00DD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000), ref: 00DD29DE
                                            • Part of subcall function 00DD29C8: GetLastError.KERNEL32(00000000,?,00DDD7D1,00000000,00000000,00000000,00000000,?,00DDD7F8,00000000,00000007,00000000,?,00DDDBF5,00000000,00000000), ref: 00DD29F0
                                          • _free.LIBCMT ref: 00DD22D0
                                          • _free.LIBCMT ref: 00DD22E3
                                          • _free.LIBCMT ref: 00DD22F4
                                          • _free.LIBCMT ref: 00DD2305
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 593d45559541e6d2af7cc4ed875733145e0db2445c7d0bc04444a9162c0b20c7
                                          • Instruction ID: 136f8b763ba76d0b3e20dec52a0fb91d03ec9b8cc3e92926eb5a5adfa39d0c29
                                          • Opcode Fuzzy Hash: 593d45559541e6d2af7cc4ed875733145e0db2445c7d0bc04444a9162c0b20c7
                                          • Instruction Fuzzy Hash: 29F030705402518F8626EF6ABC118293B64F7287907140547F418F3372CB701499BFB4
                                          APIs
                                          • EndPath.GDI32(?), ref: 00DB95D4
                                          • StrokeAndFillPath.GDI32(?,?,00DF71F7,00000000,?,?,?), ref: 00DB95F0
                                          • SelectObject.GDI32(?,00000000), ref: 00DB9603
                                          • DeleteObject.GDI32 ref: 00DB9616
                                          • StrokePath.GDI32(?), ref: 00DB9631
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                          • String ID:
                                          • API String ID: 2625713937-0
                                          • Opcode ID: 254bac3e6d00f560783a56b66c120634b6512a038ca75cd7d78be32a0ce2d4e1
                                          • Instruction ID: 1dfb0c871d18428030214abc4cd9499c82951f64f16ea7af83471fadfca31fed
                                          • Opcode Fuzzy Hash: 254bac3e6d00f560783a56b66c120634b6512a038ca75cd7d78be32a0ce2d4e1
                                          • Instruction Fuzzy Hash: 6FF0E131006348DFD7269F5AED1C7A47F65A741362F148254F65A750F4C730859ADF20
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: __freea$_free
                                          • String ID: a/p$am/pm
                                          • API String ID: 3432400110-3206640213
                                          • Opcode ID: 84ebb722e8f51818743f0e0d5eeae2982674ae62ca6ad54d9b4d1147ab4dca9f
                                          • Instruction ID: 151b4d08802d03a53f485a95a3d165581539d01239e1eea075cae488b9743d85
                                          • Opcode Fuzzy Hash: 84ebb722e8f51818743f0e0d5eeae2982674ae62ca6ad54d9b4d1147ab4dca9f
                                          • Instruction Fuzzy Hash: 28D1E239900206EADB289F68C855BFEBBB1EF05300F28425BE945AB751D3759D80CBB1
                                          APIs
                                            • Part of subcall function 00DC0242: EnterCriticalSection.KERNEL32(00E7070C,00E71884,?,?,00DB198B,00E72518,?,?,?,00DA12F9,00000000), ref: 00DC024D
                                            • Part of subcall function 00DC0242: LeaveCriticalSection.KERNEL32(00E7070C,?,00DB198B,00E72518,?,?,?,00DA12F9,00000000), ref: 00DC028A
                                            • Part of subcall function 00DC00A3: __onexit.LIBCMT ref: 00DC00A9
                                          • __Init_thread_footer.LIBCMT ref: 00E26238
                                            • Part of subcall function 00DC01F8: EnterCriticalSection.KERNEL32(00E7070C,?,?,00DB8747,00E72514), ref: 00DC0202
                                            • Part of subcall function 00DC01F8: LeaveCriticalSection.KERNEL32(00E7070C,?,00DB8747,00E72514), ref: 00DC0235
                                            • Part of subcall function 00E1359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00E135E4
                                            • Part of subcall function 00E1359C: LoadStringW.USER32(00E72390,?,00000FFF,?), ref: 00E1360A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                          • String ID: x#$x#$x#
                                          • API String ID: 1072379062-1894725482
                                          • Opcode ID: b0553d825b3ce748c73ebd2298b90306e1aeb8255844465dea38ca455d9b3886
                                          • Instruction ID: 5c120cda34739a834585abb3c63a6d16a323b7655ca0bd32114ee0349247affd
                                          • Opcode Fuzzy Hash: b0553d825b3ce748c73ebd2298b90306e1aeb8255844465dea38ca455d9b3886
                                          • Instruction Fuzzy Hash: DDC19B71A00115AFCB14EF98D891EBEB7B9FF48304F148169F955AB291DB70ED44CBA0
                                          APIs
                                            • Part of subcall function 00DC0242: EnterCriticalSection.KERNEL32(00E7070C,00E71884,?,?,00DB198B,00E72518,?,?,?,00DA12F9,00000000), ref: 00DC024D
                                            • Part of subcall function 00DC0242: LeaveCriticalSection.KERNEL32(00E7070C,?,00DB198B,00E72518,?,?,?,00DA12F9,00000000), ref: 00DC028A
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                            • Part of subcall function 00DC00A3: __onexit.LIBCMT ref: 00DC00A9
                                          • __Init_thread_footer.LIBCMT ref: 00E27BFB
                                            • Part of subcall function 00DC01F8: EnterCriticalSection.KERNEL32(00E7070C,?,?,00DB8747,00E72514), ref: 00DC0202
                                            • Part of subcall function 00DC01F8: LeaveCriticalSection.KERNEL32(00E7070C,?,00DB8747,00E72514), ref: 00DC0235
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                          • String ID: 5$G$Variable must be of type 'Object'.
                                          • API String ID: 535116098-3733170431
                                          • Opcode ID: 5a416b58aeffbbfa3a8ff40c5147cc73a10a90595f3b3a013d2db2542bddfebc
                                          • Instruction ID: 75247ed2c4821a2ff7860a8b132279beab605ad896ba9cbad0a775626928b1b1
                                          • Opcode Fuzzy Hash: 5a416b58aeffbbfa3a8ff40c5147cc73a10a90595f3b3a013d2db2542bddfebc
                                          • Instruction Fuzzy Hash: 72918C70A04219EFCB14EF64E891DADB7B1FF49304F149059F886BB292DB71AE41CB61
                                          APIs
                                            • Part of subcall function 00E0B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E021D0,?,?,00000034,00000800,?,00000034), ref: 00E0B42D
                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00E02760
                                            • Part of subcall function 00E0B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00E0B3F8
                                            • Part of subcall function 00E0B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00E0B355
                                            • Part of subcall function 00E0B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00E02194,00000034,?,?,00001004,00000000,00000000), ref: 00E0B365
                                            • Part of subcall function 00E0B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00E02194,00000034,?,?,00001004,00000000,00000000), ref: 00E0B37B
                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E027CD
                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E0281A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                          • String ID: @
                                          • API String ID: 4150878124-2766056989
                                          • Opcode ID: ca8e701e8dfc63cd08178f51512a6146ec3ee143a8b05eaba3618a5fb7208535
                                          • Instruction ID: 6cd08ce020800c2dc9ea5ccd26da4dd1b8af8311952e0eeb597900cf8d07cb4c
                                          • Opcode Fuzzy Hash: ca8e701e8dfc63cd08178f51512a6146ec3ee143a8b05eaba3618a5fb7208535
                                          • Instruction Fuzzy Hash: F8412E76900218AFDB10DFA4CD46BEEBBB8EF09700F109059FA55B7181DB706E85CBA1
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\4iDzhJBJVv.exe,00000104), ref: 00DD1769
                                          • _free.LIBCMT ref: 00DD1834
                                          • _free.LIBCMT ref: 00DD183E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _free$FileModuleName
                                          • String ID: C:\Users\user\Desktop\4iDzhJBJVv.exe
                                          • API String ID: 2506810119-3866868553
                                          • Opcode ID: a581094b41d92fc26d9d66eae031fff341c4350797deb008ac02423571412f35
                                          • Instruction ID: 37fcba78382f4e148cb485a4ce0ef7a77e6605ced483fc5cd4b0e2981176aecc
                                          • Opcode Fuzzy Hash: a581094b41d92fc26d9d66eae031fff341c4350797deb008ac02423571412f35
                                          • Instruction Fuzzy Hash: F9317E79A40259FFDB21DB999885D9EBBBCEB85310B1441A7F404E7321D7708A44DBB0
                                          APIs
                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00E0C306
                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00E0C34C
                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00E71990,012C4E10), ref: 00E0C395
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Menu$Delete$InfoItem
                                          • String ID: 0
                                          • API String ID: 135850232-4108050209
                                          • Opcode ID: 5b18b7d1c5ab5dcf52b8032b5534ae14adfd8248fd49102185b7e53955985f67
                                          • Instruction ID: 5cfa56168d0e0d1c4c2ac867909fe1e0e79553945184be18fef96116dea768d2
                                          • Opcode Fuzzy Hash: 5b18b7d1c5ab5dcf52b8032b5534ae14adfd8248fd49102185b7e53955985f67
                                          • Instruction Fuzzy Hash: 0541AE712043019FD720DF25D884B5ABBE4EF85324F209B6DF8A5A72D1D734E984CB62
                                          APIs
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00E3CC08,00000000,?,?,?,?), ref: 00E344AA
                                          • GetWindowLongW.USER32 ref: 00E344C7
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E344D7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$Long
                                          • String ID: SysTreeView32
                                          • API String ID: 847901565-1698111956
                                          • Opcode ID: b891c038bf14318f1acb343c17ed2232527edbd27bdf425e248c05c511c77168
                                          • Instruction ID: 0b22f185a6288aa06c31f32b9bd8eb1b1a8e63d8cb166a4ee05e25e347753582
                                          • Opcode Fuzzy Hash: b891c038bf14318f1acb343c17ed2232527edbd27bdf425e248c05c511c77168
                                          • Instruction Fuzzy Hash: 41318D72210205AFDB219E38DC49BEA7BA9EB09338F205725F975B21D0D770EC50D760
                                          APIs
                                          • SysReAllocString.OLEAUT32(?,?), ref: 00E06EED
                                          • VariantCopyInd.OLEAUT32(?,?), ref: 00E06F08
                                          • VariantClear.OLEAUT32(?), ref: 00E06F12
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Variant$AllocClearCopyString
                                          • String ID: *j
                                          • API String ID: 2173805711-1845181700
                                          • Opcode ID: b27aacdd79d6a80efa2ce9a4c3df8c28d7f7fe6e86c3dbacb5dfc2c91e7bfff7
                                          • Instruction ID: e183d1469a3e75c743b5ceb2118a3c5616b4dfd83c34e22d49dc4ac63d1d0d43
                                          • Opcode Fuzzy Hash: b27aacdd79d6a80efa2ce9a4c3df8c28d7f7fe6e86c3dbacb5dfc2c91e7bfff7
                                          • Instruction Fuzzy Hash: B931A272704246DFCB05AFA4E851ABD37B6FF85714B1004A9F9126B2E2C7349962DBF0
                                          APIs
                                            • Part of subcall function 00E2335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00E23077,?,?), ref: 00E23378
                                          • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E2307A
                                          • _wcslen.LIBCMT ref: 00E2309B
                                          • htons.WSOCK32(00000000,?,?,00000000), ref: 00E23106
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                          • String ID: 255.255.255.255
                                          • API String ID: 946324512-2422070025
                                          • Opcode ID: 81e6c644fb3d8a87dfeda7cee8cfd43bb283a225411b55c859c88a1c2b6fd1fe
                                          • Instruction ID: 41be152fec56d30ff42831aa398765481d1089fe7788c6417600d8ab3aef5771
                                          • Opcode Fuzzy Hash: 81e6c644fb3d8a87dfeda7cee8cfd43bb283a225411b55c859c88a1c2b6fd1fe
                                          • Instruction Fuzzy Hash: C631D5352002259FC720CF78D486EAA77E0EF55318F249059E915AB392DB79EF45CB70
                                          APIs
                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00E34705
                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00E34713
                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E3471A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$DestroyWindow
                                          • String ID: msctls_updown32
                                          • API String ID: 4014797782-2298589950
                                          • Opcode ID: 6d1bc261b36bf98df9d89814abd758fc45e4a4555c622fe984068588466855ad
                                          • Instruction ID: 88249291f620406064228656d32be7f2b400a98018485711b081e68680294bc8
                                          • Opcode Fuzzy Hash: 6d1bc261b36bf98df9d89814abd758fc45e4a4555c622fe984068588466855ad
                                          • Instruction Fuzzy Hash: B8215EF5600209AFDB10DF69DC85DA73BADEB8A398F141059FA04AB291CB70FC51CA70
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen
                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                          • API String ID: 176396367-2734436370
                                          • Opcode ID: 9de5bab28555dc994c0000c28bc5417aadbc1f000b667d6da52bc952ab6683bf
                                          • Instruction ID: d65509e8d917ae15854f0f8cefbc599fdb900e22a4ead29ccb85c40b34e7c9b2
                                          • Opcode Fuzzy Hash: 9de5bab28555dc994c0000c28bc5417aadbc1f000b667d6da52bc952ab6683bf
                                          • Instruction Fuzzy Hash: 6521087210461166D331AF25AC06FB77398DF55314F14502AF949B71C3EB529D81D2B5
                                          APIs
                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00E33840
                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00E33850
                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00E33876
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend$MoveWindow
                                          • String ID: Listbox
                                          • API String ID: 3315199576-2633736733
                                          • Opcode ID: 1234579d9814f200271d2880c555b9b8556a9e063744a844dffc2f9956659e68
                                          • Instruction ID: 44ae0c8c0e039e5e647e023ee42fffa5fe0e6b26e35695b6a2fcdc94c0ec4842
                                          • Opcode Fuzzy Hash: 1234579d9814f200271d2880c555b9b8556a9e063744a844dffc2f9956659e68
                                          • Instruction Fuzzy Hash: 9121B072610218BBEB218F65DC49EAB3B6AEF89754F119115F904AB190C671DC52C7A0
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 00E14A08
                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00E14A5C
                                          • SetErrorMode.KERNEL32(00000000,?,?,00E3CC08), ref: 00E14AD0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorMode$InformationVolume
                                          • String ID: %lu
                                          • API String ID: 2507767853-685833217
                                          • Opcode ID: 72802eeef5fec6b0ceec6192b075fefa2d0f09959c8565491c72ba322cbc199b
                                          • Instruction ID: 3a71414d7a3c692bf3cc9450a24765533153ecdb6b66c03b75671f4eadbc12d0
                                          • Opcode Fuzzy Hash: 72802eeef5fec6b0ceec6192b075fefa2d0f09959c8565491c72ba322cbc199b
                                          • Instruction Fuzzy Hash: B2312F75A00109AFD710DF54C885EAABBF8EF05318F149095F505EB252D771EE45CB71
                                          APIs
                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00E3424F
                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00E34264
                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00E34271
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: msctls_trackbar32
                                          • API String ID: 3850602802-1010561917
                                          • Opcode ID: 354ea747ee9a96a0d482dd672f99b8dcb123601ad14b52d25cbe8cb27d25b388
                                          • Instruction ID: 55656a0d9be7c72cb893396759f78c20f65d61fbad5e9a04efe255fb539c5988
                                          • Opcode Fuzzy Hash: 354ea747ee9a96a0d482dd672f99b8dcb123601ad14b52d25cbe8cb27d25b388
                                          • Instruction Fuzzy Hash: 3811A371240248BEEF205E69CC0AFAB3BACEF95B58F111514FA55F60E0D671E851DB20
                                          APIs
                                            • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                                            • Part of subcall function 00E02DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00E02DC5
                                            • Part of subcall function 00E02DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E02DD6
                                            • Part of subcall function 00E02DA7: GetCurrentThreadId.KERNEL32 ref: 00E02DDD
                                            • Part of subcall function 00E02DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00E02DE4
                                          • GetFocus.USER32 ref: 00E02F78
                                            • Part of subcall function 00E02DEE: GetParent.USER32(00000000), ref: 00E02DF9
                                          • GetClassNameW.USER32(?,?,00000100), ref: 00E02FC3
                                          • EnumChildWindows.USER32(?,00E0303B), ref: 00E02FEB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                          • String ID: %s%d
                                          • API String ID: 1272988791-1110647743
                                          • Opcode ID: 3b4a0d4f03f83763e8c4654bede96febf5f327f7b558a413b156d40f8a8a449f
                                          • Instruction ID: 0e5dc82f682d163f5cda5e724da90a74056152ce68883ea6bdb722827bb1dfae
                                          • Opcode Fuzzy Hash: 3b4a0d4f03f83763e8c4654bede96febf5f327f7b558a413b156d40f8a8a449f
                                          • Instruction Fuzzy Hash: B911A271700209ABCF157F708C8AEED77AAAF94304F146079B909BB192DE3099898B70
                                          APIs
                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00E358C1
                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00E358EE
                                          • DrawMenuBar.USER32(?), ref: 00E358FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Menu$InfoItem$Draw
                                          • String ID: 0
                                          • API String ID: 3227129158-4108050209
                                          • Opcode ID: 3821934ec9ed39dbc60bd697203ddd1c085eb91932cb29c9f8df88c2f036590e
                                          • Instruction ID: c74bac9a48d32fc0377bd320d01d36eced38ee56bc785b494275c8d3a12b978e
                                          • Opcode Fuzzy Hash: 3821934ec9ed39dbc60bd697203ddd1c085eb91932cb29c9f8df88c2f036590e
                                          • Instruction Fuzzy Hash: A9011B32500218EEDB219F11DC49BEEBFB5FB85365F108099F859E6251DB308A94DF31
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 780d481f85b05ea53af78a509ab9fed8502fcdb044a441bf3862e33fbfdb507b
                                          • Instruction ID: 5b7f7504583a3ea3ab11030f7cf1c40e02ccce767f6ceefdbfdfbbaa4c0fe4e1
                                          • Opcode Fuzzy Hash: 780d481f85b05ea53af78a509ab9fed8502fcdb044a441bf3862e33fbfdb507b
                                          • Instruction Fuzzy Hash: B0C12A75A0021AEFDB15CF94C894BAEB7B5FF48704F209598E505EB291D731EE81CB90
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInitInitializeUninitialize
                                          • String ID:
                                          • API String ID: 1998397398-0
                                          • Opcode ID: a0454bb76681578b923bb6db2898809e3fa17a83544c55b855d88cdb6781e4e6
                                          • Instruction ID: 249d2a2c0365079fb271f334b07bceb9bf96534aaf82d69c85deaa61abc59379
                                          • Opcode Fuzzy Hash: a0454bb76681578b923bb6db2898809e3fa17a83544c55b855d88cdb6781e4e6
                                          • Instruction Fuzzy Hash: 54A14D756043109FC700EF24D885A6AB7E5FF89714F148859F98AAB3A2DB34ED41CFA1
                                          APIs
                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00E3FC08,?), ref: 00E005F0
                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00E3FC08,?), ref: 00E00608
                                          • CLSIDFromProgID.OLE32(?,?,00000000,00E3CC40,000000FF,?,00000000,00000800,00000000,?,00E3FC08,?), ref: 00E0062D
                                          • _memcmp.LIBVCRUNTIME ref: 00E0064E
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: FromProg$FreeTask_memcmp
                                          • String ID:
                                          • API String ID: 314563124-0
                                          • Opcode ID: c6ecce1c4b2bf3450c2d325932e8554a710c57517dc392297fca9c5e17317e7d
                                          • Instruction ID: 0fe143627f35ce85ffe0ea04b6322bc1f2bda21f4cfc41c4bcb577adf301ccd3
                                          • Opcode Fuzzy Hash: c6ecce1c4b2bf3450c2d325932e8554a710c57517dc392297fca9c5e17317e7d
                                          • Instruction Fuzzy Hash: 9C811B75A00109EFCB04DF94C988EEEB7B9FF89315F204558E516BB290DB71AE46CB60
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 475da8323783d86df435f1e1a4bef4774ee277a60cf8069c78d58bf289244f3b
                                          • Instruction ID: 0cb81ae445897061d6fccf6c06385b1e3d06df871e7df8b26f53eb18f6f73dfd
                                          • Opcode Fuzzy Hash: 475da8323783d86df435f1e1a4bef4774ee277a60cf8069c78d58bf289244f3b
                                          • Instruction Fuzzy Hash: 6A412939700691ABDB217BFA9C45FBE7AE5EF41330F28422AF419D73D2E63488419671
                                          APIs
                                          • GetWindowRect.USER32(012CE298,?), ref: 00E362E2
                                          • ScreenToClient.USER32(?,?), ref: 00E36315
                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00E36382
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$ClientMoveRectScreen
                                          • String ID:
                                          • API String ID: 3880355969-0
                                          • Opcode ID: ff4cc91abbbf7e5a098ade1411d697e5e79f0dffa08d17908a22ea5aaab4266a
                                          • Instruction ID: 3850720578b76cd407e2a93bcfcbf8366c338be4b53a2d63c0a8631a1dadacd1
                                          • Opcode Fuzzy Hash: ff4cc91abbbf7e5a098ade1411d697e5e79f0dffa08d17908a22ea5aaab4266a
                                          • Instruction Fuzzy Hash: 6F514C75900209AFCF10DF68D8889AE7FB5FF85364F209159F915AB2A0D730ED81CB50
                                          APIs
                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00E21AFD
                                          • WSAGetLastError.WSOCK32 ref: 00E21B0B
                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00E21B8A
                                          • WSAGetLastError.WSOCK32 ref: 00E21B94
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorLast$socket
                                          • String ID:
                                          • API String ID: 1881357543-0
                                          • Opcode ID: 18df843e2bbdd8cd2dc149abc615e7fec2134e5a939f99717c964bd645e0bfe9
                                          • Instruction ID: 836b840f30e39d8fcd4f6498fe34e323a3ba3efe21e18230b07daeb43c6e2834
                                          • Opcode Fuzzy Hash: 18df843e2bbdd8cd2dc149abc615e7fec2134e5a939f99717c964bd645e0bfe9
                                          • Instruction Fuzzy Hash: 5741B334600210AFE720AF24D886F667BE5EF45718F548498F91AAF3D3D772ED418BA0
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 000ee2c6c46ac30dc2fb41dc3d6ce2be32c305e212ca9b4af1f8e4439bc7d957
                                          • Instruction ID: 2787df88f22a92946db98a812ce94828ff83e3d43299f745b6a79d57585ab1b9
                                          • Opcode Fuzzy Hash: 000ee2c6c46ac30dc2fb41dc3d6ce2be32c305e212ca9b4af1f8e4439bc7d957
                                          • Instruction Fuzzy Hash: DC41D175A00744EFD724EF78C841BAABBA9EB88728F11452FF141DB382D771990187B0
                                          APIs
                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00E15783
                                          • GetLastError.KERNEL32(?,00000000), ref: 00E157A9
                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00E157CE
                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00E157FA
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                          • String ID:
                                          • API String ID: 3321077145-0
                                          • Opcode ID: 495fb00b339d13040e42798ac947c341d5b404c295c14ae7714774c1bef3fa5c
                                          • Instruction ID: f8c89f485393a071b5df2829127b5cbb8afe4352ac50ad29c2a7f8eb64d9e55e
                                          • Opcode Fuzzy Hash: 495fb00b339d13040e42798ac947c341d5b404c295c14ae7714774c1bef3fa5c
                                          • Instruction Fuzzy Hash: 40411035600610DFCB11EF15C545A5EBBE2EF89724F19C498E84A6B3A2CB34FD41CBA1
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00DC6D71,00000000,00000000,00DC82D9,?,00DC82D9,?,00000001,00DC6D71,8BE85006,00000001,00DC82D9,00DC82D9), ref: 00DDD910
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00DDD999
                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00DDD9AB
                                          • __freea.LIBCMT ref: 00DDD9B4
                                            • Part of subcall function 00DD3820: RtlAllocateHeap.NTDLL(00000000,?,00E71444,?,00DBFDF5,?,?,00DAA976,00000010,00E71440,00DA13FC,?,00DA13C6,?,00DA1129), ref: 00DD3852
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                          • String ID:
                                          • API String ID: 2652629310-0
                                          • Opcode ID: 66fc340948b8d2ea8ae53800c4b7a27e0cc527ccc3e83c59d357e210777dfc50
                                          • Instruction ID: 32e6d9dcf68710e9d843c7422f67944da97404f0358ee2e8726293b5511961e1
                                          • Opcode Fuzzy Hash: 66fc340948b8d2ea8ae53800c4b7a27e0cc527ccc3e83c59d357e210777dfc50
                                          • Instruction Fuzzy Hash: 8731D072A0020AABDF249F65DC95EAE7BA6EB40310F190169FC04E7250EB36DD54CBB0
                                          APIs
                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00E35352
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E35375
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E35382
                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E353A8
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: LongWindow$InvalidateMessageRectSend
                                          • String ID:
                                          • API String ID: 3340791633-0
                                          • Opcode ID: b8faca97373b5e109134853c6faef7e2132c3bf3d2ddbba0f783ef42414ddd43
                                          • Instruction ID: 1731f708764b5fd4234fe43f71ed769620390996196ca46e1f313b84f5952447
                                          • Opcode Fuzzy Hash: b8faca97373b5e109134853c6faef7e2132c3bf3d2ddbba0f783ef42414ddd43
                                          • Instruction Fuzzy Hash: C931E432A55A0CEFEB309B14CC0EBE83FA1EB05394F586501FA10B63E4C7B09980DB52
                                          APIs
                                          • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00E0ABF1
                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00E0AC0D
                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00E0AC74
                                          • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00E0ACC6
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: KeyboardState$InputMessagePostSend
                                          • String ID:
                                          • API String ID: 432972143-0
                                          • Opcode ID: f111c531450d3b721f76957ebb98d3ecc291834ccbcedb83af58e303fa14e1e9
                                          • Instruction ID: 8d1a0a84cab9d41b560381e4dd91d7737e982c6c2302b16f86576e434d352d95
                                          • Opcode Fuzzy Hash: f111c531450d3b721f76957ebb98d3ecc291834ccbcedb83af58e303fa14e1e9
                                          • Instruction Fuzzy Hash: 95311630A0471CAFFB35CB658C497FEBAA5AB49314F0D622AE485761D1C37489C58752
                                          APIs
                                          • ClientToScreen.USER32(?,?), ref: 00E3769A
                                          • GetWindowRect.USER32(?,?), ref: 00E37710
                                          • PtInRect.USER32(?,?,00E38B89), ref: 00E37720
                                          • MessageBeep.USER32(00000000), ref: 00E3778C
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Rect$BeepClientMessageScreenWindow
                                          • String ID:
                                          • API String ID: 1352109105-0
                                          • Opcode ID: b63e290e79b8a0124e341efce0bc34e1a51637a723169a9b0cf0164e92b2b67b
                                          • Instruction ID: 5376481da4f5e5a58619f7d81111e90725e39a2254ddef9b8f1c04fc9e5e4b1a
                                          • Opcode Fuzzy Hash: b63e290e79b8a0124e341efce0bc34e1a51637a723169a9b0cf0164e92b2b67b
                                          • Instruction Fuzzy Hash: 2E41BFB4605218EFCB21CF59C899EA97FF0FB48315F1550AAE594BB260C330E946CF90
                                          APIs
                                          • GetForegroundWindow.USER32 ref: 00E316EB
                                            • Part of subcall function 00E03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E03A57
                                            • Part of subcall function 00E03A3D: GetCurrentThreadId.KERNEL32 ref: 00E03A5E
                                            • Part of subcall function 00E03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E025B3), ref: 00E03A65
                                          • GetCaretPos.USER32(?), ref: 00E316FF
                                          • ClientToScreen.USER32(00000000,?), ref: 00E3174C
                                          • GetForegroundWindow.USER32 ref: 00E31752
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                          • String ID:
                                          • API String ID: 2759813231-0
                                          • Opcode ID: 7a3055643f9844cd7a34955ef8d91053dfa2fd7604b76872cf3f4a97cc393639
                                          • Instruction ID: d140798a548adf1ef353b947a100c07da24e23c7c0af24b268e0554b9248a128
                                          • Opcode Fuzzy Hash: 7a3055643f9844cd7a34955ef8d91053dfa2fd7604b76872cf3f4a97cc393639
                                          • Instruction Fuzzy Hash: B9313071D00149AFC700DFA9C885CAEBBF9EF89304B5480AAE415E7251D631DE45CBA0
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00E0D501
                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00E0D50F
                                          • Process32NextW.KERNEL32(00000000,?), ref: 00E0D52F
                                          • CloseHandle.KERNEL32(00000000), ref: 00E0D5DC
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 420147892-0
                                          • Opcode ID: 73594d85816b14d9e2ee8d437dbf74d2a44287ad7302105195ed1b094f543dbe
                                          • Instruction ID: 2d7ed03e4ddf357ca05d561f7041302031214700b0ef41ced37bda32fe19c761
                                          • Opcode Fuzzy Hash: 73594d85816b14d9e2ee8d437dbf74d2a44287ad7302105195ed1b094f543dbe
                                          • Instruction Fuzzy Hash: 633170711082009FD300EF64CC95AAFBBF8EF9A354F14052DF581A61A1EB71D989CBA2
                                          APIs
                                            • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                                          • GetCursorPos.USER32(?), ref: 00E39001
                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00DF7711,?,?,?,?,?), ref: 00E39016
                                          • GetCursorPos.USER32(?), ref: 00E3905E
                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00DF7711,?,?,?), ref: 00E39094
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                          • String ID:
                                          • API String ID: 2864067406-0
                                          • Opcode ID: b34b3d930ce0f35a7b01bdd699cb0e7353847b0ee1ea3a1d47736a7ca792eb71
                                          • Instruction ID: 20e67bbca033557fca52328603a72be18e25dbf26f801b849be65f0b7fc311d0
                                          • Opcode Fuzzy Hash: b34b3d930ce0f35a7b01bdd699cb0e7353847b0ee1ea3a1d47736a7ca792eb71
                                          • Instruction Fuzzy Hash: D721BF35600218FFDB298F99C85CEFA7FB9EB89350F104055F905672A2C3B59990DF60
                                          APIs
                                          • GetFileAttributesW.KERNEL32(?,00E3CB68), ref: 00E0D2FB
                                          • GetLastError.KERNEL32 ref: 00E0D30A
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E0D319
                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00E3CB68), ref: 00E0D376
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                          • String ID:
                                          • API String ID: 2267087916-0
                                          • Opcode ID: 9a36f0f2103d63d61c54350df92006cf643fbfd50b3eab037e4f72bb85128a82
                                          • Instruction ID: 2a4fe763f1adc48c67229b1c51cf8e14e082cf94f3d74683894b8965635acdca
                                          • Opcode Fuzzy Hash: 9a36f0f2103d63d61c54350df92006cf643fbfd50b3eab037e4f72bb85128a82
                                          • Instruction Fuzzy Hash: 08217E705083019FC700DF68C8854AABBE4EF56768F205A19F499E32E1D734D98ACBA3
                                          APIs
                                            • Part of subcall function 00E01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E0102A
                                            • Part of subcall function 00E01014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E01036
                                            • Part of subcall function 00E01014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E01045
                                            • Part of subcall function 00E01014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E0104C
                                            • Part of subcall function 00E01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E01062
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00E015BE
                                          • _memcmp.LIBVCRUNTIME ref: 00E015E1
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E01617
                                          • HeapFree.KERNEL32(00000000), ref: 00E0161E
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                          • String ID:
                                          • API String ID: 1592001646-0
                                          • Opcode ID: 7fa4cb380dd663cd7eea346b0dd3c8489f3e3a08b63a8f112d42d955c4b9b7bb
                                          • Instruction ID: c3b9a637ea2562fc1722c72794374b139dc97db9c073cb53b6045dbe53114942
                                          • Opcode Fuzzy Hash: 7fa4cb380dd663cd7eea346b0dd3c8489f3e3a08b63a8f112d42d955c4b9b7bb
                                          • Instruction Fuzzy Hash: 68217A31E00109AFDB14DFA4DD49BEEB7B8EF44348F184499E441BB281E731AA85DBA0
                                          APIs
                                          • GetWindowLongW.USER32(?,000000EC), ref: 00E3280A
                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E32824
                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E32832
                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00E32840
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$Long$AttributesLayered
                                          • String ID:
                                          • API String ID: 2169480361-0
                                          • Opcode ID: f82e1be613ddd38fd6c618994dc8703317ccbe5ded870f4dbbf362104592cf70
                                          • Instruction ID: 30dbdf21cb49324033234d240c7599a4b1798d560d07b398cb733e471c69a5fc
                                          • Opcode Fuzzy Hash: f82e1be613ddd38fd6c618994dc8703317ccbe5ded870f4dbbf362104592cf70
                                          • Instruction Fuzzy Hash: 4821F131604110AFD7149B24C848FAA7F95EF85324F24815DF566AB2E2C771FC42C7A0
                                          APIs
                                            • Part of subcall function 00E08D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00E0790A,?,000000FF,?,00E08754,00000000,?,0000001C,?,?), ref: 00E08D8C
                                            • Part of subcall function 00E08D7D: lstrcpyW.KERNEL32(00000000,?,?,00E0790A,?,000000FF,?,00E08754,00000000,?,0000001C,?,?,00000000), ref: 00E08DB2
                                            • Part of subcall function 00E08D7D: lstrcmpiW.KERNEL32(00000000,?,00E0790A,?,000000FF,?,00E08754,00000000,?,0000001C,?,?), ref: 00E08DE3
                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00E08754,00000000,?,0000001C,?,?,00000000), ref: 00E07923
                                          • lstrcpyW.KERNEL32(00000000,?,?,00E08754,00000000,?,0000001C,?,?,00000000), ref: 00E07949
                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00E08754,00000000,?,0000001C,?,?,00000000), ref: 00E07984
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: lstrcmpilstrcpylstrlen
                                          • String ID: cdecl
                                          • API String ID: 4031866154-3896280584
                                          • Opcode ID: 29d70477166fe5c76c2c0638a2860bfb783748cc1907f088e477546acaf3c777
                                          • Instruction ID: a422009ecfb358af8926a54ef6d3e2a907a7990b09892a7f03295a472a81f435
                                          • Opcode Fuzzy Hash: 29d70477166fe5c76c2c0638a2860bfb783748cc1907f088e477546acaf3c777
                                          • Instruction Fuzzy Hash: 8711263A200302AFCB159F39DC45D7A77E9FF85394B50502AF982D72A4EB31E851D7A1
                                          APIs
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E37D0B
                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00E37D2A
                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00E37D42
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00E1B7AD,00000000), ref: 00E37D6B
                                            • Part of subcall function 00DB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DB9BB2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$Long
                                          • String ID:
                                          • API String ID: 847901565-0
                                          • Opcode ID: 87ef612f9efd9a18b18be307bfb052664d33a59847823be8e6e8f09228562873
                                          • Instruction ID: f35119618bbf367a6cd589af97f3f6de235445864c8633ca1403b5b867b6efc3
                                          • Opcode Fuzzy Hash: 87ef612f9efd9a18b18be307bfb052664d33a59847823be8e6e8f09228562873
                                          • Instruction Fuzzy Hash: 8311DF72204658AFCB208F29CC08AA63FA4AF86364F619324F979F72F0D731C951DB50
                                          APIs
                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 00E356BB
                                          • _wcslen.LIBCMT ref: 00E356CD
                                          • _wcslen.LIBCMT ref: 00E356D8
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E35816
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend_wcslen
                                          • String ID:
                                          • API String ID: 455545452-0
                                          • Opcode ID: fad4db8c03fabb168fd488fbdc464556b6d6d08d4b78787d7dd98afc9077e368
                                          • Instruction ID: 7238f918924abbb5bc3e819d9fac5d951165b512f2ebe614c6ceaf419921d813
                                          • Opcode Fuzzy Hash: fad4db8c03fabb168fd488fbdc464556b6d6d08d4b78787d7dd98afc9077e368
                                          • Instruction Fuzzy Hash: D711067260061896DB20DF65CC89AFE3FACEF01764F10506AF916F6281EB70CA84CF61
                                          APIs
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00E01A47
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E01A59
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E01A6F
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E01A8A
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: 0dbf221e9f943609986b356497a295565a4b8a5b1e2e9d74e0f34a53f777efdd
                                          • Instruction ID: d1c641b805278a0215c4ce830d7efb789f5c77efa5e65f845472e8a41fcd6297
                                          • Opcode Fuzzy Hash: 0dbf221e9f943609986b356497a295565a4b8a5b1e2e9d74e0f34a53f777efdd
                                          • Instruction Fuzzy Hash: DF11FA3AA01219FFEB119BA5CD85FADBB78EB04754F200091E604B7290D6716E50DB94
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 00E0E1FD
                                          • MessageBoxW.USER32(?,?,?,?), ref: 00E0E230
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00E0E246
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00E0E24D
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                          • String ID:
                                          • API String ID: 2880819207-0
                                          • Opcode ID: 7d5a65e4ca6009ab1024005917ffa48905ee5b741bd749943a44fe8510e62e5e
                                          • Instruction ID: 611a4ff86c4babe2ce66de9925e7e93dde851cba3cbc8add3e4f64eb5cb36dc0
                                          • Opcode Fuzzy Hash: 7d5a65e4ca6009ab1024005917ffa48905ee5b741bd749943a44fe8510e62e5e
                                          • Instruction Fuzzy Hash: E011E572904318BFC701DBA9AC09A9A7FAC9B45314F1146A9F814F3391D270C94887A0
                                          APIs
                                          • CreateThread.KERNEL32(00000000,?,00DCCFF9,00000000,00000004,00000000), ref: 00DCD218
                                          • GetLastError.KERNEL32 ref: 00DCD224
                                          • __dosmaperr.LIBCMT ref: 00DCD22B
                                          • ResumeThread.KERNEL32(00000000), ref: 00DCD249
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                          • String ID:
                                          • API String ID: 173952441-0
                                          • Opcode ID: e767b97bd15239a73e6190a7279d01c08e6f0699455d779bad26fedd02da584f
                                          • Instruction ID: 9874d9f1bc8c8aacba3343ab7bb4c2a9734a2ccb687c61de9c1e6381fd5187bb
                                          • Opcode Fuzzy Hash: e767b97bd15239a73e6190a7279d01c08e6f0699455d779bad26fedd02da584f
                                          • Instruction Fuzzy Hash: C501D67640520A7FC7115BA5DC09FAABA6EDF81730F24022DF925A71D0CB70C905D7B0
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00DA604C
                                          • GetStockObject.GDI32(00000011), ref: 00DA6060
                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA606A
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CreateMessageObjectSendStockWindow
                                          • String ID:
                                          • API String ID: 3970641297-0
                                          • Opcode ID: 56b86abc938ae293d22091c936f632dc49141e5d62cc730683d83a906b4f783d
                                          • Instruction ID: 42a99eb6678b1878b65f9fc673dd060126b25170492fbf00ec9464ae2d9442af
                                          • Opcode Fuzzy Hash: 56b86abc938ae293d22091c936f632dc49141e5d62cc730683d83a906b4f783d
                                          • Instruction Fuzzy Hash: 2611A172101508FFEF124FA59C44EEA7F69EF09354F180106FA1462010C732DCA0DBA0
                                          APIs
                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00DC3B56
                                            • Part of subcall function 00DC3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00DC3AD2
                                            • Part of subcall function 00DC3AA3: ___AdjustPointer.LIBCMT ref: 00DC3AED
                                          • _UnwindNestedFrames.LIBCMT ref: 00DC3B6B
                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00DC3B7C
                                          • CallCatchBlock.LIBVCRUNTIME ref: 00DC3BA4
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                          • String ID:
                                          • API String ID: 737400349-0
                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                          • Instruction ID: 826a2a38832371434e43d63f92d28643513e5eaaab500a9b114ea54061717a8e
                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                          • Instruction Fuzzy Hash: FD01D73210014ABBDF125E95CC46EEB7B6EEF58754F048018FE4897121C632E961ABB0
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00DA13C6,00000000,00000000,?,00DD301A,00DA13C6,00000000,00000000,00000000,?,00DD328B,00000006,FlsSetValue), ref: 00DD30A5
                                          • GetLastError.KERNEL32(?,00DD301A,00DA13C6,00000000,00000000,00000000,?,00DD328B,00000006,FlsSetValue,00E42290,FlsSetValue,00000000,00000364,?,00DD2E46), ref: 00DD30B1
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00DD301A,00DA13C6,00000000,00000000,00000000,?,00DD328B,00000006,FlsSetValue,00E42290,FlsSetValue,00000000), ref: 00DD30BF
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID:
                                          • API String ID: 3177248105-0
                                          • Opcode ID: 793afb764485d0b8e301b52f606295ab3143506bd418eb4e441c9d227d5602eb
                                          • Instruction ID: f066753e8fadfbb10447ae0b981c5788df873859dafb67621d783cc4294d56b1
                                          • Opcode Fuzzy Hash: 793afb764485d0b8e301b52f606295ab3143506bd418eb4e441c9d227d5602eb
                                          • Instruction Fuzzy Hash: 49012B32301626AFCB314FBAAC48A777B98AF05BA1B280621F905F3390C721D945C7F1
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00E0747F
                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00E07497
                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00E074AC
                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00E074CA
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Type$Register$FileLoadModuleNameUser
                                          • String ID:
                                          • API String ID: 1352324309-0
                                          • Opcode ID: f8e03fe767d189af9dc61ebf1110eba5f5264a73807d1d5e809b6da89c90bf94
                                          • Instruction ID: 59224724d7a42d4c8db3ce3f829b2b7020472c30ad268bc604f35f74ee6d3a09
                                          • Opcode Fuzzy Hash: f8e03fe767d189af9dc61ebf1110eba5f5264a73807d1d5e809b6da89c90bf94
                                          • Instruction Fuzzy Hash: AF1161B5A053159FE7208F15DC09B927FFCEB00B04F109569A6A6F6191D7B0F948DB60
                                          APIs
                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00E0ACD3,?,00008000), ref: 00E0B0C4
                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00E0ACD3,?,00008000), ref: 00E0B0E9
                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00E0ACD3,?,00008000), ref: 00E0B0F3
                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00E0ACD3,?,00008000), ref: 00E0B126
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CounterPerformanceQuerySleep
                                          • String ID:
                                          • API String ID: 2875609808-0
                                          • Opcode ID: 664f290ea274e0f9a4f868e49633f892885dd0ec715241b62c80f7d60e45875a
                                          • Instruction ID: fdb215b51275d008947692e5cdfb96745b656a4efccfcd331440adc31874c59b
                                          • Opcode Fuzzy Hash: 664f290ea274e0f9a4f868e49633f892885dd0ec715241b62c80f7d60e45875a
                                          • Instruction Fuzzy Hash: 66116131C0252CDBCF049FE5E9586EEBF78FF19711F105085D941B3181CB3095949B51
                                          APIs
                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00E02DC5
                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E02DD6
                                          • GetCurrentThreadId.KERNEL32 ref: 00E02DDD
                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00E02DE4
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                          • String ID:
                                          • API String ID: 2710830443-0
                                          • Opcode ID: 08ad649302ac34ef132221c173829aa013bbb5a9595cdeb2290e88bdef7f31ae
                                          • Instruction ID: 35adc490583e5ab808c8c66d637d1beae160102cfd483176a2f94d7f8c840a7b
                                          • Opcode Fuzzy Hash: 08ad649302ac34ef132221c173829aa013bbb5a9595cdeb2290e88bdef7f31ae
                                          • Instruction Fuzzy Hash: 45E06D711012287BDB201B639C0EEEB3EACEB42FA1F101019B206F10809AA1C884C7B0
                                          APIs
                                            • Part of subcall function 00DB9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DB9693
                                            • Part of subcall function 00DB9639: SelectObject.GDI32(?,00000000), ref: 00DB96A2
                                            • Part of subcall function 00DB9639: BeginPath.GDI32(?), ref: 00DB96B9
                                            • Part of subcall function 00DB9639: SelectObject.GDI32(?,00000000), ref: 00DB96E2
                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00E38887
                                          • LineTo.GDI32(?,?,?), ref: 00E38894
                                          • EndPath.GDI32(?), ref: 00E388A4
                                          • StrokePath.GDI32(?), ref: 00E388B2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                          • String ID:
                                          • API String ID: 1539411459-0
                                          • Opcode ID: a614d52f7d9e167440710394ae7c1abdae5517ac85cf10b07a0b1fafe6acf135
                                          • Instruction ID: 8c9f269fa24fbf0218b1912ccc5c443a40d58eb51ade3a18bbd86f8e1c5d4f8b
                                          • Opcode Fuzzy Hash: a614d52f7d9e167440710394ae7c1abdae5517ac85cf10b07a0b1fafe6acf135
                                          • Instruction Fuzzy Hash: 75F09A36001298FADB125F99AC0DFCA3F29AF46310F508000FB02750E2C7748555CFA5
                                          APIs
                                          • GetSysColor.USER32(00000008), ref: 00DB98CC
                                          • SetTextColor.GDI32(?,?), ref: 00DB98D6
                                          • SetBkMode.GDI32(?,00000001), ref: 00DB98E9
                                          • GetStockObject.GDI32(00000005), ref: 00DB98F1
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Color$ModeObjectStockText
                                          • String ID:
                                          • API String ID: 4037423528-0
                                          • Opcode ID: eb74321b567b0db36cd2f374bad5ddb23458d6c67974270db71aa383bc780b45
                                          • Instruction ID: 0f8552593cfe7f54a8f6792313190753e4039c5e2586ac86c310bcce9ed45253
                                          • Opcode Fuzzy Hash: eb74321b567b0db36cd2f374bad5ddb23458d6c67974270db71aa383bc780b45
                                          • Instruction Fuzzy Hash: 8BE06531244288AEDF215B75AC0DBE83F21AB11335F18C219F7FA740E1C37186449B20
                                          APIs
                                          • GetCurrentThread.KERNEL32 ref: 00E01634
                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00E011D9), ref: 00E0163B
                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00E011D9), ref: 00E01648
                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00E011D9), ref: 00E0164F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CurrentOpenProcessThreadToken
                                          • String ID:
                                          • API String ID: 3974789173-0
                                          • Opcode ID: 8028fbc908995ebefd345b7fda9f2bfb753c894825fb2f2a01cf53b8cbac43d0
                                          • Instruction ID: e41682bfc199fcf52914b21479848d344052e5229681cc181d2994cf7c1237d5
                                          • Opcode Fuzzy Hash: 8028fbc908995ebefd345b7fda9f2bfb753c894825fb2f2a01cf53b8cbac43d0
                                          • Instruction Fuzzy Hash: DEE04632602215AFD7201BA2AE0DB863F78AF44796F248848F245F9090E624C4898B60
                                          APIs
                                          • GetDesktopWindow.USER32 ref: 00DFD858
                                          • GetDC.USER32(00000000), ref: 00DFD862
                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DFD882
                                          • ReleaseDC.USER32(?), ref: 00DFD8A3
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CapsDesktopDeviceReleaseWindow
                                          • String ID:
                                          • API String ID: 2889604237-0
                                          • Opcode ID: 92635837dc7d2e4f5c8963f6dac547f0fca392ecf74e4f7b1dd4aac98f477529
                                          • Instruction ID: 9721e67bb94a4108a7a6650d5e70bf593df2583157b32c0310d1de3600ea4dac
                                          • Opcode Fuzzy Hash: 92635837dc7d2e4f5c8963f6dac547f0fca392ecf74e4f7b1dd4aac98f477529
                                          • Instruction Fuzzy Hash: 0DE01AB1800208DFCB41AFA1D80D66DBFB2FB08710F208409F846F7260C738C906AF60
                                          APIs
                                          • GetDesktopWindow.USER32 ref: 00DFD86C
                                          • GetDC.USER32(00000000), ref: 00DFD876
                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00DFD882
                                          • ReleaseDC.USER32(?), ref: 00DFD8A3
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CapsDesktopDeviceReleaseWindow
                                          • String ID:
                                          • API String ID: 2889604237-0
                                          • Opcode ID: 3ae68ed376fa1d4d88d32e6004a257eb0beef86a40e77ecf4ac22f785ef81038
                                          • Instruction ID: 3f8e5fc8ef314657cb8ece6f9929913c9044a42c8bbb3635c6e6b164dfee2bb6
                                          • Opcode Fuzzy Hash: 3ae68ed376fa1d4d88d32e6004a257eb0beef86a40e77ecf4ac22f785ef81038
                                          • Instruction Fuzzy Hash: 31E01A71800208DFCB40AFA1D80D66DBFB1FB08710F208408F846F7260C73899069F50
                                          APIs
                                            • Part of subcall function 00DA7620: _wcslen.LIBCMT ref: 00DA7625
                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00E14ED4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Connection_wcslen
                                          • String ID: *$LPT
                                          • API String ID: 1725874428-3443410124
                                          • Opcode ID: a71fb69e659b297e6aa62e5295c12057580361e799b37a24dc964d9225a44cd3
                                          • Instruction ID: 765e51ea637fb8348ca5b57af1d6cd6983c67d7a33a0f208239dc5cbd310583f
                                          • Opcode Fuzzy Hash: a71fb69e659b297e6aa62e5295c12057580361e799b37a24dc964d9225a44cd3
                                          • Instruction Fuzzy Hash: B89140B5A002049FCB14DF54C484EE9BBF5EF49318F199099E4066F392D731ED86CB61
                                          APIs
                                          • __startOneArgErrorHandling.LIBCMT ref: 00DCE30D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ErrorHandling__start
                                          • String ID: pow
                                          • API String ID: 3213639722-2276729525
                                          • Opcode ID: b3eab3a632270696b9c94858cef0c59d1f0891036ceac836a3b49d53117c93f0
                                          • Instruction ID: bd45df713a731b28344e846a01a3f734322b8c3e64b2b0f689c0319fe63ed5de
                                          • Opcode Fuzzy Hash: b3eab3a632270696b9c94858cef0c59d1f0891036ceac836a3b49d53117c93f0
                                          • Instruction Fuzzy Hash: BD513BA1A0C203DACB157714C901B796B94EB40741F684DDEF0D5933A9FB34CC969A76
                                          APIs
                                          • CharUpperBuffW.USER32(00DF569E,00000000,?,00E3CC08,?,00000000,00000000), ref: 00E278DD
                                            • Part of subcall function 00DA6B57: _wcslen.LIBCMT ref: 00DA6B6A
                                          • CharUpperBuffW.USER32(00DF569E,00000000,?,00E3CC08,00000000,?,00000000,00000000), ref: 00E2783B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: BuffCharUpper$_wcslen
                                          • String ID: <s
                                          • API String ID: 3544283678-2940880691
                                          • Opcode ID: 1f83f7920ab21e710fc0118660f730baab8bec1ea79a6656fd7d025ee2d93905
                                          • Instruction ID: 29233f576acd83f91d21b27e19517a4b36e84322e55297a10509a9ef6299f7b2
                                          • Opcode Fuzzy Hash: 1f83f7920ab21e710fc0118660f730baab8bec1ea79a6656fd7d025ee2d93905
                                          • Instruction Fuzzy Hash: E8614A32914228EACF04EBA4DC91DFDB374FF55304B546129E582B7191EF24AA49CBB0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: #
                                          • API String ID: 0-1885708031
                                          • Opcode ID: 6a208ef16a588f67832febbeb231e8b5c0594ebea290b9ed92f8be6cac7600dc
                                          • Instruction ID: 8859413911fe2600e5127591295fa0742e67adc8da864594554a88eea8ee9b74
                                          • Opcode Fuzzy Hash: 6a208ef16a588f67832febbeb231e8b5c0594ebea290b9ed92f8be6cac7600dc
                                          • Instruction Fuzzy Hash: 2D51233550425ADFDB19EF28C481AFE7BA5EF56310F288065E9929B2E0D734DD42CBB0
                                          APIs
                                          • Sleep.KERNEL32(00000000), ref: 00DBF2A2
                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00DBF2BB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: GlobalMemorySleepStatus
                                          • String ID: @
                                          • API String ID: 2783356886-2766056989
                                          • Opcode ID: bec69cd53e977925e2d21fa9815590596e112a07ec2e56cab6428b255c270897
                                          • Instruction ID: 2fbd9d94d47b0eb8a0e6a68d6d84f7c410cd2c661d61604f8bb738aeafe86620
                                          • Opcode Fuzzy Hash: bec69cd53e977925e2d21fa9815590596e112a07ec2e56cab6428b255c270897
                                          • Instruction Fuzzy Hash: C55132724187889FD320AF11DC86BABBBF8FF85310F81885DF199511A5EB7085298B66
                                          APIs
                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00E257E0
                                          • _wcslen.LIBCMT ref: 00E257EC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: BuffCharUpper_wcslen
                                          • String ID: CALLARGARRAY
                                          • API String ID: 157775604-1150593374
                                          • Opcode ID: f99d9a6a04e35d78f234756ebf28d26e352eefb161137f31be58d5bdf6811d4a
                                          • Instruction ID: a87c38a1a966117e37fb0ec720d582da9d490512bb79c7a63512760c04c50430
                                          • Opcode Fuzzy Hash: f99d9a6a04e35d78f234756ebf28d26e352eefb161137f31be58d5bdf6811d4a
                                          • Instruction Fuzzy Hash: 76418E32E002199FCB08DFA8D9869FEBBF5EF59324F145029E505B7291D7749D81CBA0
                                          APIs
                                          • _wcslen.LIBCMT ref: 00E1D130
                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00E1D13A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CrackInternet_wcslen
                                          • String ID: |
                                          • API String ID: 596671847-2343686810
                                          • Opcode ID: 2697da73173091b5c871b73c32c0cb4fc33683d637cd78bd0988d23ec3b6f632
                                          • Instruction ID: 6b372c969d94efd3b9e04bafa93088c277c4ed71aafa769b850ceb83d1877841
                                          • Opcode Fuzzy Hash: 2697da73173091b5c871b73c32c0cb4fc33683d637cd78bd0988d23ec3b6f632
                                          • Instruction Fuzzy Hash: 92312A72D01219ABCF15EFA4CC85AEEBFB9FF05304F104019F815B6166EB35AA46CB60
                                          APIs
                                          • DestroyWindow.USER32(?,?,?,?), ref: 00E33621
                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00E3365C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$DestroyMove
                                          • String ID: static
                                          • API String ID: 2139405536-2160076837
                                          • Opcode ID: 3ae39503fb4aa9ef3b91ef25f8ecb2715e9c4fef0eab87d7dd4243dc5d8e3e92
                                          • Instruction ID: cf945a2d4510c73630e4673fde44faba0464509f2facf20a340bfea943cdbebf
                                          • Opcode Fuzzy Hash: 3ae39503fb4aa9ef3b91ef25f8ecb2715e9c4fef0eab87d7dd4243dc5d8e3e92
                                          • Instruction Fuzzy Hash: D4317C71110204AEDB24DF38DC45EBB77A9FF88724F10A619F9A5A7290DA31E991C760
                                          APIs
                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00E3461F
                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E34634
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: '
                                          • API String ID: 3850602802-1997036262
                                          • Opcode ID: aa3de6511815235eb8f36ea8a549b4c517a9a88ff000109d7ebc761ccd522a5d
                                          • Instruction ID: 2d67c6ac6225cdea8329dae6d42459dc9c9472e42b2d80dcc170f37fc1239539
                                          • Opcode Fuzzy Hash: aa3de6511815235eb8f36ea8a549b4c517a9a88ff000109d7ebc761ccd522a5d
                                          • Instruction Fuzzy Hash: 4F3138B5E00309AFDB14CFA9C985BDABBB5FF49304F10506AE904AB381D770A941CF90
                                          APIs
                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00E3327C
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E33287
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: Combobox
                                          • API String ID: 3850602802-2096851135
                                          • Opcode ID: cb186efecfdb87492124536a8dcbcadfb09eae93a4a6b42ef5d9120aa1224679
                                          • Instruction ID: 2d29dcf9ba481c0fa6dcfe958f3ef9775d54b1f4bb854382e219317a751e9268
                                          • Opcode Fuzzy Hash: cb186efecfdb87492124536a8dcbcadfb09eae93a4a6b42ef5d9120aa1224679
                                          • Instruction Fuzzy Hash: 851193713002086FEF259E64DC89EBB3B5AEB54368F105628F518B72A1D6719D51C760
                                          APIs
                                            • Part of subcall function 00DA600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00DA604C
                                            • Part of subcall function 00DA600E: GetStockObject.GDI32(00000011), ref: 00DA6060
                                            • Part of subcall function 00DA600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DA606A
                                          • GetWindowRect.USER32(00000000,?), ref: 00E3377A
                                          • GetSysColor.USER32(00000012), ref: 00E33794
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                          • String ID: static
                                          • API String ID: 1983116058-2160076837
                                          • Opcode ID: 28e45d39bf1d238c1bd1a246d51122137a1afb6fdac578e0843316fb0096cb46
                                          • Instruction ID: 1ac92a3e525ad43f2f126ef4a79a5771218b868a802c4b83a0304b339d0690e3
                                          • Opcode Fuzzy Hash: 28e45d39bf1d238c1bd1a246d51122137a1afb6fdac578e0843316fb0096cb46
                                          • Instruction Fuzzy Hash: 941126B2610209AFDF00DFB8CC4AEEA7BB8EB08314F105925F955E2250E735E865DB60
                                          APIs
                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00E1CD7D
                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00E1CDA6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Internet$OpenOption
                                          • String ID: <local>
                                          • API String ID: 942729171-4266983199
                                          • Opcode ID: 3759e68b6aead903a129a66f249df5fbca3968926706af3555e3b86e167d2111
                                          • Instruction ID: e685677b423b611faf9a02871e26f6c0a90610aa0146723aeac215a37deed68d
                                          • Opcode Fuzzy Hash: 3759e68b6aead903a129a66f249df5fbca3968926706af3555e3b86e167d2111
                                          • Instruction Fuzzy Hash: D01106B12816357AD7344B66AC48EE7BE6CEF127A8F206226B109E3080D37098C1D6F0
                                          APIs
                                          • GetWindowTextLengthW.USER32(00000000), ref: 00E334AB
                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00E334BA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: LengthMessageSendTextWindow
                                          • String ID: edit
                                          • API String ID: 2978978980-2167791130
                                          • Opcode ID: 98199496fcfacefc98f3d04a8764b6516b11a5a9aade17147e25b197e5225651
                                          • Instruction ID: 3522a816177f301f0da6c8da83a2ae7a477a9ece948d19069ff055429638de42
                                          • Opcode Fuzzy Hash: 98199496fcfacefc98f3d04a8764b6516b11a5a9aade17147e25b197e5225651
                                          • Instruction Fuzzy Hash: 12115B71100208AFEB118F749C48EAA3BAAEB05778F616324F975B31E0C671DC95D761
                                          APIs
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                          • CharUpperBuffW.USER32(?,?,?), ref: 00E06CB6
                                          • _wcslen.LIBCMT ref: 00E06CC2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen$BuffCharUpper
                                          • String ID: STOP
                                          • API String ID: 1256254125-2411985666
                                          • Opcode ID: c5f2e1997c29c16471b85a5561ced9e6a5a740ef8d69a6dd8f8ec869d7d6274a
                                          • Instruction ID: f74b10393a5f56da4332ed1f6375ab8459c227a6989f44a0ec459d7ef356e82a
                                          • Opcode Fuzzy Hash: c5f2e1997c29c16471b85a5561ced9e6a5a740ef8d69a6dd8f8ec869d7d6274a
                                          • Instruction Fuzzy Hash: 6B01C4327005268BDB20AFFDDC91BBFB7B5EB617147101929E852B71D4EB31D9A0C660
                                          APIs
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                            • Part of subcall function 00E03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E03CCA
                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00E01D4C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 624084870-1403004172
                                          • Opcode ID: b132eba0a0d72553692cc1669b7d46922d5a0c1fe54e2b7a4be7400a03fb432d
                                          • Instruction ID: 60891fc7af1a10e2c250e32c1b76dc32bd808dab9417fdf83a12f8d15c488f35
                                          • Opcode Fuzzy Hash: b132eba0a0d72553692cc1669b7d46922d5a0c1fe54e2b7a4be7400a03fb432d
                                          • Instruction Fuzzy Hash: BF01D871641219ABCB14EBB4CC65CFEB7A8EB47394B141559F8227B2C1EA3059488771
                                          APIs
                                            • Part of subcall function 00DA9CB3: _wcslen.LIBCMT ref: 00DA9CBD
                                            • Part of subcall function 00E03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E03CCA
                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00E01C46
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_wcslen
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 624084870-1403004172
                                          • Opcode ID: dac05482444c9a410848ca5943b59b599af63b1484921dd424de62522794a9ef
                                          • Instruction ID: 87c7e3337aec50ce2cda27071b4e68cceb8e5e0704aea8932610a8492031e73d
                                          • Opcode Fuzzy Hash: dac05482444c9a410848ca5943b59b599af63b1484921dd424de62522794a9ef
                                          • Instruction Fuzzy Hash: 4C01AC7578110467DB18E7A0C9A1AFFF7A8DB12380F141055B406771C1EA24DE988671
                                          APIs
                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00E73018,00E7305C), ref: 00E381BF
                                          • CloseHandle.KERNEL32 ref: 00E381D1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CloseCreateHandleProcess
                                          • String ID: \0
                                          • API String ID: 3712363035-3218720685
                                          • Opcode ID: 155352378f49430b7a3a945749017f75bb27b4b2daa2805e85fd3b9f4c645b8f
                                          • Instruction ID: 41fcd9b17469a81a1511ed78d408f1b05e6b6445192a37312de47b4ad8106f8e
                                          • Opcode Fuzzy Hash: 155352378f49430b7a3a945749017f75bb27b4b2daa2805e85fd3b9f4c645b8f
                                          • Instruction Fuzzy Hash: 41F082B2640304BEE360A772AC4AFB73E5CDB05750F004464BB4CF61A2D6798E58A3F9
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: _wcslen
                                          • String ID: 3, 3, 16, 1
                                          • API String ID: 176396367-3042988571
                                          • Opcode ID: 3ee96e3fcc175425ccecf3927a702be196db14be2d6cccbd490f92e2228ececf
                                          • Instruction ID: 3b61b3cd0a35a9a88f6758368f8ba2d60738f2ca1b421a1464d36ce1533e2559
                                          • Opcode Fuzzy Hash: 3ee96e3fcc175425ccecf3927a702be196db14be2d6cccbd490f92e2228ececf
                                          • Instruction Fuzzy Hash: 2BE02B026043315092713279BCC1EBF5A89DFC57A4710382FF9D1E3266EEA48D9193B0
                                          APIs
                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00E00B23
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Message
                                          • String ID: AutoIt$Error allocating memory.
                                          • API String ID: 2030045667-4017498283
                                          • Opcode ID: 406ea104e0e749df61261acdf58a56cd9402c827796391ae716ce2a667644978
                                          • Instruction ID: 1280d2dc98e46dfd20ab8920044b4c88d4a314d3cdc3d7755e3e7e8417360555
                                          • Opcode Fuzzy Hash: 406ea104e0e749df61261acdf58a56cd9402c827796391ae716ce2a667644978
                                          • Instruction Fuzzy Hash: C8E04F322843186AD21437957C07FD97E88CF06B65F20146AFB98B55C38AE2A59087B9
                                          APIs
                                            • Part of subcall function 00DBF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00DC0D71,?,?,?,00DA100A), ref: 00DBF7CE
                                          • IsDebuggerPresent.KERNEL32(?,?,?,00DA100A), ref: 00DC0D75
                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00DA100A), ref: 00DC0D84
                                          Strings
                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00DC0D7F
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                          • API String ID: 55579361-631824599
                                          • Opcode ID: d094ff791877e081451b36af3d0127486442859169ea5680eabbe9ca1c790e3a
                                          • Instruction ID: da51ae4d2f0eddcbb060dcb57495a70b5ef3b6312ba452f08f17e4335d5736fe
                                          • Opcode Fuzzy Hash: d094ff791877e081451b36af3d0127486442859169ea5680eabbe9ca1c790e3a
                                          • Instruction Fuzzy Hash: 8EE039702007128FD3209FAAD8087427FE0AB00741F048A6DE887E7A61DBB4E4498BB1
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 00DBE3D5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: Init_thread_footer
                                          • String ID: 0%$8%
                                          • API String ID: 1385522511-2949748613
                                          • Opcode ID: f9b88c625c4f2e6f77664a54cb3a417c14a6e4e24c07670af4b8af4f88922879
                                          • Instruction ID: ed7a61a8c6a4a964a8a2137be7d62514e8730360d45fa766875290c75eecab09
                                          • Opcode Fuzzy Hash: f9b88c625c4f2e6f77664a54cb3a417c14a6e4e24c07670af4b8af4f88922879
                                          • Instruction Fuzzy Hash: 92E02631400A10CFC604E72AB855EC83391EB49329B14E16CE30BA72D39B30A881877A
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: LocalTime
                                          • String ID: %.3d$X64
                                          • API String ID: 481472006-1077770165
                                          • Opcode ID: 252fccbc31fc0d63322202faacaecc19b973e37bc3e054c0cde1fbf279b09029
                                          • Instruction ID: de6f776b0e3ea8e3b8141a49bb86acb5c077aa3f2e4b5441dbc250c0cf9757ed
                                          • Opcode Fuzzy Hash: 252fccbc31fc0d63322202faacaecc19b973e37bc3e054c0cde1fbf279b09029
                                          • Instruction Fuzzy Hash: 93D0126184810CE9CB5097D0DC498FAB77EEB09341F61C452FA87A1040E634C50867B5
                                          APIs
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E3236C
                                          • PostMessageW.USER32(00000000), ref: 00E32373
                                            • Part of subcall function 00E0E97B: Sleep.KERNEL32 ref: 00E0E9F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: FindMessagePostSleepWindow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 529655941-2988720461
                                          • Opcode ID: 185e42465629573856d2110fe374bbd2271db23848907742d24c71e2d7a6fe5a
                                          • Instruction ID: 975cf1803af7c6e4c72a831a03e680aa83231cf8b52798136394bacda2d32b36
                                          • Opcode Fuzzy Hash: 185e42465629573856d2110fe374bbd2271db23848907742d24c71e2d7a6fe5a
                                          • Instruction Fuzzy Hash: AAD0A9323C03007BE264A331AC0FFC67A049B40B00F1009127241BA1E0C8A0B8048B04
                                          APIs
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E3232C
                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00E3233F
                                            • Part of subcall function 00E0E97B: Sleep.KERNEL32 ref: 00E0E9F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.1315935792.0000000000DA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DA0000, based on PE: true
                                          • Associated: 00000003.00000002.1315833115.0000000000DA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316416009.0000000000E62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316757825.0000000000E6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000003.00000002.1316844520.0000000000E74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_da0000_4iDzhJBJVv.jbxd
                                          Similarity
                                          • API ID: FindMessagePostSleepWindow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 529655941-2988720461
                                          • Opcode ID: c330ed73c8e05f275dfda69ecab1f03779efe685a907c1ef4d1fb90b5ac694a7
                                          • Instruction ID: 2264cb500823642d04c6d678edd1d1dec68beb36cc77584c6d2efb5a82d3d29a
                                          • Opcode Fuzzy Hash: c330ed73c8e05f275dfda69ecab1f03779efe685a907c1ef4d1fb90b5ac694a7
                                          • Instruction Fuzzy Hash: 06D0C936394314BBE664A771AC0FFC67A549B50B10F1059167645BA1E0C9A0A8458B54