Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lExtvSjBgq.exe

Overview

General Information

Sample name:lExtvSjBgq.exe
renamed because original name is a hash value
Original sample name:959963e520fea06fa091046fbae311a892ffca7541c82816f7a67c508fc3c898.exe
Analysis ID:1587677
MD5:b517fef76c7787155698922a3cd4968c
SHA1:2627e7881e2a55c273243a573238e2cf8079f11f
SHA256:959963e520fea06fa091046fbae311a892ffca7541c82816f7a67c508fc3c898
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • lExtvSjBgq.exe (PID: 5076 cmdline: "C:\Users\user\Desktop\lExtvSjBgq.exe" MD5: B517FEF76C7787155698922A3CD4968C)
    • svchost.exe (PID: 3220 cmdline: "C:\Users\user\Desktop\lExtvSjBgq.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2887345795.0000000002D60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.2887106496.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      SourceRuleDescriptionAuthorStrings
      2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\lExtvSjBgq.exe", CommandLine: "C:\Users\user\Desktop\lExtvSjBgq.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\lExtvSjBgq.exe", ParentImage: C:\Users\user\Desktop\lExtvSjBgq.exe, ParentProcessId: 5076, ParentProcessName: lExtvSjBgq.exe, ProcessCommandLine: "C:\Users\user\Desktop\lExtvSjBgq.exe", ProcessId: 3220, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\lExtvSjBgq.exe", CommandLine: "C:\Users\user\Desktop\lExtvSjBgq.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\lExtvSjBgq.exe", ParentImage: C:\Users\user\Desktop\lExtvSjBgq.exe, ParentProcessId: 5076, ParentProcessName: lExtvSjBgq.exe, ProcessCommandLine: "C:\Users\user\Desktop\lExtvSjBgq.exe", ProcessId: 3220, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: lExtvSjBgq.exeVirustotal: Detection: 69%Perma Link
          Source: lExtvSjBgq.exeReversingLabs: Detection: 73%
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2887345795.0000000002D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2887106496.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: lExtvSjBgq.exeJoe Sandbox ML: detected
          Source: lExtvSjBgq.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: lExtvSjBgq.exe, 00000000.00000003.2246193460.00000000038D0000.00000004.00001000.00020000.00000000.sdmp, lExtvSjBgq.exe, 00000000.00000003.2245955817.0000000003730000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2544365535.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2887524963.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2887524963.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2546220424.0000000003200000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: lExtvSjBgq.exe, 00000000.00000003.2246193460.00000000038D0000.00000004.00001000.00020000.00000000.sdmp, lExtvSjBgq.exe, 00000000.00000003.2245955817.0000000003730000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2544365535.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2887524963.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2887524963.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2546220424.0000000003200000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0024445A
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024C6D1 FindFirstFileW,FindClose,0_2_0024C6D1
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0024C75C
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0024EF95
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0024F0F2
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0024F3F3
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002437EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_002437EF
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00243B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00243B12
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0024BCBC
          Source: global trafficTCP traffic: 192.168.2.6:55547 -> 162.159.36.2:53
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002522EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_002522EE
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00254164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00254164
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00254164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00254164
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00253F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00253F66
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0024001C
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0026CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0026CABC

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2887345795.0000000002D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2887106496.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: This is a third-party compiled AutoIt script.0_2_001E3B3A
          Source: lExtvSjBgq.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: lExtvSjBgq.exe, 00000000.00000000.2210442631.0000000000294000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5b802986-e
          Source: lExtvSjBgq.exe, 00000000.00000000.2210442631.0000000000294000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_b604f611-9
          Source: lExtvSjBgq.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_380b4224-3
          Source: lExtvSjBgq.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_49f3b514-7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C643 NtClose,2_2_0042C643
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472B60 NtClose,LdrInitializeThunk,2_2_03472B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03472DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034735C0 NtCreateMutant,LdrInitializeThunk,2_2_034735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03474340 NtSetContextThread,2_2_03474340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03474650 NtSuspendThread,2_2_03474650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472BE0 NtQueryValueKey,2_2_03472BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472BF0 NtAllocateVirtualMemory,2_2_03472BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472B80 NtQueryInformationFile,2_2_03472B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472BA0 NtEnumerateValueKey,2_2_03472BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472AD0 NtReadFile,2_2_03472AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472AF0 NtWriteFile,2_2_03472AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472AB0 NtWaitForSingleObject,2_2_03472AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472F60 NtCreateProcessEx,2_2_03472F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472F30 NtCreateSection,2_2_03472F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472FE0 NtCreateFile,2_2_03472FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472F90 NtProtectVirtualMemory,2_2_03472F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472FA0 NtQuerySection,2_2_03472FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472FB0 NtResumeThread,2_2_03472FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472E30 NtWriteVirtualMemory,2_2_03472E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472EE0 NtQueueApcThread,2_2_03472EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472E80 NtReadVirtualMemory,2_2_03472E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472EA0 NtAdjustPrivilegesToken,2_2_03472EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472D00 NtSetInformationFile,2_2_03472D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472D10 NtMapViewOfSection,2_2_03472D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472D30 NtUnmapViewOfSection,2_2_03472D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472DD0 NtDelayExecution,2_2_03472DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472DB0 NtEnumerateKey,2_2_03472DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472C60 NtCreateKey,2_2_03472C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472C70 NtFreeVirtualMemory,2_2_03472C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472C00 NtQueryInformationProcess,2_2_03472C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472CC0 NtQueryVirtualMemory,2_2_03472CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472CF0 NtOpenProcess,2_2_03472CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472CA0 NtQueryInformationToken,2_2_03472CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473010 NtOpenDirectoryObject,2_2_03473010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473090 NtSetValueKey,2_2_03473090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034739B0 NtGetContextThread,2_2_034739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473D70 NtOpenThread,2_2_03473D70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03473D10 NtOpenProcessToken,2_2_03473D10
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0024A1EF
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00238310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00238310
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002451BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_002451BD
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001EE6A00_2_001EE6A0
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0020D9750_2_0020D975
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001EFCE00_2_001EFCE0
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002021C50_2_002021C5
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002162D20_2_002162D2
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002603DA0_2_002603DA
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0021242E0_2_0021242E
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002025FA0_2_002025FA
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0023E6160_2_0023E616
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001F66E10_2_001F66E1
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0021878F0_2_0021878F
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001F88080_2_001F8808
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002168440_2_00216844
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002608570_2_00260857
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002488890_2_00248889
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0020CB210_2_0020CB21
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00216DB60_2_00216DB6
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001F6F9E0_2_001F6F9E
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001F30300_2_001F3030
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002031870_2_00203187
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0020F1D90_2_0020F1D9
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001E12870_2_001E1287
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002014840_2_00201484
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001F55200_2_001F5520
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002076960_2_00207696
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001F57600_2_001F5760
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002019780_2_00201978
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00219AB50_2_00219AB5
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0020BDA60_2_0020BDA6
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00201D900_2_00201D90
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00267DDB0_2_00267DDB
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001EDF000_2_001EDF00
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001F3FE00_2_001F3FE0
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00F5DE480_2_00F5DE48
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004030D02_2_004030D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004010E02_2_004010E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E0832_2_0040E083
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100A32_2_004100A3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E1C72_2_0040E1C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E1D32_2_0040E1D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004012402_2_00401240
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401B472_2_00401B47
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401B502_2_00401B50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042EC632_2_0042EC63
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004024302_2_00402430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FE7B2_2_0040FE7B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FE832_2_0040FE83
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004167B32_2_004167B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FA3522_2_034FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F02_2_0344E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035003E62_2_035003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E02742_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C02C02_2_034C02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C81582_2_034C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034301002_2_03430100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA1182_2_034DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F81CC2_2_034F81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F41A22_2_034F41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035001AA2_2_035001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D20002_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034647502_2_03464750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034407702_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343C7C02_2_0343C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345C6E02_2_0345C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034405352_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035005912_2_03500591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F24462_2_034F2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E44202_2_034E4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EE4F62_2_034EE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FAB402_2_034FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F6BD72_2_034F6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA802_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034569622_2_03456962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A02_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350A9A62_2_0350A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344A8402_2_0344A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034428402_2_03442840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E8F02_2_0346E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034268B82_2_034268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B4F402_2_034B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03482F282_2_03482F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460F302_2_03460F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E2F302_2_034E2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432FC82_2_03432FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344CFE02_2_0344CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BEFA02_2_034BEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440E592_2_03440E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FEE262_2_034FEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FEEDB2_2_034FEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452E902_2_03452E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FCE932_2_034FCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344AD002_2_0344AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DCD1F2_2_034DCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343ADE02_2_0343ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03458DBF2_2_03458DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440C002_2_03440C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430CF22_2_03430CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0CB52_2_034E0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342D34C2_2_0342D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F132D2_2_034F132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0348739A2_2_0348739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345B2C02_2_0345B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E12ED2_2_034E12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034452A02_2_034452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347516C2_2_0347516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342F1722_2_0342F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350B16B2_2_0350B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344B1B02_2_0344B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EF0CC2_2_034EF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034470C02_2_034470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F70E92_2_034F70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FF0E02_2_034FF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FF7B02_2_034FF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034856302_2_03485630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F16CC2_2_034F16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F75712_2_034F7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035095C32_2_035095C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DD5B02_2_034DD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034314602_2_03431460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FF43F2_2_034FF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFB762_2_034FFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B5BF02_2_034B5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347DBF92_2_0347DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345FB802_2_0345FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFA492_2_034FFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F7A462_2_034F7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B3A6C2_2_034B3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EDAC62_2_034EDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DDAAC2_2_034DDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03485AA02_2_03485AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E1AA32_2_034E1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034499502_2_03449950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345B9502_2_0345B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D59102_2_034D5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AD8002_2_034AD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034438E02_2_034438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFF092_2_034FFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03403FD22_2_03403FD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03403FD52_2_03403FD5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03441F922_2_03441F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFFB12_2_034FFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03449EB02_2_03449EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03443D402_2_03443D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F1D5A2_2_034F1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F7D732_2_034F7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345FDC02_2_0345FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B9C322_2_034B9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FFCF22_2_034FFCF2
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: String function: 001E7DE1 appears 35 times
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: String function: 00208900 appears 42 times
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: String function: 00200AE3 appears 70 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 034BF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 034AEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0342B970 appears 280 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03475130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03487E54 appears 111 times
          Source: lExtvSjBgq.exe, 00000000.00000003.2243905819.00000000039FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs lExtvSjBgq.exe
          Source: lExtvSjBgq.exe, 00000000.00000003.2244635034.0000000003853000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs lExtvSjBgq.exe
          Source: lExtvSjBgq.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: classification engineClassification label: mal84.troj.evad.winEXE@3/2@0/0
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024A06A GetLastError,FormatMessageW,0_2_0024A06A
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002381CB AdjustTokenPrivileges,CloseHandle,0_2_002381CB
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002387E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_002387E1
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0024B333
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0025EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0025EE0D
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002583BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_002583BB
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001E4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_001E4E89
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeFile created: C:\Users\user\AppData\Local\Temp\aut2FF9.tmpJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCommand line argument: r0_2_001E47D0
          Source: lExtvSjBgq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: lExtvSjBgq.exeVirustotal: Detection: 69%
          Source: lExtvSjBgq.exeReversingLabs: Detection: 73%
          Source: unknownProcess created: C:\Users\user\Desktop\lExtvSjBgq.exe "C:\Users\user\Desktop\lExtvSjBgq.exe"
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\lExtvSjBgq.exe"
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\lExtvSjBgq.exe"Jump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: ntmarta.dllJump to behavior
          Source: lExtvSjBgq.exeStatic file information: File size 1212416 > 1048576
          Source: lExtvSjBgq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: lExtvSjBgq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: lExtvSjBgq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: lExtvSjBgq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: lExtvSjBgq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: lExtvSjBgq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: lExtvSjBgq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: wntdll.pdbUGP source: lExtvSjBgq.exe, 00000000.00000003.2246193460.00000000038D0000.00000004.00001000.00020000.00000000.sdmp, lExtvSjBgq.exe, 00000000.00000003.2245955817.0000000003730000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2544365535.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2887524963.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2887524963.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2546220424.0000000003200000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: lExtvSjBgq.exe, 00000000.00000003.2246193460.00000000038D0000.00000004.00001000.00020000.00000000.sdmp, lExtvSjBgq.exe, 00000000.00000003.2245955817.0000000003730000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2544365535.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2887524963.0000000003400000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2887524963.000000000359E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2546220424.0000000003200000.00000004.00000020.00020000.00000000.sdmp
          Source: lExtvSjBgq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: lExtvSjBgq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: lExtvSjBgq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: lExtvSjBgq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: lExtvSjBgq.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001E4B37 LoadLibraryA,GetProcAddress,0_2_001E4B37
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001EC4FE push A3001EBAh; retn 001Eh0_2_001EC50D
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00208945 push ecx; ret 0_2_00208958
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041183B push edi; iretd 2_2_0041183C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041222A push cs; retf 2_2_0041222F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004122B0 push ecx; retf 2_2_004122BD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004122BF pushfd ; iretd 2_2_004122C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403350 push eax; ret 2_2_00403352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401552 pushfd ; ret 2_2_00401566
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00408562 push edi; iretd 2_2_00408563
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00408572 push esi; ret 2_2_00408573
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00423D1E push ebx; retf 2_2_00423D1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004165F1 push eax; iretd 2_2_00416603
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004015BB pushfd ; ret 2_2_00401566
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00408600 push ebp; iretd 2_2_00408601
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040175C pushfd ; ret 2_2_00401778
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418F7A push ecx; iretd 2_2_00418F81
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00424FC3 push edi; iretd 2_2_00424FCE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0340225F pushad ; ret 2_2_034027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034027FA pushad ; ret 2_2_034027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034309AD push ecx; mov dword ptr [esp], ecx2_2_034309B6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0340283D push eax; iretd 2_2_03402858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0340135E push eax; iretd 2_2_03401369
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001E48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001E48D7
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00265376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00265376
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00203187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00203187
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeAPI/Special instruction interceptor: Address: F5DA6C
          Source: lExtvSjBgq.exe, 00000000.00000002.2247244572.0000000000FB9000.00000004.00000020.00020000.00000000.sdmp, lExtvSjBgq.exe, 00000000.00000003.2211667313.0000000000FB9000.00000004.00000020.00020000.00000000.sdmp, lExtvSjBgq.exe, 00000000.00000003.2211528453.0000000000F4A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE9P
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E rdtsc 2_2_0347096E
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102343
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeAPI coverage: 5.9 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 5700Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0024445A
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024C6D1 FindFirstFileW,FindClose,0_2_0024C6D1
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0024C75C
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0024EF95
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0024F0F2
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0024F3F3
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002437EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_002437EF
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00243B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00243B12
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0024BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0024BCBC
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001E49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001E49A0
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeAPI call chain: ExitProcess graph end nodegraph_0-100891
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeAPI call chain: ExitProcess graph end nodegraph_0-100957
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E rdtsc 2_2_0347096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417743 LdrLoadDll,2_2_00417743
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00253F09 BlockInput,0_2_00253F09
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001E3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_001E3B3A
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00215A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00215A7C
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001E4B37 LoadLibraryA,GetProcAddress,0_2_001E4B37
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00F5C638 mov eax, dword ptr fs:[00000030h]0_2_00F5C638
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00F5DCD8 mov eax, dword ptr fs:[00000030h]0_2_00F5DCD8
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00F5DD38 mov eax, dword ptr fs:[00000030h]0_2_00F5DD38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B2349 mov eax, dword ptr fs:[00000030h]2_2_034B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov ecx, dword ptr fs:[00000030h]2_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B035C mov eax, dword ptr fs:[00000030h]2_2_034B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FA352 mov eax, dword ptr fs:[00000030h]2_2_034FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D8350 mov ecx, dword ptr fs:[00000030h]2_2_034D8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350634F mov eax, dword ptr fs:[00000030h]2_2_0350634F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D437C mov eax, dword ptr fs:[00000030h]2_2_034D437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A30B mov eax, dword ptr fs:[00000030h]2_2_0346A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A30B mov eax, dword ptr fs:[00000030h]2_2_0346A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A30B mov eax, dword ptr fs:[00000030h]2_2_0346A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C310 mov ecx, dword ptr fs:[00000030h]2_2_0342C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450310 mov ecx, dword ptr fs:[00000030h]2_2_03450310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov eax, dword ptr fs:[00000030h]2_2_03508324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov ecx, dword ptr fs:[00000030h]2_2_03508324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov eax, dword ptr fs:[00000030h]2_2_03508324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03508324 mov eax, dword ptr fs:[00000030h]2_2_03508324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EC3CD mov eax, dword ptr fs:[00000030h]2_2_034EC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A3C0 mov eax, dword ptr fs:[00000030h]2_2_0343A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034383C0 mov eax, dword ptr fs:[00000030h]2_2_034383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B63C0 mov eax, dword ptr fs:[00000030h]2_2_034B63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov eax, dword ptr fs:[00000030h]2_2_034DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov eax, dword ptr fs:[00000030h]2_2_034DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov ecx, dword ptr fs:[00000030h]2_2_034DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE3DB mov eax, dword ptr fs:[00000030h]2_2_034DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D43D4 mov eax, dword ptr fs:[00000030h]2_2_034D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D43D4 mov eax, dword ptr fs:[00000030h]2_2_034D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034403E9 mov eax, dword ptr fs:[00000030h]2_2_034403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F0 mov eax, dword ptr fs:[00000030h]2_2_0344E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F0 mov eax, dword ptr fs:[00000030h]2_2_0344E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E3F0 mov eax, dword ptr fs:[00000030h]2_2_0344E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034663FF mov eax, dword ptr fs:[00000030h]2_2_034663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E388 mov eax, dword ptr fs:[00000030h]2_2_0342E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E388 mov eax, dword ptr fs:[00000030h]2_2_0342E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E388 mov eax, dword ptr fs:[00000030h]2_2_0342E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345438F mov eax, dword ptr fs:[00000030h]2_2_0345438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345438F mov eax, dword ptr fs:[00000030h]2_2_0345438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428397 mov eax, dword ptr fs:[00000030h]2_2_03428397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428397 mov eax, dword ptr fs:[00000030h]2_2_03428397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428397 mov eax, dword ptr fs:[00000030h]2_2_03428397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B8243 mov eax, dword ptr fs:[00000030h]2_2_034B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B8243 mov ecx, dword ptr fs:[00000030h]2_2_034B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0350625D mov eax, dword ptr fs:[00000030h]2_2_0350625D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A250 mov eax, dword ptr fs:[00000030h]2_2_0342A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436259 mov eax, dword ptr fs:[00000030h]2_2_03436259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA250 mov eax, dword ptr fs:[00000030h]2_2_034EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA250 mov eax, dword ptr fs:[00000030h]2_2_034EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434260 mov eax, dword ptr fs:[00000030h]2_2_03434260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434260 mov eax, dword ptr fs:[00000030h]2_2_03434260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434260 mov eax, dword ptr fs:[00000030h]2_2_03434260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342826B mov eax, dword ptr fs:[00000030h]2_2_0342826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E0274 mov eax, dword ptr fs:[00000030h]2_2_034E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342823B mov eax, dword ptr fs:[00000030h]2_2_0342823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A2C3 mov eax, dword ptr fs:[00000030h]2_2_0343A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035062D6 mov eax, dword ptr fs:[00000030h]2_2_035062D6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402E1 mov eax, dword ptr fs:[00000030h]2_2_034402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402E1 mov eax, dword ptr fs:[00000030h]2_2_034402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034402E1 mov eax, dword ptr fs:[00000030h]2_2_034402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E284 mov eax, dword ptr fs:[00000030h]2_2_0346E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E284 mov eax, dword ptr fs:[00000030h]2_2_0346E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0283 mov eax, dword ptr fs:[00000030h]2_2_034B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0283 mov eax, dword ptr fs:[00000030h]2_2_034B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0283 mov eax, dword ptr fs:[00000030h]2_2_034B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov ecx, dword ptr fs:[00000030h]2_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C62A0 mov eax, dword ptr fs:[00000030h]2_2_034C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov ecx, dword ptr fs:[00000030h]2_2_034C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C4144 mov eax, dword ptr fs:[00000030h]2_2_034C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C156 mov eax, dword ptr fs:[00000030h]2_2_0342C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C8158 mov eax, dword ptr fs:[00000030h]2_2_034C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436154 mov eax, dword ptr fs:[00000030h]2_2_03436154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436154 mov eax, dword ptr fs:[00000030h]2_2_03436154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504164 mov eax, dword ptr fs:[00000030h]2_2_03504164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504164 mov eax, dword ptr fs:[00000030h]2_2_03504164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov eax, dword ptr fs:[00000030h]2_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DE10E mov ecx, dword ptr fs:[00000030h]2_2_034DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov ecx, dword ptr fs:[00000030h]2_2_034DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov eax, dword ptr fs:[00000030h]2_2_034DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov eax, dword ptr fs:[00000030h]2_2_034DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DA118 mov eax, dword ptr fs:[00000030h]2_2_034DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F0115 mov eax, dword ptr fs:[00000030h]2_2_034F0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460124 mov eax, dword ptr fs:[00000030h]2_2_03460124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F61C3 mov eax, dword ptr fs:[00000030h]2_2_034F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F61C3 mov eax, dword ptr fs:[00000030h]2_2_034F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_034AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE1D0 mov eax, dword ptr fs:[00000030h]2_2_034AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_035061E5 mov eax, dword ptr fs:[00000030h]2_2_035061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034601F8 mov eax, dword ptr fs:[00000030h]2_2_034601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03470185 mov eax, dword ptr fs:[00000030h]2_2_03470185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EC188 mov eax, dword ptr fs:[00000030h]2_2_034EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EC188 mov eax, dword ptr fs:[00000030h]2_2_034EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4180 mov eax, dword ptr fs:[00000030h]2_2_034D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4180 mov eax, dword ptr fs:[00000030h]2_2_034D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B019F mov eax, dword ptr fs:[00000030h]2_2_034B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A197 mov eax, dword ptr fs:[00000030h]2_2_0342A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A197 mov eax, dword ptr fs:[00000030h]2_2_0342A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A197 mov eax, dword ptr fs:[00000030h]2_2_0342A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432050 mov eax, dword ptr fs:[00000030h]2_2_03432050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6050 mov eax, dword ptr fs:[00000030h]2_2_034B6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345C073 mov eax, dword ptr fs:[00000030h]2_2_0345C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B4000 mov ecx, dword ptr fs:[00000030h]2_2_034B4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D2000 mov eax, dword ptr fs:[00000030h]2_2_034D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E016 mov eax, dword ptr fs:[00000030h]2_2_0344E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A020 mov eax, dword ptr fs:[00000030h]2_2_0342A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C020 mov eax, dword ptr fs:[00000030h]2_2_0342C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6030 mov eax, dword ptr fs:[00000030h]2_2_034C6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B20DE mov eax, dword ptr fs:[00000030h]2_2_034B20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0342A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034380E9 mov eax, dword ptr fs:[00000030h]2_2_034380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B60E0 mov eax, dword ptr fs:[00000030h]2_2_034B60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C0F0 mov eax, dword ptr fs:[00000030h]2_2_0342C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034720F0 mov ecx, dword ptr fs:[00000030h]2_2_034720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343208A mov eax, dword ptr fs:[00000030h]2_2_0343208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034280A0 mov eax, dword ptr fs:[00000030h]2_2_034280A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C80A8 mov eax, dword ptr fs:[00000030h]2_2_034C80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F60B8 mov eax, dword ptr fs:[00000030h]2_2_034F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F60B8 mov ecx, dword ptr fs:[00000030h]2_2_034F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346674D mov esi, dword ptr fs:[00000030h]2_2_0346674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346674D mov eax, dword ptr fs:[00000030h]2_2_0346674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346674D mov eax, dword ptr fs:[00000030h]2_2_0346674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430750 mov eax, dword ptr fs:[00000030h]2_2_03430750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE75D mov eax, dword ptr fs:[00000030h]2_2_034BE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472750 mov eax, dword ptr fs:[00000030h]2_2_03472750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472750 mov eax, dword ptr fs:[00000030h]2_2_03472750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B4755 mov eax, dword ptr fs:[00000030h]2_2_034B4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438770 mov eax, dword ptr fs:[00000030h]2_2_03438770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440770 mov eax, dword ptr fs:[00000030h]2_2_03440770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C700 mov eax, dword ptr fs:[00000030h]2_2_0346C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430710 mov eax, dword ptr fs:[00000030h]2_2_03430710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460710 mov eax, dword ptr fs:[00000030h]2_2_03460710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C720 mov eax, dword ptr fs:[00000030h]2_2_0346C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C720 mov eax, dword ptr fs:[00000030h]2_2_0346C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346273C mov eax, dword ptr fs:[00000030h]2_2_0346273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346273C mov ecx, dword ptr fs:[00000030h]2_2_0346273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346273C mov eax, dword ptr fs:[00000030h]2_2_0346273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AC730 mov eax, dword ptr fs:[00000030h]2_2_034AC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343C7C0 mov eax, dword ptr fs:[00000030h]2_2_0343C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B07C3 mov eax, dword ptr fs:[00000030h]2_2_034B07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034527ED mov eax, dword ptr fs:[00000030h]2_2_034527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034527ED mov eax, dword ptr fs:[00000030h]2_2_034527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034527ED mov eax, dword ptr fs:[00000030h]2_2_034527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE7E1 mov eax, dword ptr fs:[00000030h]2_2_034BE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034347FB mov eax, dword ptr fs:[00000030h]2_2_034347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034347FB mov eax, dword ptr fs:[00000030h]2_2_034347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D678E mov eax, dword ptr fs:[00000030h]2_2_034D678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034307AF mov eax, dword ptr fs:[00000030h]2_2_034307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E47A0 mov eax, dword ptr fs:[00000030h]2_2_034E47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344C640 mov eax, dword ptr fs:[00000030h]2_2_0344C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F866E mov eax, dword ptr fs:[00000030h]2_2_034F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F866E mov eax, dword ptr fs:[00000030h]2_2_034F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A660 mov eax, dword ptr fs:[00000030h]2_2_0346A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A660 mov eax, dword ptr fs:[00000030h]2_2_0346A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03462674 mov eax, dword ptr fs:[00000030h]2_2_03462674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE609 mov eax, dword ptr fs:[00000030h]2_2_034AE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344260B mov eax, dword ptr fs:[00000030h]2_2_0344260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03472619 mov eax, dword ptr fs:[00000030h]2_2_03472619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0344E627 mov eax, dword ptr fs:[00000030h]2_2_0344E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03466620 mov eax, dword ptr fs:[00000030h]2_2_03466620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468620 mov eax, dword ptr fs:[00000030h]2_2_03468620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343262C mov eax, dword ptr fs:[00000030h]2_2_0343262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0346A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A6C7 mov eax, dword ptr fs:[00000030h]2_2_0346A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE6F2 mov eax, dword ptr fs:[00000030h]2_2_034AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B06F1 mov eax, dword ptr fs:[00000030h]2_2_034B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B06F1 mov eax, dword ptr fs:[00000030h]2_2_034B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434690 mov eax, dword ptr fs:[00000030h]2_2_03434690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434690 mov eax, dword ptr fs:[00000030h]2_2_03434690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C6A6 mov eax, dword ptr fs:[00000030h]2_2_0346C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034666B0 mov eax, dword ptr fs:[00000030h]2_2_034666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438550 mov eax, dword ptr fs:[00000030h]2_2_03438550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438550 mov eax, dword ptr fs:[00000030h]2_2_03438550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346656A mov eax, dword ptr fs:[00000030h]2_2_0346656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346656A mov eax, dword ptr fs:[00000030h]2_2_0346656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346656A mov eax, dword ptr fs:[00000030h]2_2_0346656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6500 mov eax, dword ptr fs:[00000030h]2_2_034C6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504500 mov eax, dword ptr fs:[00000030h]2_2_03504500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440535 mov eax, dword ptr fs:[00000030h]2_2_03440535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E53E mov eax, dword ptr fs:[00000030h]2_2_0345E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E5CF mov eax, dword ptr fs:[00000030h]2_2_0346E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E5CF mov eax, dword ptr fs:[00000030h]2_2_0346E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034365D0 mov eax, dword ptr fs:[00000030h]2_2_034365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A5D0 mov eax, dword ptr fs:[00000030h]2_2_0346A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A5D0 mov eax, dword ptr fs:[00000030h]2_2_0346A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345E5E7 mov eax, dword ptr fs:[00000030h]2_2_0345E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034325E0 mov eax, dword ptr fs:[00000030h]2_2_034325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C5ED mov eax, dword ptr fs:[00000030h]2_2_0346C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346C5ED mov eax, dword ptr fs:[00000030h]2_2_0346C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432582 mov eax, dword ptr fs:[00000030h]2_2_03432582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03432582 mov ecx, dword ptr fs:[00000030h]2_2_03432582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03464588 mov eax, dword ptr fs:[00000030h]2_2_03464588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E59C mov eax, dword ptr fs:[00000030h]2_2_0346E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B05A7 mov eax, dword ptr fs:[00000030h]2_2_034B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B05A7 mov eax, dword ptr fs:[00000030h]2_2_034B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B05A7 mov eax, dword ptr fs:[00000030h]2_2_034B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034545B1 mov eax, dword ptr fs:[00000030h]2_2_034545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034545B1 mov eax, dword ptr fs:[00000030h]2_2_034545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346E443 mov eax, dword ptr fs:[00000030h]2_2_0346E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA456 mov eax, dword ptr fs:[00000030h]2_2_034EA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342645D mov eax, dword ptr fs:[00000030h]2_2_0342645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345245A mov eax, dword ptr fs:[00000030h]2_2_0345245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC460 mov ecx, dword ptr fs:[00000030h]2_2_034BC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345A470 mov eax, dword ptr fs:[00000030h]2_2_0345A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345A470 mov eax, dword ptr fs:[00000030h]2_2_0345A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345A470 mov eax, dword ptr fs:[00000030h]2_2_0345A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468402 mov eax, dword ptr fs:[00000030h]2_2_03468402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468402 mov eax, dword ptr fs:[00000030h]2_2_03468402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468402 mov eax, dword ptr fs:[00000030h]2_2_03468402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E420 mov eax, dword ptr fs:[00000030h]2_2_0342E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E420 mov eax, dword ptr fs:[00000030h]2_2_0342E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342E420 mov eax, dword ptr fs:[00000030h]2_2_0342E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342C427 mov eax, dword ptr fs:[00000030h]2_2_0342C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B6420 mov eax, dword ptr fs:[00000030h]2_2_034B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346A430 mov eax, dword ptr fs:[00000030h]2_2_0346A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034304E5 mov ecx, dword ptr fs:[00000030h]2_2_034304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034EA49A mov eax, dword ptr fs:[00000030h]2_2_034EA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034364AB mov eax, dword ptr fs:[00000030h]2_2_034364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034644B0 mov ecx, dword ptr fs:[00000030h]2_2_034644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BA4B0 mov eax, dword ptr fs:[00000030h]2_2_034BA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4B4B mov eax, dword ptr fs:[00000030h]2_2_034E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4B4B mov eax, dword ptr fs:[00000030h]2_2_034E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03502B57 mov eax, dword ptr fs:[00000030h]2_2_03502B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6B40 mov eax, dword ptr fs:[00000030h]2_2_034C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6B40 mov eax, dword ptr fs:[00000030h]2_2_034C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FAB40 mov eax, dword ptr fs:[00000030h]2_2_034FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D8B42 mov eax, dword ptr fs:[00000030h]2_2_034D8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428B50 mov eax, dword ptr fs:[00000030h]2_2_03428B50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DEB50 mov eax, dword ptr fs:[00000030h]2_2_034DEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0342CB7E mov eax, dword ptr fs:[00000030h]2_2_0342CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504B00 mov eax, dword ptr fs:[00000030h]2_2_03504B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AEB1D mov eax, dword ptr fs:[00000030h]2_2_034AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EB20 mov eax, dword ptr fs:[00000030h]2_2_0345EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EB20 mov eax, dword ptr fs:[00000030h]2_2_0345EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F8B28 mov eax, dword ptr fs:[00000030h]2_2_034F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034F8B28 mov eax, dword ptr fs:[00000030h]2_2_034F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450BCB mov eax, dword ptr fs:[00000030h]2_2_03450BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450BCB mov eax, dword ptr fs:[00000030h]2_2_03450BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03450BCB mov eax, dword ptr fs:[00000030h]2_2_03450BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430BCD mov eax, dword ptr fs:[00000030h]2_2_03430BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430BCD mov eax, dword ptr fs:[00000030h]2_2_03430BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430BCD mov eax, dword ptr fs:[00000030h]2_2_03430BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DEBD0 mov eax, dword ptr fs:[00000030h]2_2_034DEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438BF0 mov eax, dword ptr fs:[00000030h]2_2_03438BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438BF0 mov eax, dword ptr fs:[00000030h]2_2_03438BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438BF0 mov eax, dword ptr fs:[00000030h]2_2_03438BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EBFC mov eax, dword ptr fs:[00000030h]2_2_0345EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BCBF0 mov eax, dword ptr fs:[00000030h]2_2_034BCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440BBE mov eax, dword ptr fs:[00000030h]2_2_03440BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440BBE mov eax, dword ptr fs:[00000030h]2_2_03440BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4BB0 mov eax, dword ptr fs:[00000030h]2_2_034E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034E4BB0 mov eax, dword ptr fs:[00000030h]2_2_034E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03436A50 mov eax, dword ptr fs:[00000030h]2_2_03436A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440A5B mov eax, dword ptr fs:[00000030h]2_2_03440A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03440A5B mov eax, dword ptr fs:[00000030h]2_2_03440A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA6F mov eax, dword ptr fs:[00000030h]2_2_0346CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA6F mov eax, dword ptr fs:[00000030h]2_2_0346CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA6F mov eax, dword ptr fs:[00000030h]2_2_0346CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034DEA60 mov eax, dword ptr fs:[00000030h]2_2_034DEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034ACA72 mov eax, dword ptr fs:[00000030h]2_2_034ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034ACA72 mov eax, dword ptr fs:[00000030h]2_2_034ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BCA11 mov eax, dword ptr fs:[00000030h]2_2_034BCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA24 mov eax, dword ptr fs:[00000030h]2_2_0346CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0345EA2E mov eax, dword ptr fs:[00000030h]2_2_0345EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03454A35 mov eax, dword ptr fs:[00000030h]2_2_03454A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03454A35 mov eax, dword ptr fs:[00000030h]2_2_03454A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346CA38 mov eax, dword ptr fs:[00000030h]2_2_0346CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486ACC mov eax, dword ptr fs:[00000030h]2_2_03486ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486ACC mov eax, dword ptr fs:[00000030h]2_2_03486ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486ACC mov eax, dword ptr fs:[00000030h]2_2_03486ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03430AD0 mov eax, dword ptr fs:[00000030h]2_2_03430AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03464AD0 mov eax, dword ptr fs:[00000030h]2_2_03464AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03464AD0 mov eax, dword ptr fs:[00000030h]2_2_03464AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346AAEE mov eax, dword ptr fs:[00000030h]2_2_0346AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0346AAEE mov eax, dword ptr fs:[00000030h]2_2_0346AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343EA80 mov eax, dword ptr fs:[00000030h]2_2_0343EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504A80 mov eax, dword ptr fs:[00000030h]2_2_03504A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03468A90 mov edx, dword ptr fs:[00000030h]2_2_03468A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438AA0 mov eax, dword ptr fs:[00000030h]2_2_03438AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03438AA0 mov eax, dword ptr fs:[00000030h]2_2_03438AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03486AA4 mov eax, dword ptr fs:[00000030h]2_2_03486AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B0946 mov eax, dword ptr fs:[00000030h]2_2_034B0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03504940 mov eax, dword ptr fs:[00000030h]2_2_03504940
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03456962 mov eax, dword ptr fs:[00000030h]2_2_03456962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03456962 mov eax, dword ptr fs:[00000030h]2_2_03456962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03456962 mov eax, dword ptr fs:[00000030h]2_2_03456962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E mov eax, dword ptr fs:[00000030h]2_2_0347096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E mov edx, dword ptr fs:[00000030h]2_2_0347096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0347096E mov eax, dword ptr fs:[00000030h]2_2_0347096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4978 mov eax, dword ptr fs:[00000030h]2_2_034D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034D4978 mov eax, dword ptr fs:[00000030h]2_2_034D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC97C mov eax, dword ptr fs:[00000030h]2_2_034BC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE908 mov eax, dword ptr fs:[00000030h]2_2_034AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034AE908 mov eax, dword ptr fs:[00000030h]2_2_034AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC912 mov eax, dword ptr fs:[00000030h]2_2_034BC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428918 mov eax, dword ptr fs:[00000030h]2_2_03428918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03428918 mov eax, dword ptr fs:[00000030h]2_2_03428918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B892A mov eax, dword ptr fs:[00000030h]2_2_034B892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C892B mov eax, dword ptr fs:[00000030h]2_2_034C892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C69C0 mov eax, dword ptr fs:[00000030h]2_2_034C69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0343A9D0 mov eax, dword ptr fs:[00000030h]2_2_0343A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034649D0 mov eax, dword ptr fs:[00000030h]2_2_034649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034FA9D3 mov eax, dword ptr fs:[00000030h]2_2_034FA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE9E0 mov eax, dword ptr fs:[00000030h]2_2_034BE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034629F9 mov eax, dword ptr fs:[00000030h]2_2_034629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034629F9 mov eax, dword ptr fs:[00000030h]2_2_034629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034429A0 mov eax, dword ptr fs:[00000030h]2_2_034429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034309AD mov eax, dword ptr fs:[00000030h]2_2_034309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034309AD mov eax, dword ptr fs:[00000030h]2_2_034309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B89B3 mov esi, dword ptr fs:[00000030h]2_2_034B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B89B3 mov eax, dword ptr fs:[00000030h]2_2_034B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034B89B3 mov eax, dword ptr fs:[00000030h]2_2_034B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03442840 mov ecx, dword ptr fs:[00000030h]2_2_03442840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03460854 mov eax, dword ptr fs:[00000030h]2_2_03460854
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434859 mov eax, dword ptr fs:[00000030h]2_2_03434859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03434859 mov eax, dword ptr fs:[00000030h]2_2_03434859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE872 mov eax, dword ptr fs:[00000030h]2_2_034BE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BE872 mov eax, dword ptr fs:[00000030h]2_2_034BE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6870 mov eax, dword ptr fs:[00000030h]2_2_034C6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034C6870 mov eax, dword ptr fs:[00000030h]2_2_034C6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_034BC810 mov eax, dword ptr fs:[00000030h]2_2_034BC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452835 mov eax, dword ptr fs:[00000030h]2_2_03452835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452835 mov eax, dword ptr fs:[00000030h]2_2_03452835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452835 mov eax, dword ptr fs:[00000030h]2_2_03452835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03452835 mov ecx, dword ptr fs:[00000030h]2_2_03452835
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002380A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_002380A9
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0020A124 SetUnhandledExceptionFilter,0_2_0020A124
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0020A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0020A155

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 865008Jump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_002387B1 LogonUserW,0_2_002387B1
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001E3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_001E3B3A
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001E48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_001E48D7
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00244C27 mouse_event,0_2_00244C27
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\lExtvSjBgq.exe"Jump to behavior
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00237CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00237CAF
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0023874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0023874B
          Source: lExtvSjBgq.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: lExtvSjBgq.exeBinary or memory string: Shell_TrayWnd
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_0020862B cpuid 0_2_0020862B
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00214E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00214E87
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00221E06 GetUserNameW,0_2_00221E06
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00213F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00213F3A
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_001E49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001E49A0

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2887345795.0000000002D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2887106496.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: lExtvSjBgq.exeBinary or memory string: WIN_81
          Source: lExtvSjBgq.exeBinary or memory string: WIN_XP
          Source: lExtvSjBgq.exeBinary or memory string: WIN_XPe
          Source: lExtvSjBgq.exeBinary or memory string: WIN_VISTA
          Source: lExtvSjBgq.exeBinary or memory string: WIN_7
          Source: lExtvSjBgq.exeBinary or memory string: WIN_8
          Source: lExtvSjBgq.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2887345795.0000000002D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2887106496.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00256283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00256283
          Source: C:\Users\user\Desktop\lExtvSjBgq.exeCode function: 0_2_00256747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00256747
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          2
          Native API
          1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          21
          Input Capture
          2
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts2
          Command and Scripting Interpreter
          2
          Valid Accounts
          1
          DLL Side-Loading
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory1
          Account Discovery
          Remote Desktop Protocol21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
          Valid Accounts
          2
          Obfuscated Files or Information
          Security Account Manager1
          File and Directory Discovery
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
          Access Token Manipulation
          1
          DLL Side-Loading
          NTDS115
          System Information Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
          Process Injection
          2
          Valid Accounts
          LSA Secrets25
          Security Software Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
          Virtualization/Sandbox Evasion
          Cached Domain Credentials2
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
          Access Token Manipulation
          DCSync3
          Process Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
          Process Injection
          Proc Filesystem1
          Application Window Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
          System Owner/User Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          lExtvSjBgq.exe69%VirustotalBrowse
          lExtvSjBgq.exe74%ReversingLabsWin32.Backdoor.FormBook
          lExtvSjBgq.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          s-part-0017.t-0009.t-msedge.net
          13.107.246.45
          truefalse
            high
            No contacted IP infos
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1587677
            Start date and time:2025-01-10 16:53:31 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 14s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:lExtvSjBgq.exe
            renamed because original name is a hash value
            Original Sample Name:959963e520fea06fa091046fbae311a892ffca7541c82816f7a67c508fc3c898.exe
            Detection:MAL
            Classification:mal84.troj.evad.winEXE@3/2@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 52
            • Number of non-executed functions: 277
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
            • Report size exceeded maximum capacity and may have missing disassembly code.
            No simulations
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            s-part-0017.t-0009.t-msedge.netAxvn7Hegxc.exeGet hashmaliciousUnknownBrowse
            • 13.107.246.45
            tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
            • 13.107.246.45
            raq4ttncJF.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            WF2DL1l7E8.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            Play_VM-NowTingrammAudiowav011.htmlGet hashmaliciousUnknownBrowse
            • 13.107.246.45
            launcher.exe.bin.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
            • 13.107.246.45
            FGTFTj8GLM.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            30562134305434372.jsGet hashmaliciousStrela DownloaderBrowse
            • 13.107.246.45
            Mmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
            • 13.107.246.45
            https://na4.docusign.net/Signing/EmailStart.aspx?a=ffa78034-d960-4bb3-b2a2-bb62a1fc4a65&etti=24&acct=86dab687-685e-40aa-af52-e5c3fc07b508&er=04714c6d-cc25-4a21-be91-01e1c43a5f3fGet hashmaliciousHTMLPhisherBrowse
            • 13.107.246.45
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\lExtvSjBgq.exe
            File Type:data
            Category:dropped
            Size (bytes):288256
            Entropy (8bit):7.9951505360507635
            Encrypted:true
            SSDEEP:6144:2vYe5MT2krPUg/5C+uHFnw8iJZ+QsOqYzggNy:djxC+uFw8iWJO9zggNy
            MD5:9576396C501D6FCFAAB5626C0D5F15D2
            SHA1:EDD099BCA49249161B9FFEF0535F442C346D3FCF
            SHA-256:0C24F007B6E9026B19E29EF286C489C4FD12A32CB250E0C512EE7EB5B6A54F46
            SHA-512:D94D58264D4DC560627F4478096CE05490E698ED00DB5950B7A438744713A98E5D6F6E14B29E9F6557AD656B91C2729F39BAA702A23B9A68ABBF0A71F3E2A3EE
            Malicious:false
            Reputation:low
            Preview:...3BVP0@6QW.IH.APAGYI8.UVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6.W7ZGW.OP.N.h.X..{g)?#.4D>0E;$h3 >/(-iZ<u$/]a?>..y.wZ5--~L]KcYI8YUVZJ@_..$Q.jW=.u0&.[...92.@..lP#.K.u(7..($1tX>.VZ3AVP0Df.W7.HIPQKX.YI8YUVZ3.VR1O7ZW7.MHPAPAGYI8.AVZ3QVP042QW7.IH@APAEYI>YUVZ3AVV0D6QW7ZI8TAPCGYI8YUTZs.VP D6AW7ZIXPA@AGYI8YEVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP.0S)#7ZI..EPAWYI8.QVZ#AVP0D6QW7ZIHPApAG9I8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8Y
            Process:C:\Users\user\Desktop\lExtvSjBgq.exe
            File Type:data
            Category:dropped
            Size (bytes):288256
            Entropy (8bit):7.9951505360507635
            Encrypted:true
            SSDEEP:6144:2vYe5MT2krPUg/5C+uHFnw8iJZ+QsOqYzggNy:djxC+uFw8iWJO9zggNy
            MD5:9576396C501D6FCFAAB5626C0D5F15D2
            SHA1:EDD099BCA49249161B9FFEF0535F442C346D3FCF
            SHA-256:0C24F007B6E9026B19E29EF286C489C4FD12A32CB250E0C512EE7EB5B6A54F46
            SHA-512:D94D58264D4DC560627F4478096CE05490E698ED00DB5950B7A438744713A98E5D6F6E14B29E9F6557AD656B91C2729F39BAA702A23B9A68ABBF0A71F3E2A3EE
            Malicious:false
            Reputation:low
            Preview:...3BVP0@6QW.IH.APAGYI8.UVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6.W7ZGW.OP.N.h.X..{g)?#.4D>0E;$h3 >/(-iZ<u$/]a?>..y.wZ5--~L]KcYI8YUVZJ@_..$Q.jW=.u0&.[...92.@..lP#.K.u(7..($1tX>.VZ3AVP0Df.W7.HIPQKX.YI8YUVZ3.VR1O7ZW7.MHPAPAGYI8.AVZ3QVP042QW7.IH@APAEYI>YUVZ3AVV0D6QW7ZI8TAPCGYI8YUTZs.VP D6AW7ZIXPA@AGYI8YEVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP.0S)#7ZI..EPAWYI8.QVZ#AVP0D6QW7ZIHPApAG9I8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8YUVZ3AVP0D6QW7ZIHPAPAGYI8Y
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.1936848879650235
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:lExtvSjBgq.exe
            File size:1'212'416 bytes
            MD5:b517fef76c7787155698922a3cd4968c
            SHA1:2627e7881e2a55c273243a573238e2cf8079f11f
            SHA256:959963e520fea06fa091046fbae311a892ffca7541c82816f7a67c508fc3c898
            SHA512:ddb0d88c876fd433c11c9bd6611606b0933e508ac7158eac441dd293616740796a75f2b8ba5488bf7ed30ff0387a3c44ce5a16665272502fede770e7e9b99931
            SSDEEP:24576:Su6J33O0c+JY5UZ+XC0kGso6FayLXzEH3mm4d/5iWY:Uu0c++OCvkGs9FayTzEXOHY
            TLSH:6B45CF2273DDC360CB769173BF6AB7016EBF38614630B95B2F880D7DA950162162D7A3
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
            Icon Hash:aaf3e3e3938382a0
            Entrypoint:0x427dcd
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
            Time Stamp:0x67597A3D [Wed Dec 11 11:40:45 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:afcdf79be1557326c854b6e20cb900a7
            Instruction
            call 00007FE0B8E04B6Ah
            jmp 00007FE0B8DF7934h
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            push edi
            push esi
            mov esi, dword ptr [esp+10h]
            mov ecx, dword ptr [esp+14h]
            mov edi, dword ptr [esp+0Ch]
            mov eax, ecx
            mov edx, ecx
            add eax, esi
            cmp edi, esi
            jbe 00007FE0B8DF7ABAh
            cmp edi, eax
            jc 00007FE0B8DF7E1Eh
            bt dword ptr [004C31FCh], 01h
            jnc 00007FE0B8DF7AB9h
            rep movsb
            jmp 00007FE0B8DF7DCCh
            cmp ecx, 00000080h
            jc 00007FE0B8DF7C84h
            mov eax, edi
            xor eax, esi
            test eax, 0000000Fh
            jne 00007FE0B8DF7AC0h
            bt dword ptr [004BE324h], 01h
            jc 00007FE0B8DF7F90h
            bt dword ptr [004C31FCh], 00000000h
            jnc 00007FE0B8DF7C5Dh
            test edi, 00000003h
            jne 00007FE0B8DF7C6Eh
            test esi, 00000003h
            jne 00007FE0B8DF7C4Dh
            bt edi, 02h
            jnc 00007FE0B8DF7ABFh
            mov eax, dword ptr [esi]
            sub ecx, 04h
            lea esi, dword ptr [esi+04h]
            mov dword ptr [edi], eax
            lea edi, dword ptr [edi+04h]
            bt edi, 03h
            jnc 00007FE0B8DF7AC3h
            movq xmm1, qword ptr [esi]
            sub ecx, 08h
            lea esi, dword ptr [esi+08h]
            movq qword ptr [edi], xmm1
            lea edi, dword ptr [edi+08h]
            test esi, 00000007h
            je 00007FE0B8DF7B15h
            bt esi, 03h
            jnc 00007FE0B8DF7B68h
            Programming Language:
            • [ASM] VS2013 build 21005
            • [ C ] VS2013 build 21005
            • [C++] VS2013 build 21005
            • [ C ] VS2008 SP1 build 30729
            • [IMP] VS2008 SP1 build 30729
            • [ASM] VS2013 UPD4 build 31101
            • [RES] VS2013 build 21005
            • [LNK] VS2013 UPD4 build 31101
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x5f6a8.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1270000x711c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0xc70000x5f6a80x5f800f5a25d7d937ef75d9bfc4d9fe4392ce1False0.9307100785340314data7.9009284485710145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x1270000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
            RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
            RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
            RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
            RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
            RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
            RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
            RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
            RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
            RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
            RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
            RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
            RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
            RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
            RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
            RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
            RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
            RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
            RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
            RT_RCDATA0xcf7b80x5696ddata1.0003270655174261
            RT_GROUP_ICON0x1261280x76dataEnglishGreat Britain0.6610169491525424
            RT_GROUP_ICON0x1261a00x14dataEnglishGreat Britain1.25
            RT_GROUP_ICON0x1261b40x14dataEnglishGreat Britain1.15
            RT_GROUP_ICON0x1261c80x14dataEnglishGreat Britain1.25
            RT_VERSION0x1261dc0xdcdataEnglishGreat Britain0.6181818181818182
            RT_MANIFEST0x1262b80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
            DLLImport
            WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
            VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
            WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
            PSAPI.DLLGetProcessMemoryInfo
            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
            USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
            UxTheme.dllIsThemeActive
            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
            USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
            GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
            COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
            OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
            Language of compilation systemCountry where language is spokenMap
            EnglishGreat Britain
            TimestampSource PortDest PortSource IPDest IP
            Jan 10, 2025 16:55:13.446333885 CET5554753192.168.2.6162.159.36.2
            Jan 10, 2025 16:55:13.451126099 CET5355547162.159.36.2192.168.2.6
            Jan 10, 2025 16:55:13.451199055 CET5554753192.168.2.6162.159.36.2
            Jan 10, 2025 16:55:13.455990076 CET5355547162.159.36.2192.168.2.6
            Jan 10, 2025 16:55:13.940434933 CET5554753192.168.2.6162.159.36.2
            Jan 10, 2025 16:55:13.945458889 CET5355547162.159.36.2192.168.2.6
            Jan 10, 2025 16:55:13.945521116 CET5554753192.168.2.6162.159.36.2
            TimestampSource PortDest PortSource IPDest IP
            Jan 10, 2025 16:55:13.445760965 CET5362538162.159.36.2192.168.2.6
            Jan 10, 2025 16:55:14.605043888 CET53589011.1.1.1192.168.2.6
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 10, 2025 16:54:28.616362095 CET1.1.1.1192.168.2.60x7d7eNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
            Jan 10, 2025 16:54:28.616362095 CET1.1.1.1192.168.2.60x7d7eNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:10:54:29
            Start date:10/01/2025
            Path:C:\Users\user\Desktop\lExtvSjBgq.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\lExtvSjBgq.exe"
            Imagebase:0x1e0000
            File size:1'212'416 bytes
            MD5 hash:B517FEF76C7787155698922A3CD4968C
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:2
            Start time:10:54:32
            Start date:10/01/2025
            Path:C:\Windows\SysWOW64\svchost.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\lExtvSjBgq.exe"
            Imagebase:0xc80000
            File size:46'504 bytes
            MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2887345795.0000000002D60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2887106496.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:3.9%
              Dynamic/Decrypted Code Coverage:0.4%
              Signature Coverage:9.5%
              Total number of Nodes:2000
              Total number of Limit Nodes:32
              execution_graph 100737 1e107d 100742 1e708b 100737->100742 100739 1e108c 100773 202d40 100739->100773 100743 1e709b __write_nolock 100742->100743 100776 1e7667 100743->100776 100747 1e715a 100788 20050b 100747->100788 100754 1e7667 59 API calls 100755 1e718b 100754->100755 100807 1e7d8c 100755->100807 100757 1e7194 RegOpenKeyExW 100758 21e8b1 RegQueryValueExW 100757->100758 100762 1e71b6 Mailbox 100757->100762 100759 21e943 RegCloseKey 100758->100759 100760 21e8ce 100758->100760 100759->100762 100772 21e955 _wcscat Mailbox __wsetenvp 100759->100772 100811 200db6 100760->100811 100762->100739 100763 21e8e7 100821 1e522e 100763->100821 100766 21e90f 100824 1e7bcc 100766->100824 100768 1e79f2 59 API calls 100768->100772 100769 21e929 100769->100759 100771 1e3f74 59 API calls 100771->100772 100772->100762 100772->100768 100772->100771 100833 1e7de1 100772->100833 100898 202c44 100773->100898 100775 1e1096 100777 200db6 Mailbox 59 API calls 100776->100777 100778 1e7688 100777->100778 100779 200db6 Mailbox 59 API calls 100778->100779 100780 1e7151 100779->100780 100781 1e4706 100780->100781 100837 211940 100781->100837 100784 1e7de1 59 API calls 100785 1e4739 100784->100785 100839 1e4750 100785->100839 100787 1e4743 Mailbox 100787->100747 100789 211940 __write_nolock 100788->100789 100790 200518 GetFullPathNameW 100789->100790 100791 20053a 100790->100791 100792 1e7bcc 59 API calls 100791->100792 100793 1e7165 100792->100793 100794 1e7cab 100793->100794 100795 1e7cbf 100794->100795 100796 21ed4a 100794->100796 100861 1e7c50 100795->100861 100866 1e8029 100796->100866 100799 1e7173 100801 1e3f74 100799->100801 100800 21ed55 __wsetenvp _memmove 100803 1e3f82 100801->100803 100806 1e3fa4 _memmove 100801->100806 100802 200db6 Mailbox 59 API calls 100805 1e3fb8 100802->100805 100804 200db6 Mailbox 59 API calls 100803->100804 100804->100806 100805->100754 100806->100802 100808 1e7da6 100807->100808 100810 1e7d99 100807->100810 100809 200db6 Mailbox 59 API calls 100808->100809 100809->100810 100810->100757 100814 200dbe 100811->100814 100813 200dd8 100813->100763 100814->100813 100816 200ddc std::exception::exception 100814->100816 100869 20571c 100814->100869 100886 2033a1 DecodePointer 100814->100886 100887 20859b RaiseException 100816->100887 100818 200e06 100888 2084d1 58 API calls _free 100818->100888 100820 200e18 100820->100763 100822 200db6 Mailbox 59 API calls 100821->100822 100823 1e5240 RegQueryValueExW 100822->100823 100823->100766 100823->100769 100825 1e7bd8 __wsetenvp 100824->100825 100826 1e7c45 100824->100826 100828 1e7bee 100825->100828 100829 1e7c13 100825->100829 100827 1e7d2c 59 API calls 100826->100827 100832 1e7bf6 _memmove 100827->100832 100897 1e7f27 59 API calls Mailbox 100828->100897 100831 1e8029 59 API calls 100829->100831 100831->100832 100832->100769 100834 1e7df0 __wsetenvp _memmove 100833->100834 100835 200db6 Mailbox 59 API calls 100834->100835 100836 1e7e2e 100835->100836 100836->100772 100838 1e4713 GetModuleFileNameW 100837->100838 100838->100784 100840 211940 __write_nolock 100839->100840 100841 1e475d GetFullPathNameW 100840->100841 100842 1e477c 100841->100842 100843 1e4799 100841->100843 100845 1e7bcc 59 API calls 100842->100845 100844 1e7d8c 59 API calls 100843->100844 100846 1e4788 100844->100846 100845->100846 100849 1e7726 100846->100849 100850 1e7734 100849->100850 100853 1e7d2c 100850->100853 100852 1e4794 100852->100787 100854 1e7d3a 100853->100854 100856 1e7d43 _memmove 100853->100856 100854->100856 100857 1e7e4f 100854->100857 100856->100852 100858 1e7e62 100857->100858 100860 1e7e5f _memmove 100857->100860 100859 200db6 Mailbox 59 API calls 100858->100859 100859->100860 100860->100856 100862 1e7c5f __wsetenvp 100861->100862 100863 1e8029 59 API calls 100862->100863 100864 1e7c70 _memmove 100862->100864 100865 21ed07 _memmove 100863->100865 100864->100799 100867 200db6 Mailbox 59 API calls 100866->100867 100868 1e8033 100867->100868 100868->100800 100870 205797 100869->100870 100878 205728 100869->100878 100895 2033a1 DecodePointer 100870->100895 100872 20579d 100896 208b28 58 API calls __getptd_noexit 100872->100896 100875 20575b RtlAllocateHeap 100875->100878 100885 20578f 100875->100885 100877 205783 100893 208b28 58 API calls __getptd_noexit 100877->100893 100878->100875 100878->100877 100879 205733 100878->100879 100883 205781 100878->100883 100892 2033a1 DecodePointer 100878->100892 100879->100878 100889 20a16b 58 API calls 2 library calls 100879->100889 100890 20a1c8 58 API calls 8 library calls 100879->100890 100891 20309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100879->100891 100894 208b28 58 API calls __getptd_noexit 100883->100894 100885->100814 100886->100814 100887->100818 100888->100820 100889->100879 100890->100879 100892->100878 100893->100883 100894->100885 100895->100872 100896->100885 100897->100832 100899 202c50 _fseek 100898->100899 100906 203217 100899->100906 100905 202c77 _fseek 100905->100775 100923 209c0b 100906->100923 100908 202c59 100909 202c88 DecodePointer DecodePointer 100908->100909 100910 202cb5 100909->100910 100911 202c65 100909->100911 100910->100911 100969 2087a4 59 API calls __cftof_l 100910->100969 100920 202c82 100911->100920 100913 202d18 EncodePointer EncodePointer 100913->100911 100914 202cc7 100914->100913 100915 202cec 100914->100915 100970 208864 61 API calls __realloc_crt 100914->100970 100915->100911 100918 202d06 EncodePointer 100915->100918 100971 208864 61 API calls __realloc_crt 100915->100971 100918->100913 100919 202d00 100919->100911 100919->100918 100972 203220 100920->100972 100924 209c1c 100923->100924 100925 209c2f EnterCriticalSection 100923->100925 100930 209c93 100924->100930 100925->100908 100927 209c22 100927->100925 100954 2030b5 58 API calls 3 library calls 100927->100954 100931 209c9f _fseek 100930->100931 100932 209cc0 100931->100932 100933 209ca8 100931->100933 100941 209ce1 _fseek 100932->100941 100958 20881d 58 API calls 2 library calls 100932->100958 100955 20a16b 58 API calls 2 library calls 100933->100955 100935 209cad 100956 20a1c8 58 API calls 8 library calls 100935->100956 100938 209cd5 100939 209ceb 100938->100939 100940 209cdc 100938->100940 100944 209c0b __lock 58 API calls 100939->100944 100959 208b28 58 API calls __getptd_noexit 100940->100959 100941->100927 100942 209cb4 100957 20309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100942->100957 100946 209cf2 100944->100946 100948 209d17 100946->100948 100949 209cff 100946->100949 100961 202d55 100948->100961 100960 209e2b InitializeCriticalSectionAndSpinCount 100949->100960 100952 209d0b 100967 209d33 LeaveCriticalSection _doexit 100952->100967 100955->100935 100956->100942 100958->100938 100959->100941 100960->100952 100962 202d87 __dosmaperr 100961->100962 100963 202d5e RtlFreeHeap 100961->100963 100962->100952 100963->100962 100964 202d73 100963->100964 100968 208b28 58 API calls __getptd_noexit 100964->100968 100966 202d79 GetLastError 100966->100962 100967->100941 100968->100966 100969->100914 100970->100915 100971->100919 100975 209d75 LeaveCriticalSection 100972->100975 100974 202c87 100974->100905 100975->100974 100976 21fe27 100989 1ff944 100976->100989 100978 21fe3d 100979 21fe53 100978->100979 100982 21febe 100978->100982 101078 1e9e5d 60 API calls 100979->101078 100981 21fe92 100983 21fe9a 100981->100983 100984 22089c 100981->100984 100998 1efce0 100982->100998 101079 24834f 59 API calls Mailbox 100983->101079 101080 249e4a 89 API calls 4 library calls 100984->101080 100988 21feb2 Mailbox 100988->100988 100990 1ff962 100989->100990 100991 1ff950 100989->100991 100993 1ff968 100990->100993 100994 1ff991 100990->100994 101081 1e9d3c 100991->101081 100996 200db6 Mailbox 59 API calls 100993->100996 100995 1e9d3c 60 API calls 100994->100995 100997 1ff95a 100995->100997 100996->100997 100997->100978 101101 1e8180 100998->101101 101000 1efd3d 101001 22472d 101000->101001 101061 1f06f6 101000->101061 101106 1ef234 101000->101106 101237 249e4a 89 API calls 4 library calls 101001->101237 101005 1efe3e 101012 1efe4c 101005->101012 101036 22488d 101005->101036 101241 2366ec 59 API calls 2 library calls 101005->101241 101006 1efdd3 101006->101005 101007 1f0517 101006->101007 101010 200db6 59 API calls Mailbox 101006->101010 101013 224755 101006->101013 101039 224742 101006->101039 101052 22480c 101006->101052 101055 1f0545 _memmove 101006->101055 101207 1e9ea0 101006->101207 101017 200db6 Mailbox 59 API calls 101007->101017 101008 224b53 101008->101039 101262 249e4a 89 API calls 4 library calls 101008->101262 101010->101006 101012->101008 101022 2248f9 101012->101022 101110 1e837c 101012->101110 101028 2247d7 101013->101028 101238 1ef6a3 341 API calls 101013->101238 101014 224848 101242 2360ef 59 API calls 2 library calls 101014->101242 101017->101055 101018 2248b2 Mailbox 101018->101012 101244 2366ec 59 API calls 2 library calls 101018->101244 101024 224917 101022->101024 101245 1e85c0 101022->101245 101027 224928 101024->101027 101033 1e85c0 59 API calls 101024->101033 101025 1efea4 101034 224ad6 101025->101034 101035 1eff32 101025->101035 101070 1f0179 Mailbox _memmove 101025->101070 101026 22486b 101029 1e9ea0 341 API calls 101026->101029 101027->101070 101253 2360ab 59 API calls Mailbox 101027->101253 101028->101039 101239 249e4a 89 API calls 4 library calls 101028->101239 101029->101036 101031 200db6 Mailbox 59 API calls 101076 1f0106 _memmove 101031->101076 101033->101027 101261 249ae7 60 API calls 101034->101261 101037 200db6 Mailbox 59 API calls 101035->101037 101036->101012 101036->101039 101243 25a2d9 85 API calls Mailbox 101036->101243 101042 1eff39 101037->101042 101042->101061 101117 1f09d0 101042->101117 101043 224a4d 101044 1e9ea0 341 API calls 101043->101044 101045 224a87 101044->101045 101045->101039 101256 1e84c0 101045->101256 101048 1effb2 101048->101055 101056 1effe6 101048->101056 101048->101061 101240 249e4a 89 API calls 4 library calls 101052->101240 101053 224ab2 101260 249e4a 89 API calls 4 library calls 101053->101260 101055->101031 101060 1e8047 59 API calls 101056->101060 101063 1f0007 101056->101063 101059 1e9d3c 60 API calls 101059->101070 101060->101063 101236 249e4a 89 API calls 4 library calls 101061->101236 101062 1f0398 101062->100988 101063->101061 101064 224b24 101063->101064 101067 1f004c 101063->101067 101066 1e9d3c 60 API calls 101064->101066 101065 200db6 59 API calls Mailbox 101065->101070 101066->101008 101067->101008 101067->101061 101068 1f00d8 101067->101068 101069 1e9d3c 60 API calls 101068->101069 101072 1f00eb 101069->101072 101070->101043 101070->101053 101070->101059 101070->101061 101070->101062 101070->101065 101071 224a1c 101070->101071 101205 1e8740 68 API calls __cinit 101070->101205 101206 1e8660 68 API calls 101070->101206 101254 245937 68 API calls 101070->101254 101255 1e89b3 69 API calls Mailbox 101070->101255 101074 200db6 Mailbox 59 API calls 101071->101074 101072->101061 101194 1e82df 101072->101194 101074->101043 101076->101070 101077 1f0162 101076->101077 101231 1e9c90 101076->101231 101077->100988 101078->100981 101079->100988 101080->100988 101082 1e9d4a 101081->101082 101092 1e9d78 Mailbox 101081->101092 101083 1e9d9d 101082->101083 101086 1e9d50 Mailbox 101082->101086 101094 1e8047 101083->101094 101085 1e9d64 101087 1e9d6f 101085->101087 101088 1e9dcc 101085->101088 101085->101092 101086->101085 101089 21fa0f 101086->101089 101091 21f9e6 VariantClear 101087->101091 101087->101092 101088->101092 101098 1e8cd4 59 API calls Mailbox 101088->101098 101089->101092 101099 236e8f 59 API calls 101089->101099 101091->101092 101092->100997 101095 1e805a 101094->101095 101096 1e8052 101094->101096 101095->101092 101100 1e7f77 59 API calls 2 library calls 101096->101100 101098->101092 101099->101092 101100->101095 101102 1e818f 101101->101102 101105 1e81aa 101101->101105 101103 1e7e4f 59 API calls 101102->101103 101104 1e8197 CharUpperBuffW 101103->101104 101104->101105 101105->101000 101107 1ef251 101106->101107 101108 1ef272 101107->101108 101263 249e4a 89 API calls 4 library calls 101107->101263 101108->101006 101111 1e838d 101110->101111 101112 21edbd 101110->101112 101113 200db6 Mailbox 59 API calls 101111->101113 101114 1e8394 101113->101114 101115 1e83b5 101114->101115 101264 1e8634 59 API calls Mailbox 101114->101264 101115->101022 101115->101025 101118 224cc3 101117->101118 101130 1f09f5 101117->101130 101325 249e4a 89 API calls 4 library calls 101118->101325 101120 1f0ce4 101121 1f0cfa 101120->101121 101322 1f1070 10 API calls Mailbox 101120->101322 101121->101048 101124 1f0ee4 101124->101121 101125 1f0ef1 101124->101125 101323 1f1093 341 API calls Mailbox 101125->101323 101126 1f0a4b PeekMessageW 101157 1f0a05 Mailbox 101126->101157 101129 1f0ef8 LockWindowUpdate DestroyWindow GetMessageW 101129->101121 101132 1f0f2a 101129->101132 101130->101157 101326 1e9e5d 60 API calls 101130->101326 101327 236349 341 API calls 101130->101327 101131 224e81 Sleep 101131->101157 101134 225c58 TranslateMessage DispatchMessageW GetMessageW 101132->101134 101134->101134 101135 225c88 101134->101135 101135->101121 101136 224d50 TranslateAcceleratorW 101138 1f0e43 PeekMessageW 101136->101138 101136->101157 101137 1f0ea5 TranslateMessage DispatchMessageW 101137->101138 101138->101157 101139 22581f WaitForSingleObject 101142 22583c GetExitCodeProcess CloseHandle 101139->101142 101139->101157 101141 1f0d13 timeGetTime 101141->101157 101146 1f0f95 101142->101146 101143 1f0e5f Sleep 101165 1f0e70 Mailbox 101143->101165 101144 1e8047 59 API calls 101144->101157 101145 1e7667 59 API calls 101145->101165 101146->101048 101147 225af8 Sleep 101147->101165 101149 200db6 59 API calls Mailbox 101149->101157 101151 20049f timeGetTime 101151->101165 101152 1f0f4e timeGetTime 101324 1e9e5d 60 API calls 101152->101324 101155 225b8f GetExitCodeProcess 101159 225ba5 WaitForSingleObject 101155->101159 101160 225bbb CloseHandle 101155->101160 101157->101120 101157->101126 101157->101131 101157->101136 101157->101137 101157->101138 101157->101139 101157->101141 101157->101143 101157->101144 101157->101146 101157->101147 101157->101149 101157->101152 101164 1e9e5d 60 API calls 101157->101164 101157->101165 101174 1e9ea0 314 API calls 101157->101174 101177 1efce0 314 API calls 101157->101177 101180 1e7de1 59 API calls 101157->101180 101181 249e4a 89 API calls 101157->101181 101183 1e84c0 69 API calls 101157->101183 101184 1e9c90 59 API calls Mailbox 101157->101184 101185 1eb73c 314 API calls 101157->101185 101186 1e82df 59 API calls 101157->101186 101187 23617e 59 API calls Mailbox 101157->101187 101188 1e89b3 69 API calls 101157->101188 101189 2255d5 VariantClear 101157->101189 101190 22566b VariantClear 101157->101190 101191 1e8cd4 59 API calls Mailbox 101157->101191 101192 225419 VariantClear 101157->101192 101193 236e8f 59 API calls 101157->101193 101265 1ee6a0 101157->101265 101296 1ef460 101157->101296 101316 1e31ce 101157->101316 101321 1ee420 341 API calls 101157->101321 101328 266018 59 API calls 101157->101328 101329 249a15 59 API calls Mailbox 101157->101329 101330 23d4f2 59 API calls 101157->101330 101331 1e9837 101157->101331 101349 2360ef 59 API calls 2 library calls 101157->101349 101350 1e8401 59 API calls 101157->101350 101158 1eb7dd 109 API calls 101158->101165 101159->101157 101159->101160 101160->101165 101163 265f25 110 API calls 101163->101165 101164->101157 101165->101145 101165->101146 101165->101151 101165->101155 101165->101157 101165->101158 101165->101163 101166 225874 101165->101166 101167 225078 Sleep 101165->101167 101168 225c17 Sleep 101165->101168 101170 1e7de1 59 API calls 101165->101170 101351 242408 60 API calls 101165->101351 101352 1e9e5d 60 API calls 101165->101352 101353 1e89b3 69 API calls Mailbox 101165->101353 101354 1eb73c 341 API calls 101165->101354 101355 2364da 60 API calls 101165->101355 101356 245244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 101165->101356 101357 243c55 66 API calls Mailbox 101165->101357 101166->101146 101167->101157 101168->101157 101170->101165 101174->101157 101177->101157 101180->101157 101181->101157 101183->101157 101184->101157 101185->101157 101186->101157 101187->101157 101188->101157 101189->101157 101190->101157 101191->101157 101192->101157 101193->101157 101195 21eda1 101194->101195 101198 1e82f2 101194->101198 101196 21edb1 101195->101196 102459 2361a4 59 API calls 101195->102459 101199 1e831c 101198->101199 101200 1e85c0 59 API calls 101198->101200 101204 1e8339 Mailbox 101198->101204 101201 1e8322 101199->101201 101202 1e85c0 59 API calls 101199->101202 101200->101199 101203 1e9c90 Mailbox 59 API calls 101201->101203 101201->101204 101202->101201 101203->101204 101204->101076 101205->101070 101206->101070 101208 1e9ebf 101207->101208 101226 1e9eed Mailbox 101207->101226 101209 200db6 Mailbox 59 API calls 101208->101209 101209->101226 101210 1eb475 101211 1e8047 59 API calls 101210->101211 101221 1ea057 101211->101221 101212 236e8f 59 API calls 101212->101226 101213 1eb47a 101214 2209e5 101213->101214 101215 220055 101213->101215 102480 249e4a 89 API calls 4 library calls 101214->102480 102477 249e4a 89 API calls 4 library calls 101215->102477 101216 1e7667 59 API calls 101216->101226 101219 200db6 59 API calls Mailbox 101219->101226 101221->101006 101222 220064 101222->101006 101225 1e8047 59 API calls 101225->101226 101226->101210 101226->101212 101226->101213 101226->101215 101226->101216 101226->101219 101226->101221 101226->101225 101227 202d40 67 API calls __cinit 101226->101227 101228 2209d6 101226->101228 101230 1ea55a 101226->101230 102460 1eb900 101226->102460 102476 1ec8c0 341 API calls 2 library calls 101226->102476 101227->101226 102479 249e4a 89 API calls 4 library calls 101228->102479 102478 249e4a 89 API calls 4 library calls 101230->102478 101233 1e9c9b 101231->101233 101232 1e9cd2 101232->101076 101233->101232 102486 1e8cd4 59 API calls Mailbox 101233->102486 101235 1e9cfd 101235->101076 101236->101001 101237->101039 101238->101028 101239->101039 101240->101039 101241->101014 101242->101026 101243->101018 101244->101018 101247 1e85ce 101245->101247 101252 1e85f6 101245->101252 101246 1e85dc 101248 1e85e2 101246->101248 101250 1e85c0 59 API calls 101246->101250 101247->101246 101249 1e85c0 59 API calls 101247->101249 101251 1e9c90 Mailbox 59 API calls 101248->101251 101248->101252 101249->101246 101250->101248 101251->101252 101252->101024 101253->101070 101254->101070 101255->101070 101257 1e84cb 101256->101257 101259 1e84f2 101257->101259 102487 1e89b3 69 API calls Mailbox 101257->102487 101259->101053 101260->101039 101261->101056 101262->101039 101263->101108 101264->101115 101266 1ee6d5 101265->101266 101267 223aa9 101266->101267 101270 1ee73f 101266->101270 101279 1ee799 101266->101279 101268 1e9ea0 341 API calls 101267->101268 101269 223abe 101268->101269 101284 1ee970 Mailbox 101269->101284 101359 249e4a 89 API calls 4 library calls 101269->101359 101273 1e7667 59 API calls 101270->101273 101270->101279 101271 1e7667 59 API calls 101271->101279 101274 223b04 101273->101274 101276 202d40 __cinit 67 API calls 101274->101276 101275 202d40 __cinit 67 API calls 101275->101279 101276->101279 101277 223b26 101277->101157 101278 1e84c0 69 API calls 101278->101284 101279->101271 101279->101275 101279->101277 101280 1ee95a 101279->101280 101279->101284 101280->101284 101360 249e4a 89 API calls 4 library calls 101280->101360 101281 1e9ea0 341 API calls 101281->101284 101283 1e8d40 59 API calls 101283->101284 101284->101278 101284->101281 101284->101283 101285 1e9c90 Mailbox 59 API calls 101284->101285 101287 249e4a 89 API calls 101284->101287 101291 1ef195 101284->101291 101295 1eea78 101284->101295 101358 1e7f77 59 API calls 2 library calls 101284->101358 101361 236e8f 59 API calls 101284->101361 101362 25c5c3 341 API calls 101284->101362 101363 25b53c 341 API calls Mailbox 101284->101363 101365 2593c6 341 API calls Mailbox 101284->101365 101285->101284 101287->101284 101364 249e4a 89 API calls 4 library calls 101291->101364 101294 223e25 101294->101157 101295->101157 101297 1ef4ba 101296->101297 101298 1ef650 101296->101298 101300 1ef4c6 101297->101300 101301 22441e 101297->101301 101299 1e7de1 59 API calls 101298->101299 101307 1ef58c Mailbox 101299->101307 101467 1ef290 341 API calls 2 library calls 101300->101467 101468 25bc6b 101301->101468 101304 22442c 101308 1ef630 101304->101308 101508 249e4a 89 API calls 4 library calls 101304->101508 101306 1ef4fd 101306->101304 101306->101307 101306->101308 101366 1e4e4a 101307->101366 101372 25df37 101307->101372 101375 243c37 101307->101375 101378 24cb7a 101307->101378 101458 25445a 101307->101458 101308->101157 101309 1e9c90 Mailbox 59 API calls 101310 1ef5e3 101309->101310 101310->101308 101310->101309 101317 1e31e0 101316->101317 101318 1e3212 101316->101318 101317->101318 101319 1e3205 IsDialogMessageW 101317->101319 101320 21cf32 GetClassLongW 101317->101320 101318->101157 101319->101317 101319->101318 101320->101317 101320->101319 101321->101157 101322->101124 101323->101129 101324->101157 101325->101130 101326->101130 101327->101130 101328->101157 101329->101157 101330->101157 101332 1e984b 101331->101332 101333 1e9851 101331->101333 101332->101157 101334 21f5d3 __i64tow 101333->101334 101335 1e9899 101333->101335 101337 1e9857 __itow 101333->101337 101340 21f4da 101333->101340 102457 203698 83 API calls 3 library calls 101335->102457 101339 200db6 Mailbox 59 API calls 101337->101339 101341 1e9871 101339->101341 101343 200db6 Mailbox 59 API calls 101340->101343 101347 21f552 Mailbox _wcscpy 101340->101347 101341->101332 101342 1e7de1 59 API calls 101341->101342 101342->101332 101344 21f51f 101343->101344 101345 200db6 Mailbox 59 API calls 101344->101345 101346 21f545 101345->101346 101346->101347 101348 1e7de1 59 API calls 101346->101348 102458 203698 83 API calls 3 library calls 101347->102458 101348->101347 101349->101157 101350->101157 101351->101165 101352->101165 101353->101165 101354->101165 101355->101165 101356->101165 101357->101165 101358->101284 101359->101284 101360->101284 101361->101284 101362->101284 101363->101284 101364->101294 101365->101284 101367 1e4e54 101366->101367 101369 1e4e5b 101366->101369 101509 2053a6 101367->101509 101370 1e4e6a 101369->101370 101371 1e4e7b FreeLibrary 101369->101371 101370->101310 101371->101370 101779 25cadd 101372->101779 101374 25df47 101374->101310 101902 24445a GetFileAttributesW 101375->101902 101379 1e7667 59 API calls 101378->101379 101380 24cbaf 101379->101380 101381 1e7667 59 API calls 101380->101381 101382 24cbb8 101381->101382 101383 24cbcc 101382->101383 102102 1e9b3c 59 API calls 101382->102102 101385 1e9837 84 API calls 101383->101385 101386 24cbe9 101385->101386 101387 24ccea 101386->101387 101388 24cc0b 101386->101388 101457 24cd1a Mailbox 101386->101457 101906 1e4ddd 101387->101906 101390 1e9837 84 API calls 101388->101390 101391 24cc17 101390->101391 101393 1e8047 59 API calls 101391->101393 101395 24cc23 101393->101395 101394 24cd16 101397 1e7667 59 API calls 101394->101397 101394->101457 101400 24cc37 101395->101400 101401 24cc69 101395->101401 101396 1e4ddd 136 API calls 101396->101394 101398 24cd4b 101397->101398 101399 1e7667 59 API calls 101398->101399 101402 24cd54 101399->101402 101404 1e8047 59 API calls 101400->101404 101405 1e9837 84 API calls 101401->101405 101403 1e7667 59 API calls 101402->101403 101406 24cd5d 101403->101406 101407 24cc47 101404->101407 101408 24cc76 101405->101408 101410 1e7667 59 API calls 101406->101410 101411 1e7cab 59 API calls 101407->101411 101409 1e8047 59 API calls 101408->101409 101412 24cc82 101409->101412 101413 24cd66 101410->101413 101414 24cc51 101411->101414 102103 244a31 GetFileAttributesW 101412->102103 101416 1e9837 84 API calls 101413->101416 101417 1e9837 84 API calls 101414->101417 101419 24cd73 101416->101419 101420 24cc5d 101417->101420 101418 24cc8b 101421 24cc9e 101418->101421 101424 1e79f2 59 API calls 101418->101424 101930 1e459b 101419->101930 101423 1e7b2e 59 API calls 101420->101423 101426 1e9837 84 API calls 101421->101426 101432 24cca4 101421->101432 101423->101401 101424->101421 101425 24cd8e 101981 1e79f2 101425->101981 101428 24cccb 101426->101428 102104 2437ef 75 API calls Mailbox 101428->102104 101431 24cdd1 101433 1e8047 59 API calls 101431->101433 101432->101457 101435 24cddf 101433->101435 101434 1e79f2 59 API calls 101436 24cdae 101434->101436 101984 1e7b2e 101435->101984 101436->101431 101439 1e7bcc 59 API calls 101436->101439 101441 24cdc3 101439->101441 101440 1e7b2e 59 API calls 101443 24cdfb 101440->101443 101442 1e7bcc 59 API calls 101441->101442 101442->101431 101444 1e7b2e 59 API calls 101443->101444 101445 24ce09 101444->101445 101446 1e9837 84 API calls 101445->101446 101447 24ce15 101446->101447 101993 244071 101447->101993 101449 24ce26 101450 243c37 3 API calls 101449->101450 101451 24ce30 101450->101451 101452 1e9837 84 API calls 101451->101452 101456 24ce61 101451->101456 101453 24ce4e 101452->101453 102047 249155 101453->102047 101455 1e4e4a 84 API calls 101455->101457 101456->101455 101457->101310 101459 1e9837 84 API calls 101458->101459 101460 254494 101459->101460 102410 1e6240 101460->102410 101462 2544a4 101463 2544c9 101462->101463 101464 1e9ea0 341 API calls 101462->101464 101466 2544cd 101463->101466 102435 1e9a98 59 API calls Mailbox 101463->102435 101464->101463 101466->101310 101467->101306 101469 25bc96 101468->101469 101470 25bcb0 101468->101470 102449 249e4a 89 API calls 4 library calls 101469->102449 102450 25a213 59 API calls Mailbox 101470->102450 101473 25bcbb 101474 1e9ea0 340 API calls 101473->101474 101475 25bd1c 101474->101475 101476 25bdae 101475->101476 101480 25bd5d 101475->101480 101501 25bca8 Mailbox 101475->101501 101477 25be04 101476->101477 101478 25bdb4 101476->101478 101479 1e9837 84 API calls 101477->101479 101477->101501 102452 24791a 59 API calls 101478->102452 101481 25be16 101479->101481 102451 2472df 59 API calls Mailbox 101480->102451 101483 1e7e4f 59 API calls 101481->101483 101486 25be3a CharUpperBuffW 101483->101486 101484 25bdd7 102453 1e5d41 59 API calls Mailbox 101484->102453 101491 25be54 101486->101491 101488 25bd8d 101490 1ef460 340 API calls 101488->101490 101489 25bddf Mailbox 101495 1efce0 340 API calls 101489->101495 101490->101501 101492 25bea7 101491->101492 101493 25be5b 101491->101493 101494 1e9837 84 API calls 101492->101494 102454 2472df 59 API calls Mailbox 101493->102454 101496 25beaf 101494->101496 101495->101501 102455 1e9e5d 60 API calls 101496->102455 101499 25be89 101500 1ef460 340 API calls 101499->101500 101500->101501 101501->101304 101502 25beb9 101502->101501 101503 1e9837 84 API calls 101502->101503 101504 25bed4 101503->101504 102456 1e5d41 59 API calls Mailbox 101504->102456 101506 25bee4 101507 1efce0 340 API calls 101506->101507 101507->101501 101508->101308 101510 2053b2 _fseek 101509->101510 101511 2053c6 101510->101511 101512 2053de 101510->101512 101544 208b28 58 API calls __getptd_noexit 101511->101544 101518 2053d6 _fseek 101512->101518 101522 206c11 101512->101522 101514 2053cb 101545 208db6 9 API calls __cftof_l 101514->101545 101518->101369 101523 206c21 101522->101523 101524 206c43 EnterCriticalSection 101522->101524 101523->101524 101525 206c29 101523->101525 101526 2053f0 101524->101526 101527 209c0b __lock 58 API calls 101525->101527 101528 20533a 101526->101528 101527->101526 101529 205349 101528->101529 101530 20535d 101528->101530 101590 208b28 58 API calls __getptd_noexit 101529->101590 101532 205359 101530->101532 101547 204a3d 101530->101547 101546 205415 LeaveCriticalSection LeaveCriticalSection _fprintf 101532->101546 101533 20534e 101591 208db6 9 API calls __cftof_l 101533->101591 101540 205377 101564 210a02 101540->101564 101542 20537d 101542->101532 101543 202d55 _free 58 API calls 101542->101543 101543->101532 101544->101514 101545->101518 101546->101518 101548 204a50 101547->101548 101549 204a74 101547->101549 101548->101549 101550 2046e6 __flush 58 API calls 101548->101550 101553 210b77 101549->101553 101551 204a6d 101550->101551 101592 20d886 101551->101592 101554 205371 101553->101554 101555 210b84 101553->101555 101557 2046e6 101554->101557 101555->101554 101556 202d55 _free 58 API calls 101555->101556 101556->101554 101558 2046f0 101557->101558 101559 204705 101557->101559 101734 208b28 58 API calls __getptd_noexit 101558->101734 101559->101540 101561 2046f5 101735 208db6 9 API calls __cftof_l 101561->101735 101563 204700 101563->101540 101565 210a0e _fseek 101564->101565 101566 210a32 101565->101566 101567 210a1b 101565->101567 101569 210abd 101566->101569 101572 210a42 101566->101572 101751 208af4 58 API calls __getptd_noexit 101567->101751 101756 208af4 58 API calls __getptd_noexit 101569->101756 101571 210a20 101752 208b28 58 API calls __getptd_noexit 101571->101752 101573 210a60 101572->101573 101574 210a6a 101572->101574 101753 208af4 58 API calls __getptd_noexit 101573->101753 101578 20d206 ___lock_fhandle 59 API calls 101574->101578 101575 210a65 101757 208b28 58 API calls __getptd_noexit 101575->101757 101580 210a70 101578->101580 101582 210a83 101580->101582 101583 210a8e 101580->101583 101581 210ac9 101758 208db6 9 API calls __cftof_l 101581->101758 101736 210add 101582->101736 101754 208b28 58 API calls __getptd_noexit 101583->101754 101586 210a27 _fseek 101586->101542 101588 210a89 101755 210ab5 LeaveCriticalSection __unlock_fhandle 101588->101755 101590->101533 101591->101532 101593 20d892 _fseek 101592->101593 101594 20d8b6 101593->101594 101595 20d89f 101593->101595 101597 20d955 101594->101597 101599 20d8ca 101594->101599 101693 208af4 58 API calls __getptd_noexit 101595->101693 101699 208af4 58 API calls __getptd_noexit 101597->101699 101598 20d8a4 101694 208b28 58 API calls __getptd_noexit 101598->101694 101603 20d8f2 101599->101603 101604 20d8e8 101599->101604 101601 20d8ed 101700 208b28 58 API calls __getptd_noexit 101601->101700 101620 20d206 101603->101620 101695 208af4 58 API calls __getptd_noexit 101604->101695 101608 20d8f8 101610 20d90b 101608->101610 101611 20d91e 101608->101611 101609 20d961 101701 208db6 9 API calls __cftof_l 101609->101701 101629 20d975 101610->101629 101696 208b28 58 API calls __getptd_noexit 101611->101696 101615 20d8ab _fseek 101615->101549 101616 20d917 101698 20d94d LeaveCriticalSection __unlock_fhandle 101616->101698 101617 20d923 101697 208af4 58 API calls __getptd_noexit 101617->101697 101621 20d212 _fseek 101620->101621 101622 20d261 EnterCriticalSection 101621->101622 101623 209c0b __lock 58 API calls 101621->101623 101624 20d287 _fseek 101622->101624 101625 20d237 101623->101625 101624->101608 101626 20d24f 101625->101626 101702 209e2b InitializeCriticalSectionAndSpinCount 101625->101702 101703 20d28b LeaveCriticalSection _doexit 101626->101703 101630 20d982 __write_nolock 101629->101630 101631 20d9e0 101630->101631 101632 20d9c1 101630->101632 101663 20d9b6 101630->101663 101635 20da38 101631->101635 101636 20da1c 101631->101636 101713 208af4 58 API calls __getptd_noexit 101632->101713 101641 20da51 101635->101641 101719 2118c1 60 API calls 3 library calls 101635->101719 101716 208af4 58 API calls __getptd_noexit 101636->101716 101637 20e1d6 101637->101616 101638 20d9c6 101714 208b28 58 API calls __getptd_noexit 101638->101714 101704 215c6b 101641->101704 101642 20da21 101717 208b28 58 API calls __getptd_noexit 101642->101717 101643 20d9cd 101715 208db6 9 API calls __cftof_l 101643->101715 101648 20da5f 101650 20ddb8 101648->101650 101720 2099ac 58 API calls 2 library calls 101648->101720 101649 20da28 101718 208db6 9 API calls __cftof_l 101649->101718 101651 20ddd6 101650->101651 101652 20e14b WriteFile 101650->101652 101655 20defa 101651->101655 101661 20ddec 101651->101661 101656 20ddab GetLastError 101652->101656 101665 20dd78 101652->101665 101667 20dfef 101655->101667 101669 20df05 101655->101669 101656->101665 101657 20da8b GetConsoleMode 101657->101650 101659 20daca 101657->101659 101658 20e184 101658->101663 101725 208b28 58 API calls __getptd_noexit 101658->101725 101659->101650 101660 20dada GetConsoleCP 101659->101660 101660->101658 101690 20db09 101660->101690 101661->101658 101662 20de5b WriteFile 101661->101662 101662->101656 101668 20de98 101662->101668 101727 20c5f6 101663->101727 101665->101658 101665->101663 101666 20ded8 101665->101666 101671 20dee3 101666->101671 101672 20e17b 101666->101672 101667->101658 101673 20e064 WideCharToMultiByte 101667->101673 101668->101661 101674 20debc 101668->101674 101669->101658 101675 20df6a WriteFile 101669->101675 101670 20e1b2 101726 208af4 58 API calls __getptd_noexit 101670->101726 101722 208b28 58 API calls __getptd_noexit 101671->101722 101724 208b07 58 API calls 3 library calls 101672->101724 101673->101656 101686 20e0ab 101673->101686 101674->101665 101675->101656 101679 20dfb9 101675->101679 101679->101665 101679->101669 101679->101674 101680 20dee8 101723 208af4 58 API calls __getptd_noexit 101680->101723 101681 20e0b3 WriteFile 101684 20e106 GetLastError 101681->101684 101681->101686 101684->101686 101685 2162ba 60 API calls __write_nolock 101685->101690 101686->101665 101686->101667 101686->101674 101686->101681 101687 217a5e WriteConsoleW CreateFileW __putwch_nolock 101691 20dc5f 101687->101691 101688 20dbf2 WideCharToMultiByte 101688->101665 101689 20dc2d WriteFile 101688->101689 101689->101656 101689->101691 101690->101665 101690->101685 101690->101688 101690->101691 101721 2035f5 58 API calls __isleadbyte_l 101690->101721 101691->101656 101691->101665 101691->101687 101691->101690 101692 20dc87 WriteFile 101691->101692 101692->101656 101692->101691 101693->101598 101694->101615 101695->101601 101696->101617 101697->101616 101698->101615 101699->101601 101700->101609 101701->101615 101702->101626 101703->101622 101705 215c83 101704->101705 101706 215c76 101704->101706 101708 215c8f 101705->101708 101709 208b28 __cftof_l 58 API calls 101705->101709 101707 208b28 __cftof_l 58 API calls 101706->101707 101710 215c7b 101707->101710 101708->101648 101711 215cb0 101709->101711 101710->101648 101712 208db6 __cftof_l 9 API calls 101711->101712 101712->101710 101713->101638 101714->101643 101715->101663 101716->101642 101717->101649 101718->101663 101719->101641 101720->101657 101721->101690 101722->101680 101723->101663 101724->101663 101725->101670 101726->101663 101728 20c600 IsProcessorFeaturePresent 101727->101728 101729 20c5fe 101727->101729 101731 21590a 101728->101731 101729->101637 101732 2158b9 ___raise_securityfailure 5 API calls 101731->101732 101733 2159ed 101732->101733 101733->101637 101734->101561 101735->101563 101759 20d4c3 101736->101759 101738 210b41 101772 20d43d 59 API calls 2 library calls 101738->101772 101739 210aeb 101739->101738 101741 210b1f 101739->101741 101743 20d4c3 __close_nolock 58 API calls 101739->101743 101741->101738 101744 20d4c3 __close_nolock 58 API calls 101741->101744 101742 210b49 101745 210b6b 101742->101745 101773 208b07 58 API calls 3 library calls 101742->101773 101746 210b16 101743->101746 101747 210b2b CloseHandle 101744->101747 101745->101588 101749 20d4c3 __close_nolock 58 API calls 101746->101749 101747->101738 101750 210b37 GetLastError 101747->101750 101749->101741 101750->101738 101751->101571 101752->101586 101753->101575 101754->101588 101755->101586 101756->101575 101757->101581 101758->101586 101760 20d4e3 101759->101760 101761 20d4ce 101759->101761 101766 20d508 101760->101766 101776 208af4 58 API calls __getptd_noexit 101760->101776 101774 208af4 58 API calls __getptd_noexit 101761->101774 101763 20d4d3 101775 208b28 58 API calls __getptd_noexit 101763->101775 101766->101739 101767 20d512 101777 208b28 58 API calls __getptd_noexit 101767->101777 101768 20d4db 101768->101739 101770 20d51a 101778 208db6 9 API calls __cftof_l 101770->101778 101772->101742 101773->101745 101774->101763 101775->101768 101776->101767 101777->101770 101778->101768 101780 1e9837 84 API calls 101779->101780 101781 25cb1a 101780->101781 101784 25cb61 Mailbox 101781->101784 101817 25d7a5 101781->101817 101783 25cf2e 101866 25d8c8 92 API calls Mailbox 101783->101866 101784->101374 101787 25cdc7 101830 25c96e 101787->101830 101788 25cf3d 101788->101787 101789 25cf49 101788->101789 101789->101784 101790 1e9837 84 API calls 101805 25cbb2 Mailbox 101790->101805 101795 25ce00 101845 200c08 101795->101845 101798 25ce33 101852 1e92ce 101798->101852 101799 25ce1a 101851 249e4a 89 API calls 4 library calls 101799->101851 101802 25cdb9 101802->101783 101802->101787 101804 25ce25 GetCurrentProcess TerminateProcess 101804->101798 101805->101784 101805->101790 101805->101802 101849 25fbce 59 API calls 2 library calls 101805->101849 101850 25cfdf 61 API calls 2 library calls 101805->101850 101809 25cfa4 101809->101784 101813 25cfb8 FreeLibrary 101809->101813 101810 25ce6b 101864 25d649 107 API calls _free 101810->101864 101813->101784 101815 1e9d3c 60 API calls 101816 25ce7c 101815->101816 101816->101809 101816->101815 101865 1e8d40 59 API calls Mailbox 101816->101865 101867 25d649 107 API calls _free 101816->101867 101818 1e7e4f 59 API calls 101817->101818 101819 25d7c0 CharLowerBuffW 101818->101819 101868 23f167 101819->101868 101823 1e7667 59 API calls 101824 25d7f9 101823->101824 101875 1e784b 101824->101875 101826 25d810 101827 1e7d2c 59 API calls 101826->101827 101828 25d81c Mailbox 101827->101828 101829 25d858 Mailbox 101828->101829 101888 25cfdf 61 API calls 2 library calls 101828->101888 101829->101805 101831 25c9de 101830->101831 101832 25c989 101830->101832 101836 25da50 101831->101836 101833 200db6 Mailbox 59 API calls 101832->101833 101835 25c9ab 101833->101835 101834 200db6 Mailbox 59 API calls 101834->101835 101835->101831 101835->101834 101837 25dc79 Mailbox 101836->101837 101844 25da73 _strcat _wcscpy __wsetenvp 101836->101844 101837->101795 101838 1e9be6 59 API calls 101838->101844 101839 1e9b3c 59 API calls 101839->101844 101840 1e9b98 59 API calls 101840->101844 101841 20571c 58 API calls __crtLCMapStringA_stat 101841->101844 101842 1e9837 84 API calls 101842->101844 101844->101837 101844->101838 101844->101839 101844->101840 101844->101841 101844->101842 101892 245887 61 API calls 2 library calls 101844->101892 101846 200c1d 101845->101846 101847 200cb5 VirtualProtect 101846->101847 101848 200c83 101846->101848 101847->101848 101848->101798 101848->101799 101849->101805 101850->101805 101851->101804 101853 1e92d6 101852->101853 101854 200db6 Mailbox 59 API calls 101853->101854 101855 1e92e4 101854->101855 101856 1e92f0 101855->101856 101893 1e91fc 59 API calls Mailbox 101855->101893 101858 1e9050 101856->101858 101894 1e9160 101858->101894 101860 1e905f 101861 200db6 Mailbox 59 API calls 101860->101861 101862 1e90fb 101860->101862 101861->101862 101862->101816 101863 1e8d40 59 API calls Mailbox 101862->101863 101863->101810 101864->101816 101865->101816 101866->101788 101867->101816 101869 23f192 __wsetenvp 101868->101869 101870 23f278 101869->101870 101871 23f1c7 101869->101871 101874 23f1d1 101869->101874 101870->101874 101890 1e78c4 61 API calls 101870->101890 101871->101874 101889 1e78c4 61 API calls 101871->101889 101874->101823 101874->101828 101876 1e785a 101875->101876 101877 1e78b7 101875->101877 101876->101877 101878 1e7865 101876->101878 101879 1e7d2c 59 API calls 101877->101879 101880 21eb09 101878->101880 101881 1e7880 101878->101881 101885 1e7888 _memmove 101879->101885 101882 1e8029 59 API calls 101880->101882 101891 1e7f27 59 API calls Mailbox 101881->101891 101884 21eb13 101882->101884 101886 200db6 Mailbox 59 API calls 101884->101886 101885->101826 101887 21eb33 101886->101887 101888->101829 101889->101871 101890->101870 101891->101885 101892->101844 101893->101856 101895 1e9169 Mailbox 101894->101895 101896 21f19f 101895->101896 101901 1e9173 101895->101901 101897 200db6 Mailbox 59 API calls 101896->101897 101899 21f1ab 101897->101899 101898 1e917a 101898->101860 101900 1e9c90 Mailbox 59 API calls 101900->101901 101901->101898 101901->101900 101903 243c3e 101902->101903 101904 244475 FindFirstFileW 101902->101904 101903->101310 101904->101903 101905 24448a FindClose 101904->101905 101905->101903 102105 1e4bb5 101906->102105 101911 1e4e08 LoadLibraryExW 102115 1e4b6a 101911->102115 101912 21d8e6 101913 1e4e4a 84 API calls 101912->101913 101916 21d8ed 101913->101916 101918 1e4b6a 3 API calls 101916->101918 101920 21d8f5 101918->101920 101919 1e4e2f 101919->101920 101921 1e4e3b 101919->101921 102141 1e4f0b 101920->102141 101922 1e4e4a 84 API calls 101921->101922 101924 1e4e40 101922->101924 101924->101394 101924->101396 101927 21d91c 102149 1e4ec7 101927->102149 101931 1e7667 59 API calls 101930->101931 101932 1e45b1 101931->101932 101933 1e7667 59 API calls 101932->101933 101934 1e45b9 101933->101934 101935 1e7667 59 API calls 101934->101935 101936 1e45c1 101935->101936 101937 1e7667 59 API calls 101936->101937 101938 1e45c9 101937->101938 101939 21d4d2 101938->101939 101940 1e45fd 101938->101940 101941 1e8047 59 API calls 101939->101941 101942 1e784b 59 API calls 101940->101942 101943 21d4db 101941->101943 101944 1e460b 101942->101944 101945 1e7d8c 59 API calls 101943->101945 101946 1e7d2c 59 API calls 101944->101946 101948 1e4640 101945->101948 101947 1e4615 101946->101947 101947->101948 101949 1e784b 59 API calls 101947->101949 101950 1e4680 101948->101950 101951 1e465f 101948->101951 101963 21d4fb 101948->101963 101952 1e4636 101949->101952 101953 1e784b 59 API calls 101950->101953 101956 1e79f2 59 API calls 101951->101956 101955 1e7d2c 59 API calls 101952->101955 101957 1e4691 101953->101957 101954 21d5cb 101959 1e7bcc 59 API calls 101954->101959 101955->101948 101960 1e4669 101956->101960 101958 1e46a3 101957->101958 101961 1e8047 59 API calls 101957->101961 101962 1e46b3 101958->101962 101964 1e8047 59 API calls 101958->101964 101976 21d588 101959->101976 101960->101950 101967 1e784b 59 API calls 101960->101967 101961->101958 101966 1e46ba 101962->101966 101968 1e8047 59 API calls 101962->101968 101963->101954 101965 21d5b4 101963->101965 101975 21d532 101963->101975 101964->101962 101965->101954 101971 21d59f 101965->101971 101969 1e8047 59 API calls 101966->101969 101978 1e46c1 Mailbox 101966->101978 101967->101950 101968->101966 101969->101978 101970 1e79f2 59 API calls 101970->101976 101974 1e7bcc 59 API calls 101971->101974 101972 21d590 101973 1e7bcc 59 API calls 101972->101973 101973->101976 101974->101976 101975->101972 101979 21d57b 101975->101979 101976->101950 101976->101970 102315 1e7924 59 API calls 2 library calls 101976->102315 101978->101425 101980 1e7bcc 59 API calls 101979->101980 101980->101976 101982 1e7e4f 59 API calls 101981->101982 101983 1e79fd 101982->101983 101983->101431 101983->101434 101985 21ec6b 101984->101985 101986 1e7b40 101984->101986 102322 237bdb 59 API calls _memmove 101985->102322 102316 1e7a51 101986->102316 101989 21ec75 101991 1e8047 59 API calls 101989->101991 101990 1e7b4c 101990->101440 101992 21ec7d Mailbox 101991->101992 101994 24408d 101993->101994 101995 2440a0 101994->101995 101996 244092 101994->101996 101998 1e7667 59 API calls 101995->101998 101997 1e8047 59 API calls 101996->101997 102046 24409b Mailbox 101997->102046 101999 2440a8 101998->101999 102000 1e7667 59 API calls 101999->102000 102001 2440b0 102000->102001 102002 1e7667 59 API calls 102001->102002 102003 2440bb 102002->102003 102004 1e7667 59 API calls 102003->102004 102005 2440c3 102004->102005 102006 1e7667 59 API calls 102005->102006 102007 2440cb 102006->102007 102008 1e7667 59 API calls 102007->102008 102009 2440d3 102008->102009 102010 1e7667 59 API calls 102009->102010 102011 2440db 102010->102011 102012 1e7667 59 API calls 102011->102012 102013 2440e3 102012->102013 102014 1e459b 59 API calls 102013->102014 102015 2440fa 102014->102015 102016 1e459b 59 API calls 102015->102016 102017 244113 102016->102017 102018 1e79f2 59 API calls 102017->102018 102019 24411f 102018->102019 102020 244132 102019->102020 102021 1e7d2c 59 API calls 102019->102021 102022 1e79f2 59 API calls 102020->102022 102021->102020 102023 24413b 102022->102023 102024 24414b 102023->102024 102025 1e7d2c 59 API calls 102023->102025 102026 1e8047 59 API calls 102024->102026 102025->102024 102027 244157 102026->102027 102028 1e7b2e 59 API calls 102027->102028 102029 244163 102028->102029 102323 244223 59 API calls 102029->102323 102031 244172 102324 244223 59 API calls 102031->102324 102033 244185 102034 1e79f2 59 API calls 102033->102034 102035 24418f 102034->102035 102036 244194 102035->102036 102037 2441a6 102035->102037 102046->101449 102048 249162 __write_nolock 102047->102048 102049 200db6 Mailbox 59 API calls 102048->102049 102050 2491bf 102049->102050 102051 1e522e 59 API calls 102050->102051 102052 2491c9 102051->102052 102053 248f5f GetSystemTimeAsFileTime 102052->102053 102054 2491d4 102053->102054 102055 1e4ee5 85 API calls 102054->102055 102056 2491e7 _wcscmp 102055->102056 102057 2492b8 102056->102057 102058 24920b 102056->102058 102059 249734 96 API calls 102057->102059 102342 249734 102058->102342 102063 249284 _wcscat 102059->102063 102064 1e4f0b 74 API calls 102063->102064 102066 2492c1 102063->102066 102065 2492dd 102064->102065 102067 1e4f0b 74 API calls 102065->102067 102066->101456 102069 2492ed 102067->102069 102068 249239 _wcscat _wcscpy 102349 2040fb 58 API calls __wsplitpath_helper 102068->102349 102070 1e4f0b 74 API calls 102069->102070 102072 249308 102070->102072 102073 1e4f0b 74 API calls 102072->102073 102074 249318 102073->102074 102075 1e4f0b 74 API calls 102074->102075 102076 249333 102075->102076 102077 1e4f0b 74 API calls 102076->102077 102078 249343 102077->102078 102079 1e4f0b 74 API calls 102078->102079 102080 249353 102079->102080 102081 1e4f0b 74 API calls 102080->102081 102082 249363 102081->102082 102325 2498e3 GetTempPathW GetTempFileNameW 102082->102325 102102->101383 102103->101418 102104->101432 102154 1e4c03 102105->102154 102108 1e4c03 2 API calls 102111 1e4bdc 102108->102111 102109 1e4bec FreeLibrary 102110 1e4bf5 102109->102110 102112 20525b 102110->102112 102111->102109 102111->102110 102158 205270 102112->102158 102114 1e4dfc 102114->101911 102114->101912 102239 1e4c36 102115->102239 102117 1e4b8f 102120 1e4baa 102117->102120 102121 1e4ba1 FreeLibrary 102117->102121 102119 1e4c36 2 API calls 102119->102117 102122 1e4c70 102120->102122 102121->102120 102123 200db6 Mailbox 59 API calls 102122->102123 102124 1e4c85 102123->102124 102125 1e522e 59 API calls 102124->102125 102126 1e4c91 _memmove 102125->102126 102127 1e4ccc 102126->102127 102129 1e4d89 102126->102129 102130 1e4dc1 102126->102130 102128 1e4ec7 69 API calls 102127->102128 102134 1e4cd5 102128->102134 102243 1e4e89 CreateStreamOnHGlobal 102129->102243 102254 24991b 95 API calls 102130->102254 102133 1e4f0b 74 API calls 102133->102134 102134->102133 102136 1e4d69 102134->102136 102137 21d8a7 102134->102137 102249 1e4ee5 102134->102249 102136->101919 102138 1e4ee5 85 API calls 102137->102138 102139 21d8bb 102138->102139 102140 1e4f0b 74 API calls 102139->102140 102140->102136 102142 1e4f1d 102141->102142 102143 21d9cd 102141->102143 102272 2055e2 102142->102272 102146 249109 102292 248f5f 102146->102292 102148 24911f 102148->101927 102150 21d990 102149->102150 102151 1e4ed6 102149->102151 102297 205c60 102151->102297 102153 1e4ede 102155 1e4bd0 102154->102155 102156 1e4c0c LoadLibraryA 102154->102156 102155->102108 102155->102111 102156->102155 102157 1e4c1d GetProcAddress 102156->102157 102157->102155 102159 20527c _fseek 102158->102159 102160 20528f 102159->102160 102162 2052c0 102159->102162 102207 208b28 58 API calls __getptd_noexit 102160->102207 102177 2104e8 102162->102177 102163 205294 102208 208db6 9 API calls __cftof_l 102163->102208 102166 2052c5 102167 2052db 102166->102167 102168 2052ce 102166->102168 102170 205305 102167->102170 102171 2052e5 102167->102171 102209 208b28 58 API calls __getptd_noexit 102168->102209 102192 210607 102170->102192 102210 208b28 58 API calls __getptd_noexit 102171->102210 102173 20529f _fseek @_EH4_CallFilterFunc@8 102173->102114 102178 2104f4 _fseek 102177->102178 102179 209c0b __lock 58 API calls 102178->102179 102190 210502 102179->102190 102180 210576 102212 2105fe 102180->102212 102181 21057d 102217 20881d 58 API calls 2 library calls 102181->102217 102184 210584 102184->102180 102218 209e2b InitializeCriticalSectionAndSpinCount 102184->102218 102185 2105f3 _fseek 102185->102166 102187 209c93 __mtinitlocknum 58 API calls 102187->102190 102189 2105aa EnterCriticalSection 102189->102180 102190->102180 102190->102181 102190->102187 102215 206c50 59 API calls __lock 102190->102215 102216 206cba LeaveCriticalSection LeaveCriticalSection _doexit 102190->102216 102201 210627 __wopenfile 102192->102201 102193 210641 102223 208b28 58 API calls __getptd_noexit 102193->102223 102194 2107fc 102194->102193 102198 21085f 102194->102198 102196 210646 102224 208db6 9 API calls __cftof_l 102196->102224 102220 2185a1 102198->102220 102199 205310 102211 205332 LeaveCriticalSection LeaveCriticalSection _fprintf 102199->102211 102201->102193 102201->102194 102225 2037cb 60 API calls 2 library calls 102201->102225 102203 2107f5 102203->102194 102226 2037cb 60 API calls 2 library calls 102203->102226 102205 210814 102205->102194 102227 2037cb 60 API calls 2 library calls 102205->102227 102207->102163 102208->102173 102209->102173 102210->102173 102211->102173 102219 209d75 LeaveCriticalSection 102212->102219 102214 210605 102214->102185 102215->102190 102216->102190 102217->102184 102218->102189 102219->102214 102228 217d85 102220->102228 102222 2185ba 102222->102199 102223->102196 102224->102199 102225->102203 102226->102205 102227->102194 102229 217d91 _fseek 102228->102229 102230 217da7 102229->102230 102233 217ddd 102229->102233 102231 208b28 __cftof_l 58 API calls 102230->102231 102232 217dac 102231->102232 102234 208db6 __cftof_l 9 API calls 102232->102234 102235 217e4e __wsopen_nolock 109 API calls 102233->102235 102238 217db6 _fseek 102234->102238 102236 217df9 102235->102236 102237 217e22 __wsopen_helper LeaveCriticalSection 102236->102237 102237->102238 102238->102222 102240 1e4b83 102239->102240 102241 1e4c3f LoadLibraryA 102239->102241 102240->102117 102240->102119 102241->102240 102242 1e4c50 GetProcAddress 102241->102242 102242->102240 102244 1e4ea3 FindResourceExW 102243->102244 102245 1e4ec0 102243->102245 102244->102245 102246 21d933 LoadResource 102244->102246 102245->102127 102246->102245 102247 21d948 SizeofResource 102246->102247 102247->102245 102248 21d95c LockResource 102247->102248 102248->102245 102250 21d9ab 102249->102250 102251 1e4ef4 102249->102251 102255 20584d 102251->102255 102253 1e4f02 102253->102134 102254->102127 102259 205859 _fseek 102255->102259 102256 20586b 102268 208b28 58 API calls __getptd_noexit 102256->102268 102258 205891 102261 206c11 __lock_file 59 API calls 102258->102261 102259->102256 102259->102258 102260 205870 102269 208db6 9 API calls __cftof_l 102260->102269 102263 205897 102261->102263 102270 2057be 83 API calls 4 library calls 102263->102270 102265 2058a6 102271 2058c8 LeaveCriticalSection LeaveCriticalSection _fprintf 102265->102271 102267 20587b _fseek 102267->102253 102268->102260 102269->102267 102270->102265 102271->102267 102275 2055fd 102272->102275 102274 1e4f2e 102274->102146 102276 205609 _fseek 102275->102276 102277 20564c 102276->102277 102278 205644 _fseek 102276->102278 102283 20561f _memset 102276->102283 102279 206c11 __lock_file 59 API calls 102277->102279 102278->102274 102280 205652 102279->102280 102290 20541d 72 API calls 6 library calls 102280->102290 102288 208b28 58 API calls __getptd_noexit 102283->102288 102284 205639 102289 208db6 9 API calls __cftof_l 102284->102289 102285 205668 102291 205686 LeaveCriticalSection LeaveCriticalSection _fprintf 102285->102291 102288->102284 102289->102278 102290->102285 102291->102278 102295 20520a GetSystemTimeAsFileTime 102292->102295 102294 248f6e 102294->102148 102296 205238 __aulldiv 102295->102296 102296->102294 102298 205c6c _fseek 102297->102298 102299 205c93 102298->102299 102300 205c7e 102298->102300 102301 206c11 __lock_file 59 API calls 102299->102301 102311 208b28 58 API calls __getptd_noexit 102300->102311 102304 205c99 102301->102304 102303 205c83 102312 208db6 9 API calls __cftof_l 102303->102312 102313 2058d0 67 API calls 5 library calls 102304->102313 102307 205ca4 102314 205cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 102307->102314 102309 205cb6 102310 205c8e _fseek 102309->102310 102310->102153 102311->102303 102312->102310 102313->102307 102314->102309 102315->101976 102317 1e7a5f 102316->102317 102321 1e7a85 _memmove 102316->102321 102318 200db6 Mailbox 59 API calls 102317->102318 102317->102321 102319 1e7ad4 102318->102319 102320 200db6 Mailbox 59 API calls 102319->102320 102320->102321 102321->101990 102322->101989 102323->102031 102324->102033 102345 249748 __tzset_nolock _wcscmp 102342->102345 102343 249109 GetSystemTimeAsFileTime 102343->102345 102344 249210 102344->102066 102348 2040fb 58 API calls __wsplitpath_helper 102344->102348 102345->102343 102345->102344 102346 1e4f0b 74 API calls 102345->102346 102347 1e4ee5 85 API calls 102345->102347 102346->102345 102347->102345 102348->102068 102349->102063 102436 1e7a16 102410->102436 102412 1e646a 102443 1e750f 59 API calls 2 library calls 102412->102443 102414 1e6484 Mailbox 102414->101462 102417 1e6265 102417->102412 102418 21dff6 102417->102418 102419 1e6799 _memmove 102417->102419 102420 1e750f 59 API calls 102417->102420 102425 1e7d8c 59 API calls 102417->102425 102428 21df92 102417->102428 102432 1e7e4f 59 API calls 102417->102432 102441 1e5f6c 60 API calls 102417->102441 102442 1e5d41 59 API calls Mailbox 102417->102442 102444 1e5e72 60 API calls 102417->102444 102445 1e7924 59 API calls 2 library calls 102417->102445 102446 23f8aa 91 API calls 4 library calls 102418->102446 102448 23f8aa 91 API calls 4 library calls 102419->102448 102420->102417 102423 21e004 102447 1e750f 59 API calls 2 library calls 102423->102447 102425->102417 102427 21e01a 102427->102414 102429 1e8029 59 API calls 102428->102429 102430 21df9d 102429->102430 102434 200db6 Mailbox 59 API calls 102430->102434 102433 1e643b CharUpperBuffW 102432->102433 102433->102417 102434->102419 102435->101466 102437 200db6 Mailbox 59 API calls 102436->102437 102438 1e7a3b 102437->102438 102439 1e8029 59 API calls 102438->102439 102440 1e7a4a 102439->102440 102440->102417 102441->102417 102442->102417 102443->102414 102444->102417 102445->102417 102446->102423 102447->102427 102448->102414 102449->101501 102450->101473 102451->101488 102452->101484 102453->101489 102454->101499 102455->101502 102456->101506 102457->101337 102458->101334 102459->101196 102461 1eb91a 102460->102461 102462 1ebac7 102460->102462 102461->102462 102463 1ebf81 102461->102463 102465 1eb9fc 102461->102465 102471 1ebaab 102461->102471 102462->102463 102470 1ebb46 102462->102470 102462->102471 102473 1eba8b Mailbox 102462->102473 102463->102471 102485 1e94dc 59 API calls __gmtime64_s 102463->102485 102468 1eba38 102465->102468 102465->102470 102465->102471 102467 221361 102467->102471 102483 203d46 59 API calls __wtof_l 102467->102483 102468->102471 102468->102473 102475 2211b4 102468->102475 102470->102467 102470->102471 102470->102473 102482 236e8f 59 API calls 102470->102482 102471->101226 102473->101226 102473->102467 102473->102471 102484 1e8cd4 59 API calls Mailbox 102473->102484 102475->102471 102481 203d46 59 API calls __wtof_l 102475->102481 102476->101226 102477->101222 102478->101221 102479->101214 102480->101221 102481->102475 102482->102473 102483->102471 102484->102473 102485->102471 102486->101235 102487->101259 102488 207c56 102489 207c62 _fseek 102488->102489 102525 209e08 GetStartupInfoW 102489->102525 102492 207c67 102527 208b7c GetProcessHeap 102492->102527 102493 207cbf 102494 207cca 102493->102494 102610 207da6 58 API calls 3 library calls 102493->102610 102528 209ae6 102494->102528 102497 207cd0 102498 207cdb __RTC_Initialize 102497->102498 102611 207da6 58 API calls 3 library calls 102497->102611 102549 20d5d2 102498->102549 102501 207cea 102502 207cf6 GetCommandLineW 102501->102502 102612 207da6 58 API calls 3 library calls 102501->102612 102568 214f23 GetEnvironmentStringsW 102502->102568 102505 207cf5 102505->102502 102508 207d10 102509 207d1b 102508->102509 102613 2030b5 58 API calls 3 library calls 102508->102613 102578 214d58 102509->102578 102512 207d21 102513 207d2c 102512->102513 102614 2030b5 58 API calls 3 library calls 102512->102614 102592 2030ef 102513->102592 102516 207d34 102517 207d3f __wwincmdln 102516->102517 102615 2030b5 58 API calls 3 library calls 102516->102615 102598 1e47d0 102517->102598 102520 207d53 102521 207d62 102520->102521 102616 203358 58 API calls _doexit 102520->102616 102617 2030e0 58 API calls _doexit 102521->102617 102524 207d67 _fseek 102526 209e1e 102525->102526 102526->102492 102527->102493 102618 203187 EncodePointer 102528->102618 102530 209aeb 102623 209d3c 102530->102623 102533 209af4 102636 209b5c 61 API calls 2 library calls 102533->102636 102536 209af9 102536->102497 102538 209b11 102630 2087d5 102538->102630 102541 209b53 102639 209b5c 61 API calls 2 library calls 102541->102639 102544 209b58 102544->102497 102545 209b32 102545->102541 102546 209b38 102545->102546 102638 209a33 58 API calls 4 library calls 102546->102638 102548 209b40 GetCurrentThreadId 102548->102497 102550 20d5de _fseek 102549->102550 102551 209c0b __lock 58 API calls 102550->102551 102552 20d5e5 102551->102552 102553 2087d5 __calloc_crt 58 API calls 102552->102553 102554 20d5f6 102553->102554 102555 20d661 GetStartupInfoW 102554->102555 102558 20d601 _fseek @_EH4_CallFilterFunc@8 102554->102558 102556 20d7a5 102555->102556 102557 20d676 102555->102557 102559 20d86d 102556->102559 102562 20d7f2 GetStdHandle 102556->102562 102563 20d805 GetFileType 102556->102563 102654 209e2b InitializeCriticalSectionAndSpinCount 102556->102654 102557->102556 102561 2087d5 __calloc_crt 58 API calls 102557->102561 102564 20d6c4 102557->102564 102558->102501 102655 20d87d LeaveCriticalSection _doexit 102559->102655 102561->102557 102562->102556 102563->102556 102564->102556 102565 20d6f8 GetFileType 102564->102565 102653 209e2b InitializeCriticalSectionAndSpinCount 102564->102653 102565->102564 102569 214f34 102568->102569 102570 207d06 102568->102570 102656 20881d 58 API calls 2 library calls 102569->102656 102574 214b1b GetModuleFileNameW 102570->102574 102572 214f5a _memmove 102573 214f70 FreeEnvironmentStringsW 102572->102573 102573->102570 102575 214b4f _wparse_cmdline 102574->102575 102577 214b8f _wparse_cmdline 102575->102577 102657 20881d 58 API calls 2 library calls 102575->102657 102577->102508 102579 214d69 102578->102579 102580 214d71 __wsetenvp 102578->102580 102579->102512 102581 2087d5 __calloc_crt 58 API calls 102580->102581 102588 214d9a __wsetenvp 102581->102588 102582 214df1 102583 202d55 _free 58 API calls 102582->102583 102583->102579 102584 2087d5 __calloc_crt 58 API calls 102584->102588 102585 214e16 102586 202d55 _free 58 API calls 102585->102586 102586->102579 102588->102579 102588->102582 102588->102584 102588->102585 102589 214e2d 102588->102589 102658 214607 58 API calls __cftof_l 102588->102658 102659 208dc6 IsProcessorFeaturePresent 102589->102659 102593 2030fb __IsNonwritableInCurrentImage 102592->102593 102674 20a4d1 102593->102674 102595 203119 __initterm_e 102596 202d40 __cinit 67 API calls 102595->102596 102597 203138 __cinit __IsNonwritableInCurrentImage 102595->102597 102596->102597 102597->102516 102599 1e47ea 102598->102599 102609 1e4889 102598->102609 102600 1e4824 IsThemeActive 102599->102600 102677 20336c 102600->102677 102604 1e4850 102689 1e48fd SystemParametersInfoW SystemParametersInfoW 102604->102689 102606 1e485c 102690 1e3b3a 102606->102690 102608 1e4864 SystemParametersInfoW 102608->102609 102609->102520 102610->102494 102611->102498 102612->102505 102616->102521 102617->102524 102619 203198 __init_pointers __initp_misc_winsig 102618->102619 102640 20a524 EncodePointer 102619->102640 102621 2031b0 __init_pointers 102622 209e99 34 API calls 102621->102622 102622->102530 102626 209d48 102623->102626 102625 209af0 102625->102533 102627 209d8a 102625->102627 102626->102625 102641 209e2b InitializeCriticalSectionAndSpinCount 102626->102641 102628 209da1 TlsAlloc 102627->102628 102629 209b06 102627->102629 102629->102533 102629->102538 102632 2087dc 102630->102632 102633 208817 102632->102633 102635 2087fa 102632->102635 102642 2151f6 102632->102642 102633->102541 102637 209de6 TlsSetValue 102633->102637 102635->102632 102635->102633 102650 20a132 Sleep 102635->102650 102636->102536 102637->102545 102638->102548 102639->102544 102640->102621 102641->102626 102643 215201 102642->102643 102648 21521c 102642->102648 102644 21520d 102643->102644 102643->102648 102651 208b28 58 API calls __getptd_noexit 102644->102651 102645 21522c RtlAllocateHeap 102647 215212 102645->102647 102645->102648 102647->102632 102648->102645 102648->102647 102652 2033a1 DecodePointer 102648->102652 102650->102635 102651->102647 102652->102648 102653->102564 102654->102556 102655->102558 102656->102572 102657->102577 102658->102588 102660 208dd1 102659->102660 102665 208c59 102660->102665 102664 208dec 102664->102512 102666 208c73 _memset ___raise_securityfailure 102665->102666 102667 208c93 IsDebuggerPresent 102666->102667 102673 20a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 102667->102673 102669 20c5f6 __cftof_l 6 API calls 102671 208d7a 102669->102671 102670 208d57 ___raise_securityfailure 102670->102669 102672 20a140 GetCurrentProcess TerminateProcess 102671->102672 102672->102664 102673->102670 102675 20a4d4 EncodePointer 102674->102675 102675->102675 102676 20a4ee 102675->102676 102676->102595 102678 209c0b __lock 58 API calls 102677->102678 102679 203377 DecodePointer EncodePointer 102678->102679 102742 209d75 LeaveCriticalSection 102679->102742 102681 1e4849 102682 2033d4 102681->102682 102683 2033f8 102682->102683 102684 2033de 102682->102684 102683->102604 102684->102683 102743 208b28 58 API calls __getptd_noexit 102684->102743 102686 2033e8 102744 208db6 9 API calls __cftof_l 102686->102744 102688 2033f3 102688->102604 102689->102606 102691 1e3b47 __write_nolock 102690->102691 102692 1e7667 59 API calls 102691->102692 102693 1e3b51 GetCurrentDirectoryW 102692->102693 102745 1e3766 102693->102745 102695 1e3b7a IsDebuggerPresent 102696 21d272 MessageBoxA 102695->102696 102697 1e3b88 102695->102697 102699 21d28c 102696->102699 102697->102699 102700 1e3ba5 102697->102700 102729 1e3c61 102697->102729 102698 1e3c68 SetCurrentDirectoryW 102701 1e3c75 Mailbox 102698->102701 102878 1e7213 59 API calls Mailbox 102699->102878 102826 1e7285 102700->102826 102701->102608 102704 21d29c 102709 21d2b2 SetCurrentDirectoryW 102704->102709 102709->102701 102729->102698 102742->102681 102743->102686 102744->102688 102746 1e7667 59 API calls 102745->102746 102747 1e377c 102746->102747 102880 1e3d31 102747->102880 102749 1e379a 102750 1e4706 61 API calls 102749->102750 102751 1e37ae 102750->102751 102752 1e7de1 59 API calls 102751->102752 102753 1e37bb 102752->102753 102754 1e4ddd 136 API calls 102753->102754 102755 1e37d4 102754->102755 102756 21d173 102755->102756 102757 1e37dc Mailbox 102755->102757 102922 24955b 102756->102922 102761 1e8047 59 API calls 102757->102761 102760 21d192 102763 202d55 _free 58 API calls 102760->102763 102764 1e37ef 102761->102764 102762 1e4e4a 84 API calls 102762->102760 102765 21d19f 102763->102765 102894 1e928a 102764->102894 102767 1e4e4a 84 API calls 102765->102767 102770 21d1a8 102767->102770 102769 1e7de1 59 API calls 102771 1e3808 102769->102771 102773 1e3ed0 59 API calls 102770->102773 102772 1e84c0 69 API calls 102771->102772 102774 1e381a Mailbox 102772->102774 102775 21d1c3 102773->102775 102776 1e7de1 59 API calls 102774->102776 102777 1e3ed0 59 API calls 102775->102777 102778 1e3840 102776->102778 102779 21d1df 102777->102779 102780 1e84c0 69 API calls 102778->102780 102781 1e4706 61 API calls 102779->102781 102783 1e384f Mailbox 102780->102783 102782 21d204 102781->102782 102784 1e3ed0 59 API calls 102782->102784 102786 1e7667 59 API calls 102783->102786 102785 21d210 102784->102785 102787 1e8047 59 API calls 102785->102787 102788 1e386d 102786->102788 102790 21d21e 102787->102790 102897 1e3ed0 102788->102897 102791 1e3ed0 59 API calls 102790->102791 102795 21d22d 102791->102795 102794 1e3887 102794->102770 102796 1e3891 102794->102796 102799 1e8047 59 API calls 102795->102799 102797 202efd _W_store_winword 60 API calls 102796->102797 102798 1e389c 102797->102798 102798->102775 102800 1e38a6 102798->102800 102801 21d24f 102799->102801 102802 202efd _W_store_winword 60 API calls 102800->102802 102803 1e3ed0 59 API calls 102801->102803 102804 1e38b1 102802->102804 102805 21d25c 102803->102805 102804->102779 102806 1e38bb 102804->102806 102805->102805 102807 202efd _W_store_winword 60 API calls 102806->102807 102808 1e38c6 102807->102808 102808->102795 102809 1e3907 102808->102809 102811 1e3ed0 59 API calls 102808->102811 102809->102795 102810 1e3914 102809->102810 102813 1e92ce 59 API calls 102810->102813 102812 1e38ea 102811->102812 102814 1e8047 59 API calls 102812->102814 102815 1e3924 102813->102815 102816 1e38f8 102814->102816 102817 1e9050 59 API calls 102815->102817 102818 1e3ed0 59 API calls 102816->102818 102819 1e3932 102817->102819 102818->102809 102913 1e8ee0 102819->102913 102821 1e928a 59 API calls 102823 1e394f 102821->102823 102822 1e8ee0 60 API calls 102822->102823 102823->102821 102823->102822 102824 1e3ed0 59 API calls 102823->102824 102825 1e3995 Mailbox 102823->102825 102824->102823 102825->102695 102827 1e7292 __write_nolock 102826->102827 102828 1e72ab 102827->102828 102830 21ea22 _memset 102827->102830 102829 1e4750 60 API calls 102828->102829 102831 1e72b4 102829->102831 102832 21ea3e GetOpenFileNameW 102830->102832 102961 200791 102831->102961 102834 21ea8d 102832->102834 102835 1e7bcc 59 API calls 102834->102835 102837 21eaa2 102835->102837 102837->102837 102839 1e72c9 102979 1e686a 102839->102979 102878->102704 102881 1e3d3e __write_nolock 102880->102881 102882 1e7bcc 59 API calls 102881->102882 102887 1e3ea4 Mailbox 102881->102887 102884 1e3d70 102882->102884 102883 1e79f2 59 API calls 102883->102884 102884->102883 102892 1e3da6 Mailbox 102884->102892 102885 1e3e77 102886 1e7de1 59 API calls 102885->102886 102885->102887 102889 1e3e98 102886->102889 102887->102749 102888 1e7de1 59 API calls 102888->102892 102890 1e3f74 59 API calls 102889->102890 102890->102887 102891 1e3f74 59 API calls 102891->102892 102892->102885 102892->102887 102892->102888 102892->102891 102893 1e79f2 59 API calls 102892->102893 102893->102892 102895 200db6 Mailbox 59 API calls 102894->102895 102896 1e37fb 102895->102896 102896->102769 102898 1e3eda 102897->102898 102899 1e3ef3 102897->102899 102901 1e8047 59 API calls 102898->102901 102900 1e7bcc 59 API calls 102899->102900 102902 1e3879 102900->102902 102901->102902 102903 202efd 102902->102903 102904 202f09 102903->102904 102905 202f7e 102903->102905 102912 202f2e 102904->102912 102957 208b28 58 API calls __getptd_noexit 102904->102957 102959 202f90 60 API calls 3 library calls 102905->102959 102908 202f8b 102908->102794 102909 202f15 102958 208db6 9 API calls __cftof_l 102909->102958 102911 202f20 102911->102794 102912->102794 102914 21f17c 102913->102914 102916 1e8ef7 102913->102916 102914->102916 102960 1e8bdb 59 API calls Mailbox 102914->102960 102917 1e8ff8 102916->102917 102918 1e9040 102916->102918 102921 1e8fff 102916->102921 102920 200db6 Mailbox 59 API calls 102917->102920 102919 1e9d3c 60 API calls 102918->102919 102919->102921 102920->102921 102921->102823 102923 1e4ee5 85 API calls 102922->102923 102924 2495ca 102923->102924 102925 249734 96 API calls 102924->102925 102926 2495dc 102925->102926 102927 1e4f0b 74 API calls 102926->102927 102953 21d186 102926->102953 102928 2495f7 102927->102928 102929 1e4f0b 74 API calls 102928->102929 102930 249607 102929->102930 102931 1e4f0b 74 API calls 102930->102931 102932 249622 102931->102932 102933 1e4f0b 74 API calls 102932->102933 102934 24963d 102933->102934 102935 1e4ee5 85 API calls 102934->102935 102936 249654 102935->102936 102937 20571c __crtLCMapStringA_stat 58 API calls 102936->102937 102938 24965b 102937->102938 102939 20571c __crtLCMapStringA_stat 58 API calls 102938->102939 102940 249665 102939->102940 102941 1e4f0b 74 API calls 102940->102941 102942 249679 102941->102942 102943 249109 GetSystemTimeAsFileTime 102942->102943 102944 24968c 102943->102944 102945 2496b6 102944->102945 102946 2496a1 102944->102946 102948 2496bc 102945->102948 102949 24971b 102945->102949 102947 202d55 _free 58 API calls 102946->102947 102951 2496a7 102947->102951 102952 248b06 116 API calls 102948->102952 102950 202d55 _free 58 API calls 102949->102950 102950->102953 102954 202d55 _free 58 API calls 102951->102954 102955 249713 102952->102955 102953->102760 102953->102762 102954->102953 102956 202d55 _free 58 API calls 102955->102956 102956->102953 102957->102909 102958->102911 102959->102908 102960->102916 102962 20079e __write_nolock 102961->102962 102963 20079f GetLongPathNameW 102962->102963 102964 1e7bcc 59 API calls 102963->102964 102965 1e72bd 102964->102965 102966 1e700b 102965->102966 102967 1e7667 59 API calls 102966->102967 102968 1e701d 102967->102968 102969 1e4750 60 API calls 102968->102969 102970 1e7028 102969->102970 102971 21e885 102970->102971 102972 1e7033 102970->102972 102977 21e89f 102971->102977 103019 1e7908 61 API calls 102971->103019 102973 1e3f74 59 API calls 102972->102973 102975 1e703f 102973->102975 103013 1e34c2 102975->103013 102978 1e7052 Mailbox 102978->102839 102980 1e4ddd 136 API calls 102979->102980 102981 1e688f 102980->102981 102982 21e031 102981->102982 102984 1e4ddd 136 API calls 102981->102984 102983 24955b 122 API calls 102982->102983 102985 21e046 102983->102985 102986 1e68a3 102984->102986 102987 21e067 102985->102987 102988 21e04a 102985->102988 102986->102982 102989 1e68ab 102986->102989 102991 200db6 Mailbox 59 API calls 102987->102991 102990 1e4e4a 84 API calls 102988->102990 102992 21e052 102989->102992 102993 1e68b7 102989->102993 102990->102992 103002 21e0ac Mailbox 102991->103002 103113 2442f8 90 API calls _wprintf 102992->103113 103020 1e6a8c 102993->103020 102996 21e060 102996->102987 102998 21e260 102999 202d55 _free 58 API calls 102998->102999 103000 21e268 102999->103000 103001 1e4e4a 84 API calls 103000->103001 103007 21e271 103001->103007 103002->102998 103002->103007 103010 1e7de1 59 API calls 103002->103010 103114 23f73d 59 API calls 2 library calls 103002->103114 103115 23f65e 61 API calls 2 library calls 103002->103115 103116 24737f 59 API calls Mailbox 103002->103116 103117 1e750f 59 API calls 2 library calls 103002->103117 103118 1e735d 59 API calls Mailbox 103002->103118 103006 202d55 _free 58 API calls 103006->103007 103007->103006 103009 1e4e4a 84 API calls 103007->103009 103119 23f7a1 89 API calls 4 library calls 103007->103119 103009->103007 103010->103002 103014 1e34d4 103013->103014 103018 1e34f3 _memmove 103013->103018 103016 200db6 Mailbox 59 API calls 103014->103016 103015 200db6 Mailbox 59 API calls 103017 1e350a 103015->103017 103016->103018 103017->102978 103018->103015 103019->102971 103021 1e6ab5 103020->103021 103022 21e41e 103020->103022 103125 1e57a6 60 API calls Mailbox 103021->103125 103141 23f7a1 89 API calls 4 library calls 103022->103141 103025 21e431 103142 23f7a1 89 API calls 4 library calls 103025->103142 103026 1e6ad7 103126 1e57f6 67 API calls 103026->103126 103028 1e6aec 103028->103025 103030 1e6af4 103028->103030 103032 1e7667 59 API calls 103030->103032 103031 21e44d 103062 1e6b61 103031->103062 103036 1e6b6f 103037 21e460 103062->103036 103062->103037 103113->102996 103114->103002 103115->103002 103116->103002 103117->103002 103118->103002 103119->103007 103125->103026 103126->103028 103141->103025 103142->103031 103200 1ebe19 103201 1ebe22 103200->103201 103202 1ec36a 103200->103202 103201->103202 103203 1e9837 84 API calls 103201->103203 103211 1eba8b Mailbox 103202->103211 103215 237bdb 59 API calls _memmove 103202->103215 103204 1ebe4d 103203->103204 103204->103202 103205 1ebe5d 103204->103205 103207 1e7a51 59 API calls 103205->103207 103207->103211 103208 221085 103210 1e8047 59 API calls 103208->103210 103209 1ebaab 103210->103211 103211->103209 103213 221361 103211->103213 103217 1e8cd4 59 API calls Mailbox 103211->103217 103213->103209 103216 203d46 59 API calls __wtof_l 103213->103216 103215->103208 103216->103209 103217->103211 103218 1e1016 103223 1e4974 103218->103223 103221 202d40 __cinit 67 API calls 103222 1e1025 103221->103222 103224 200db6 Mailbox 59 API calls 103223->103224 103225 1e497c 103224->103225 103226 1e101b 103225->103226 103230 1e4936 103225->103230 103226->103221 103231 1e493f 103230->103231 103233 1e4951 103230->103233 103232 202d40 __cinit 67 API calls 103231->103232 103232->103233 103234 1e49a0 103233->103234 103235 1e7667 59 API calls 103234->103235 103236 1e49b8 GetVersionExW 103235->103236 103237 1e7bcc 59 API calls 103236->103237 103238 1e49fb 103237->103238 103239 1e7d2c 59 API calls 103238->103239 103242 1e4a28 103238->103242 103240 1e4a1c 103239->103240 103241 1e7726 59 API calls 103240->103241 103241->103242 103243 1e4a93 GetCurrentProcess IsWow64Process 103242->103243 103245 21d864 103242->103245 103244 1e4aac 103243->103244 103246 1e4b2b GetSystemInfo 103244->103246 103247 1e4ac2 103244->103247 103248 1e4af8 103246->103248 103258 1e4b37 103247->103258 103248->103226 103251 1e4b1f GetSystemInfo 103253 1e4ae9 103251->103253 103252 1e4ad4 103254 1e4b37 2 API calls 103252->103254 103253->103248 103255 1e4aef FreeLibrary 103253->103255 103256 1e4adc GetNativeSystemInfo 103254->103256 103255->103248 103256->103253 103259 1e4ad0 103258->103259 103260 1e4b40 LoadLibraryA 103258->103260 103259->103251 103259->103252 103260->103259 103261 1e4b51 GetProcAddress 103260->103261 103261->103259 103262 1e1066 103267 1ef76f 103262->103267 103264 1e106c 103265 202d40 __cinit 67 API calls 103264->103265 103266 1e1076 103265->103266 103268 1ef790 103267->103268 103300 1fff03 103268->103300 103272 1ef7d7 103273 1e7667 59 API calls 103272->103273 103274 1ef7e1 103273->103274 103275 1e7667 59 API calls 103274->103275 103276 1ef7eb 103275->103276 103277 1e7667 59 API calls 103276->103277 103278 1ef7f5 103277->103278 103279 1e7667 59 API calls 103278->103279 103280 1ef833 103279->103280 103281 1e7667 59 API calls 103280->103281 103282 1ef8fe 103281->103282 103310 1f5f87 103282->103310 103286 1ef930 103287 1e7667 59 API calls 103286->103287 103288 1ef93a 103287->103288 103338 1ffd9e 103288->103338 103290 1ef981 103291 1ef991 GetStdHandle 103290->103291 103292 1ef9dd 103291->103292 103293 2245ab 103291->103293 103295 1ef9e5 OleInitialize 103292->103295 103293->103292 103294 2245b4 103293->103294 103345 246b38 64 API calls Mailbox 103294->103345 103295->103264 103297 2245bb 103346 247207 CreateThread 103297->103346 103299 2245c7 CloseHandle 103299->103295 103347 1fffdc 103300->103347 103303 1fffdc 59 API calls 103304 1fff45 103303->103304 103305 1e7667 59 API calls 103304->103305 103306 1fff51 103305->103306 103307 1e7bcc 59 API calls 103306->103307 103308 1ef796 103307->103308 103309 200162 6 API calls 103308->103309 103309->103272 103311 1e7667 59 API calls 103310->103311 103312 1f5f97 103311->103312 103313 1e7667 59 API calls 103312->103313 103314 1f5f9f 103313->103314 103354 1f5a9d 103314->103354 103317 1f5a9d 59 API calls 103318 1f5faf 103317->103318 103319 1e7667 59 API calls 103318->103319 103320 1f5fba 103319->103320 103321 200db6 Mailbox 59 API calls 103320->103321 103322 1ef908 103321->103322 103323 1f60f9 103322->103323 103324 1f6107 103323->103324 103325 1e7667 59 API calls 103324->103325 103326 1f6112 103325->103326 103327 1e7667 59 API calls 103326->103327 103328 1f611d 103327->103328 103329 1e7667 59 API calls 103328->103329 103330 1f6128 103329->103330 103331 1e7667 59 API calls 103330->103331 103332 1f6133 103331->103332 103333 1f5a9d 59 API calls 103332->103333 103334 1f613e 103333->103334 103335 200db6 Mailbox 59 API calls 103334->103335 103336 1f6145 RegisterWindowMessageW 103335->103336 103336->103286 103339 1ffdae 103338->103339 103340 23576f 103338->103340 103342 200db6 Mailbox 59 API calls 103339->103342 103357 249ae7 60 API calls 103340->103357 103344 1ffdb6 103342->103344 103343 23577a 103344->103290 103345->103297 103346->103299 103358 2471ed 65 API calls 103346->103358 103348 1e7667 59 API calls 103347->103348 103349 1fffe7 103348->103349 103350 1e7667 59 API calls 103349->103350 103351 1fffef 103350->103351 103352 1e7667 59 API calls 103351->103352 103353 1fff3b 103352->103353 103353->103303 103355 1e7667 59 API calls 103354->103355 103356 1f5aa5 103355->103356 103356->103317 103357->103343 103359 1e1055 103364 1e2649 103359->103364 103362 202d40 __cinit 67 API calls 103363 1e1064 103362->103363 103365 1e7667 59 API calls 103364->103365 103366 1e26b7 103365->103366 103371 1e3582 103366->103371 103368 1e2754 103369 1e105a 103368->103369 103374 1e3416 59 API calls 2 library calls 103368->103374 103369->103362 103375 1e35b0 103371->103375 103374->103368 103376 1e35a1 103375->103376 103377 1e35bd 103375->103377 103376->103368 103377->103376 103378 1e35c4 RegOpenKeyExW 103377->103378 103378->103376 103379 1e35de RegQueryValueExW 103378->103379 103380 1e35ff 103379->103380 103381 1e3614 RegCloseKey 103379->103381 103380->103381 103381->103376 103382 1e3633 103383 1e366a 103382->103383 103384 1e3688 103383->103384 103385 1e36e7 103383->103385 103426 1e36e5 103383->103426 103386 1e374b PostQuitMessage 103384->103386 103387 1e3695 103384->103387 103389 1e36ed 103385->103389 103390 21d0cc 103385->103390 103423 1e36d8 103386->103423 103392 21d154 103387->103392 103393 1e36a0 103387->103393 103388 1e36ca DefWindowProcW 103388->103423 103394 1e3715 SetTimer RegisterWindowMessageW 103389->103394 103395 1e36f2 103389->103395 103437 1f1070 10 API calls Mailbox 103390->103437 103442 242527 71 API calls _memset 103392->103442 103397 1e36a8 103393->103397 103398 1e3755 103393->103398 103399 1e373e CreatePopupMenu 103394->103399 103394->103423 103401 1e36f9 KillTimer 103395->103401 103402 21d06f 103395->103402 103396 21d0f3 103438 1f1093 341 API calls Mailbox 103396->103438 103404 21d139 103397->103404 103405 1e36b3 103397->103405 103427 1e44a0 103398->103427 103399->103423 103434 1e443a Shell_NotifyIconW _memset 103401->103434 103408 21d074 103402->103408 103409 21d0a8 MoveWindow 103402->103409 103404->103388 103441 237c36 59 API calls Mailbox 103404->103441 103412 1e36be 103405->103412 103413 21d124 103405->103413 103406 21d166 103406->103388 103406->103423 103414 21d097 SetFocus 103408->103414 103415 21d078 103408->103415 103409->103423 103411 1e370c 103435 1e3114 DeleteObject DestroyWindow Mailbox 103411->103435 103412->103388 103439 1e443a Shell_NotifyIconW _memset 103412->103439 103440 242d36 81 API calls _memset 103413->103440 103414->103423 103415->103412 103418 21d081 103415->103418 103436 1f1070 10 API calls Mailbox 103418->103436 103421 21d134 103421->103423 103424 21d118 103425 1e434a 68 API calls 103424->103425 103425->103426 103426->103388 103428 1e4539 103427->103428 103429 1e44b7 _memset 103427->103429 103428->103423 103430 1e407c 61 API calls 103429->103430 103432 1e44de 103430->103432 103431 1e4522 KillTimer SetTimer 103431->103428 103432->103431 103433 21d4ab Shell_NotifyIconW 103432->103433 103433->103431 103434->103411 103435->103423 103436->103423 103437->103396 103438->103412 103439->103424 103440->103421 103441->103426 103442->103406 103443 22416f 103447 235fe6 103443->103447 103445 22417a 103446 235fe6 85 API calls 103445->103446 103446->103445 103453 236020 103447->103453 103455 235ff3 103447->103455 103448 236022 103459 1e9328 84 API calls Mailbox 103448->103459 103450 236027 103451 1e9837 84 API calls 103450->103451 103452 23602e 103451->103452 103454 1e7b2e 59 API calls 103452->103454 103453->103445 103454->103453 103455->103448 103455->103450 103455->103453 103456 23601a 103455->103456 103458 1e95a0 59 API calls _wcsstr 103456->103458 103458->103453 103459->103450 103460 f5cb78 103474 f5a7c8 103460->103474 103462 f5cca2 103477 f5ca68 103462->103477 103480 f5dcd8 GetPEB 103474->103480 103476 f5ae53 103476->103462 103478 f5ca71 Sleep 103477->103478 103479 f5ca7f 103478->103479 103481 f5dd02 103480->103481 103481->103476 103482 21fdfc 103486 1eab30 Mailbox _memmove 103482->103486 103484 23617e Mailbox 59 API calls 103506 1ea057 103484->103506 103485 1e9c90 Mailbox 59 API calls 103485->103486 103486->103485 103488 1eb525 103486->103488 103486->103506 103508 1e7de1 59 API calls 103486->103508 103511 1e9f37 Mailbox 103486->103511 103513 25bc6b 341 API calls 103486->103513 103515 1eb2b6 103486->103515 103517 1e9ea0 341 API calls 103486->103517 103518 22086a 103486->103518 103520 220878 103486->103520 103522 22085c 103486->103522 103523 1eb21c 103486->103523 103525 200db6 59 API calls Mailbox 103486->103525 103528 236e8f 59 API calls 103486->103528 103530 25df23 103486->103530 103533 25c2e0 103486->103533 103565 247956 103486->103565 103571 23617e 103486->103571 103576 25c193 85 API calls 2 library calls 103486->103576 103578 249e4a 89 API calls 4 library calls 103488->103578 103490 1eb47a 103492 2209e5 103490->103492 103493 220055 103490->103493 103491 200db6 59 API calls Mailbox 103491->103511 103582 249e4a 89 API calls 4 library calls 103492->103582 103577 249e4a 89 API calls 4 library calls 103493->103577 103494 1eb900 60 API calls 103494->103511 103497 1eb475 103501 1e8047 59 API calls 103497->103501 103498 220064 103501->103506 103502 1e8047 59 API calls 103502->103511 103504 1e7667 59 API calls 103504->103511 103505 236e8f 59 API calls 103505->103511 103507 202d40 67 API calls __cinit 103507->103511 103508->103486 103509 2209d6 103581 249e4a 89 API calls 4 library calls 103509->103581 103511->103490 103511->103491 103511->103493 103511->103494 103511->103497 103511->103502 103511->103504 103511->103505 103511->103506 103511->103507 103511->103509 103512 1ea55a 103511->103512 103574 1ec8c0 341 API calls 2 library calls 103511->103574 103580 249e4a 89 API calls 4 library calls 103512->103580 103513->103486 103575 1ef6a3 341 API calls 103515->103575 103517->103486 103519 1e9c90 Mailbox 59 API calls 103518->103519 103519->103522 103579 249e4a 89 API calls 4 library calls 103520->103579 103522->103484 103522->103506 103524 1e9d3c 60 API calls 103523->103524 103526 1eb22d 103524->103526 103525->103486 103527 1e9d3c 60 API calls 103526->103527 103527->103515 103528->103486 103531 25cadd 130 API calls 103530->103531 103532 25df33 103531->103532 103532->103486 103534 1e7667 59 API calls 103533->103534 103535 25c2f4 103534->103535 103536 1e7667 59 API calls 103535->103536 103537 25c2fc 103536->103537 103538 1e7667 59 API calls 103537->103538 103539 25c304 103538->103539 103540 1e9837 84 API calls 103539->103540 103551 25c312 103540->103551 103541 25c528 Mailbox 103541->103486 103542 1e7bcc 59 API calls 103542->103551 103543 1e7924 59 API calls 103543->103551 103544 25c4fb 103544->103541 103585 1e9a3c 59 API calls Mailbox 103544->103585 103545 25c4e2 103549 1e7cab 59 API calls 103545->103549 103547 25c4fd 103550 1e7cab 59 API calls 103547->103550 103548 1e8047 59 API calls 103548->103551 103552 25c4ef 103549->103552 103554 25c50c 103550->103554 103551->103541 103551->103542 103551->103543 103551->103544 103551->103545 103551->103547 103551->103548 103555 1e7e4f 59 API calls 103551->103555 103557 1e7e4f 59 API calls 103551->103557 103562 1e9837 84 API calls 103551->103562 103563 1e7cab 59 API calls 103551->103563 103564 1e7b2e 59 API calls 103551->103564 103553 1e7b2e 59 API calls 103552->103553 103553->103544 103556 1e7b2e 59 API calls 103554->103556 103558 25c3a9 CharUpperBuffW 103555->103558 103556->103544 103559 25c469 CharUpperBuffW 103557->103559 103583 1e843a 68 API calls 103558->103583 103584 1ec5a7 69 API calls 2 library calls 103559->103584 103562->103551 103563->103551 103564->103551 103566 247962 103565->103566 103567 200db6 Mailbox 59 API calls 103566->103567 103568 247970 103567->103568 103569 24797e 103568->103569 103570 1e7667 59 API calls 103568->103570 103569->103486 103570->103569 103586 2360c0 103571->103586 103573 23618c 103573->103486 103574->103511 103575->103488 103576->103486 103577->103498 103578->103522 103579->103522 103580->103506 103581->103492 103582->103506 103583->103551 103584->103551 103585->103541 103587 2360cb 103586->103587 103588 2360e8 103586->103588 103587->103588 103590 2360ab 59 API calls Mailbox 103587->103590 103588->103573 103590->103587

              Control-flow Graph

              APIs
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 001E3B68
              • IsDebuggerPresent.KERNEL32 ref: 001E3B7A
              • GetFullPathNameW.KERNEL32(00007FFF,?,?,002A52F8,002A52E0,?,?), ref: 001E3BEB
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
                • Part of subcall function 001F092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,001E3C14,002A52F8,?,?,?), ref: 001F096E
              • SetCurrentDirectoryW.KERNEL32(?), ref: 001E3C6F
              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00297770,00000010), ref: 0021D281
              • SetCurrentDirectoryW.KERNEL32(?,002A52F8,?,?,?), ref: 0021D2B9
              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00294260,002A52F8,?,?,?), ref: 0021D33F
              • ShellExecuteW.SHELL32(00000000,?,?), ref: 0021D346
                • Part of subcall function 001E3A46: GetSysColorBrush.USER32(0000000F), ref: 001E3A50
                • Part of subcall function 001E3A46: LoadCursorW.USER32(00000000,00007F00), ref: 001E3A5F
                • Part of subcall function 001E3A46: LoadIconW.USER32(00000063), ref: 001E3A76
                • Part of subcall function 001E3A46: LoadIconW.USER32(000000A4), ref: 001E3A88
                • Part of subcall function 001E3A46: LoadIconW.USER32(000000A2), ref: 001E3A9A
                • Part of subcall function 001E3A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 001E3AC0
                • Part of subcall function 001E3A46: RegisterClassExW.USER32(?), ref: 001E3B16
                • Part of subcall function 001E39D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 001E3A03
                • Part of subcall function 001E39D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 001E3A24
                • Part of subcall function 001E39D5: ShowWindow.USER32(00000000,?,?), ref: 001E3A38
                • Part of subcall function 001E39D5: ShowWindow.USER32(00000000,?,?), ref: 001E3A41
                • Part of subcall function 001E434A: _memset.LIBCMT ref: 001E4370
                • Part of subcall function 001E434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 001E4415
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
              • String ID: This is a third-party compiled AutoIt script.$runas$%'
              • API String ID: 529118366-223049118
              • Opcode ID: 477b8c20b5f5bb518bffad775d93f7e9da412b9546be77cda8c7774003aec86c
              • Instruction ID: cfee7181b89121b33d17eb26ca51665a73e8bb19acfa1e8006a1e6a8e1a54cc9
              • Opcode Fuzzy Hash: 477b8c20b5f5bb518bffad775d93f7e9da412b9546be77cda8c7774003aec86c
              • Instruction Fuzzy Hash: 1051E831D18989AFDF01EBB5EC0DAEE7B78AB66700F104066F921A3192DF709655CB21

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1037 1e49a0-1e4a00 call 1e7667 GetVersionExW call 1e7bcc 1042 1e4b0b-1e4b0d 1037->1042 1043 1e4a06 1037->1043 1044 21d767-21d773 1042->1044 1045 1e4a09-1e4a0e 1043->1045 1046 21d774-21d778 1044->1046 1047 1e4a14 1045->1047 1048 1e4b12-1e4b13 1045->1048 1050 21d77b-21d787 1046->1050 1051 21d77a 1046->1051 1049 1e4a15-1e4a4c call 1e7d2c call 1e7726 1047->1049 1048->1049 1059 21d864-21d867 1049->1059 1060 1e4a52-1e4a53 1049->1060 1050->1046 1053 21d789-21d78e 1050->1053 1051->1050 1053->1045 1055 21d794-21d79b 1053->1055 1055->1044 1057 21d79d 1055->1057 1061 21d7a2-21d7a5 1057->1061 1062 21d880-21d884 1059->1062 1063 21d869 1059->1063 1060->1061 1064 1e4a59-1e4a64 1060->1064 1065 21d7ab-21d7c9 1061->1065 1066 1e4a93-1e4aaa GetCurrentProcess IsWow64Process 1061->1066 1071 21d886-21d88f 1062->1071 1072 21d86f-21d878 1062->1072 1067 21d86c 1063->1067 1068 1e4a6a-1e4a6c 1064->1068 1069 21d7ea-21d7f0 1064->1069 1065->1066 1070 21d7cf-21d7d5 1065->1070 1073 1e4aaf-1e4ac0 1066->1073 1074 1e4aac 1066->1074 1067->1072 1075 21d805-21d811 1068->1075 1076 1e4a72-1e4a75 1068->1076 1079 21d7f2-21d7f5 1069->1079 1080 21d7fa-21d800 1069->1080 1077 21d7d7-21d7da 1070->1077 1078 21d7df-21d7e5 1070->1078 1071->1067 1081 21d891-21d894 1071->1081 1072->1062 1082 1e4b2b-1e4b35 GetSystemInfo 1073->1082 1083 1e4ac2-1e4ad2 call 1e4b37 1073->1083 1074->1073 1087 21d813-21d816 1075->1087 1088 21d81b-21d821 1075->1088 1084 21d831-21d834 1076->1084 1085 1e4a7b-1e4a8a 1076->1085 1077->1066 1078->1066 1079->1066 1080->1066 1081->1072 1086 1e4af8-1e4b08 1082->1086 1094 1e4b1f-1e4b29 GetSystemInfo 1083->1094 1095 1e4ad4-1e4ae1 call 1e4b37 1083->1095 1084->1066 1093 21d83a-21d84f 1084->1093 1090 21d826-21d82c 1085->1090 1091 1e4a90 1085->1091 1087->1066 1088->1066 1090->1066 1091->1066 1096 21d851-21d854 1093->1096 1097 21d859-21d85f 1093->1097 1098 1e4ae9-1e4aed 1094->1098 1102 1e4b18-1e4b1d 1095->1102 1103 1e4ae3-1e4ae7 GetNativeSystemInfo 1095->1103 1096->1066 1097->1066 1098->1086 1100 1e4aef-1e4af2 FreeLibrary 1098->1100 1100->1086 1102->1103 1103->1098
              APIs
              • GetVersionExW.KERNEL32(?), ref: 001E49CD
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
              • GetCurrentProcess.KERNEL32(?,0026FAEC,00000000,00000000,?), ref: 001E4A9A
              • IsWow64Process.KERNEL32(00000000), ref: 001E4AA1
              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 001E4AE7
              • FreeLibrary.KERNEL32(00000000), ref: 001E4AF2
              • GetSystemInfo.KERNEL32(00000000), ref: 001E4B23
              • GetSystemInfo.KERNEL32(00000000), ref: 001E4B2F
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
              • String ID:
              • API String ID: 1986165174-0
              • Opcode ID: 9b3150aa74d4118fe881493e1573bed71b4760cd58d09377a97fb8db33d3760c
              • Instruction ID: 9f9dc2bec37419d43eebbef544ec4fc69cef9ba11a31514f885418c9539707ed
              • Opcode Fuzzy Hash: 9b3150aa74d4118fe881493e1573bed71b4760cd58d09377a97fb8db33d3760c
              • Instruction Fuzzy Hash: 3191F335989BC1DFCB31CB6995501AEFFF5AF3A310B4849ADD0CB83A41D320A948C769

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1104 1e4e89-1e4ea1 CreateStreamOnHGlobal 1105 1e4ea3-1e4eba FindResourceExW 1104->1105 1106 1e4ec1-1e4ec6 1104->1106 1107 21d933-21d942 LoadResource 1105->1107 1108 1e4ec0 1105->1108 1107->1108 1109 21d948-21d956 SizeofResource 1107->1109 1108->1106 1109->1108 1110 21d95c-21d967 LockResource 1109->1110 1110->1108 1111 21d96d-21d98b 1110->1111 1111->1108
              APIs
              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,001E4D8E,?,?,00000000,00000000), ref: 001E4E99
              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,001E4D8E,?,?,00000000,00000000), ref: 001E4EB0
              • LoadResource.KERNEL32(?,00000000,?,?,001E4D8E,?,?,00000000,00000000,?,?,?,?,?,?,001E4E2F), ref: 0021D937
              • SizeofResource.KERNEL32(?,00000000,?,?,001E4D8E,?,?,00000000,00000000,?,?,?,?,?,?,001E4E2F), ref: 0021D94C
              • LockResource.KERNEL32(001E4D8E,?,?,001E4D8E,?,?,00000000,00000000,?,?,?,?,?,?,001E4E2F,00000000), ref: 0021D95F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
              • String ID: SCRIPT
              • API String ID: 3051347437-3967369404
              • Opcode ID: 560b723a89fabb126785abe425a08035c1693bb7432f1b9b60414752d756c35c
              • Instruction ID: b0635a2ba34c3eb168261371e500f1912b610a0b4908061fe98b3dcd7aebd389
              • Opcode Fuzzy Hash: 560b723a89fabb126785abe425a08035c1693bb7432f1b9b60414752d756c35c
              • Instruction Fuzzy Hash: B2115E75240741BFDB258B66FD48F6B7BBAFBC5B11F108268F805C6250DBA1EC008A60
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID: pb*$%'
              • API String ID: 3964851224-478041922
              • Opcode ID: 8d1e26624c4e0a6b071bbd0151bffa5cd90483650e797db0836317a0398e1759
              • Instruction ID: 924d0ed76dbe6a0ce5c8a1d099d77a8bd1363a43c618ddb6c96f5cf3ddfec86c
              • Opcode Fuzzy Hash: 8d1e26624c4e0a6b071bbd0151bffa5cd90483650e797db0836317a0398e1759
              • Instruction Fuzzy Hash: 1A929870A08751DFD725DF24C480B2ABBE1BF89304F15892DE98A8B362D771EC55CB92
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID: Dd*$Dd*$Variable must be of type 'Object'.$p)
              • API String ID: 0-3893636707
              • Opcode ID: ef9274b1a604f0999ba43042363e0ebdc8e21b9e60957c9caff9041982da6766
              • Instruction ID: a48692aa23a917725600aad12764c4af286d733a7a05f7f781861794348d5029
              • Opcode Fuzzy Hash: ef9274b1a604f0999ba43042363e0ebdc8e21b9e60957c9caff9041982da6766
              • Instruction Fuzzy Hash: DEA2BE74A00A55DFCB28CF95C484AAEB7F2FF59314F298069E805AB351D775ED82CB80
              APIs
              • IsThemeActive.UXTHEME ref: 001E4834
                • Part of subcall function 0020336C: __lock.LIBCMT ref: 00203372
                • Part of subcall function 0020336C: DecodePointer.KERNEL32(00000001,?,001E4849,00237C74), ref: 0020337E
                • Part of subcall function 0020336C: EncodePointer.KERNEL32(?,?,001E4849,00237C74), ref: 00203389
                • Part of subcall function 001E48FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 001E4915
                • Part of subcall function 001E48FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 001E492A
                • Part of subcall function 001E3B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 001E3B68
                • Part of subcall function 001E3B3A: IsDebuggerPresent.KERNEL32 ref: 001E3B7A
                • Part of subcall function 001E3B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,002A52F8,002A52E0,?,?), ref: 001E3BEB
                • Part of subcall function 001E3B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 001E3C6F
              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 001E4874
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
              • String ID: r
              • API String ID: 1438897964-3729450569
              • Opcode ID: c081755a2db22b8323fd98f6715ee4ec437f547225ce51669cb3d3f7bff54d95
              • Instruction ID: 7b8f30c450f5ad87e2210ee72d01525b54d5c14e6cda92a2347f444075e58ecf
              • Opcode Fuzzy Hash: c081755a2db22b8323fd98f6715ee4ec437f547225ce51669cb3d3f7bff54d95
              • Instruction Fuzzy Hash: 6A118C719087959BC710DF6AE84990EFBE8EB9A750F10891AF444832B2DFB09544CB92
              APIs
              • GetFileAttributesW.KERNELBASE(?,0021E398), ref: 0024446A
              • FindFirstFileW.KERNELBASE(?,?), ref: 0024447B
              • FindClose.KERNEL32(00000000), ref: 0024448B
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FileFind$AttributesCloseFirst
              • String ID:
              • API String ID: 48322524-0
              • Opcode ID: e3387d76a5da298e21159a968fd73d4404587bd7a82888e8e6fd177bdcdec99c
              • Instruction ID: 90db343f9406c855de5ca3615a04da766514f8eddb624ffe25b2e81329e574e0
              • Opcode Fuzzy Hash: e3387d76a5da298e21159a968fd73d4404587bd7a82888e8e6fd177bdcdec99c
              • Instruction Fuzzy Hash: 12E0D8364205416746147F38FC0D5E97B5CAE05335F104716F835C11D0E7F4591099D5
              APIs
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001F0A5B
              • timeGetTime.WINMM ref: 001F0D16
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 001F0E53
              • Sleep.KERNEL32(0000000A), ref: 001F0E61
              • LockWindowUpdate.USER32(00000000,?,?), ref: 001F0EFA
              • DestroyWindow.USER32 ref: 001F0F06
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001F0F20
              • Sleep.KERNEL32(0000000A,?,?), ref: 00224E83
              • TranslateMessage.USER32(?), ref: 00225C60
              • DispatchMessageW.USER32(?), ref: 00225C6E
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00225C82
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pb*$pb*$pb*$pb*
              • API String ID: 4212290369-1934048305
              • Opcode ID: 951a8b72a9b43f0519353cbc848ea73a4ce2b0965b6effdf8a8b0941cac4f2dc
              • Instruction ID: 6cca58bed73bbe1ec4c233d84887ce610c1c427ea377a82474e010a3f0dc9bd9
              • Opcode Fuzzy Hash: 951a8b72a9b43f0519353cbc848ea73a4ce2b0965b6effdf8a8b0941cac4f2dc
              • Instruction Fuzzy Hash: FAB21370618B51EFD729DF64D884BAEB7E4BF84304F14891DF549972A2CB70E894CB42

              Control-flow Graph

              APIs
                • Part of subcall function 00248F5F: __time64.LIBCMT ref: 00248F69
                • Part of subcall function 001E4EE5: _fseek.LIBCMT ref: 001E4EFD
              • __wsplitpath.LIBCMT ref: 00249234
                • Part of subcall function 002040FB: __wsplitpath_helper.LIBCMT ref: 0020413B
              • _wcscpy.LIBCMT ref: 00249247
              • _wcscat.LIBCMT ref: 0024925A
              • __wsplitpath.LIBCMT ref: 0024927F
              • _wcscat.LIBCMT ref: 00249295
              • _wcscat.LIBCMT ref: 002492A8
                • Part of subcall function 00248FA5: _memmove.LIBCMT ref: 00248FDE
                • Part of subcall function 00248FA5: _memmove.LIBCMT ref: 00248FED
              • _wcscmp.LIBCMT ref: 002491EF
                • Part of subcall function 00249734: _wcscmp.LIBCMT ref: 00249824
                • Part of subcall function 00249734: _wcscmp.LIBCMT ref: 00249837
              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00249452
              • _wcsncpy.LIBCMT ref: 002494C5
              • DeleteFileW.KERNEL32(?,?), ref: 002494FB
              • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00249511
              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00249522
              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00249534
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
              • String ID:
              • API String ID: 1500180987-0
              • Opcode ID: a19cc223a5f9f0f6c094aeb9fe5608f37a0d09497cfe08de9e8e3b37f400165b
              • Instruction ID: 4a0fdf0534c816b0fb79fa35fa9e709a68fc92db18ce0983e7102144abe6e7d8
              • Opcode Fuzzy Hash: a19cc223a5f9f0f6c094aeb9fe5608f37a0d09497cfe08de9e8e3b37f400165b
              • Instruction Fuzzy Hash: 74C159B1D10219ABDF25DFA5CC85ADFBBBDEF55300F0040AAF609E6141EB709A948F61

              Control-flow Graph

              APIs
                • Part of subcall function 001E4706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,002A52F8,?,001E37AE,?), ref: 001E4724
                • Part of subcall function 0020050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,001E7165), ref: 0020052D
              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 001E71A8
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0021E8C8
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0021E909
              • RegCloseKey.ADVAPI32(?), ref: 0021E947
              • _wcscat.LIBCMT ref: 0021E9A0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
              • String ID: Include$PM$Software\AutoIt v3\AutoIt$\$\Include\
              • API String ID: 2673923337-2267167273
              • Opcode ID: 2f0acf5c79dfcc6597f2d2e12f66b5640183da9dde76225b8f3d423ba0b8b844
              • Instruction ID: 49dba0a3e25af460d42614f8aaf875158ef9211b9554d3151b30bd3b935102a5
              • Opcode Fuzzy Hash: 2f0acf5c79dfcc6597f2d2e12f66b5640183da9dde76225b8f3d423ba0b8b844
              • Instruction Fuzzy Hash: 2471BD710183029FD704EF65EC89AAFBBE8FFAA310F44052EF855871A1DB719958CB52

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 001E3074
              • RegisterClassExW.USER32(00000030), ref: 001E309E
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 001E30AF
              • InitCommonControlsEx.COMCTL32(?), ref: 001E30CC
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001E30DC
              • LoadIconW.USER32(000000A9), ref: 001E30F2
              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001E3101
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
              • API String ID: 2914291525-1005189915
              • Opcode ID: 18c2bbb1e51c54e49f3a9061b827c4e4a53c563454a6fbd2516ca1b9eb5bbacc
              • Instruction ID: e7515061dbea8f94a6be369c11c34211d8c0fa22d24ee296b7aaa21ea17a73aa
              • Opcode Fuzzy Hash: 18c2bbb1e51c54e49f3a9061b827c4e4a53c563454a6fbd2516ca1b9eb5bbacc
              • Instruction Fuzzy Hash: 8F313871851319EFDB418FA4F989ADABBF0FF0A321F10812AE580E62A0D7B90585CF50

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 001E3A50
              • LoadCursorW.USER32(00000000,00007F00), ref: 001E3A5F
              • LoadIconW.USER32(00000063), ref: 001E3A76
              • LoadIconW.USER32(000000A4), ref: 001E3A88
              • LoadIconW.USER32(000000A2), ref: 001E3A9A
              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 001E3AC0
              • RegisterClassExW.USER32(?), ref: 001E3B16
                • Part of subcall function 001E3041: GetSysColorBrush.USER32(0000000F), ref: 001E3074
                • Part of subcall function 001E3041: RegisterClassExW.USER32(00000030), ref: 001E309E
                • Part of subcall function 001E3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 001E30AF
                • Part of subcall function 001E3041: InitCommonControlsEx.COMCTL32(?), ref: 001E30CC
                • Part of subcall function 001E3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001E30DC
                • Part of subcall function 001E3041: LoadIconW.USER32(000000A9), ref: 001E30F2
                • Part of subcall function 001E3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001E3101
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
              • String ID: #$0$AutoIt v3$r
              • API String ID: 423443420-4200877358
              • Opcode ID: 0b9f4d2ff72674fb2590499569703f49a90bad70f22314daf9145e2e17cbe9e7
              • Instruction ID: 8e7086e728bce40d54e6f58982c40329fff064621c69bb430973a527f37497b9
              • Opcode Fuzzy Hash: 0b9f4d2ff72674fb2590499569703f49a90bad70f22314daf9145e2e17cbe9e7
              • Instruction Fuzzy Hash: EF212071900718ABEB11DFA4FD4DB9EBBB0EB09711F10412AE900AA2A1DBB55A509B84

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 001E3074
              • RegisterClassExW.USER32(00000030), ref: 001E309E
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 001E30AF
              • InitCommonControlsEx.COMCTL32(?), ref: 001E30CC
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 001E30DC
              • LoadIconW.USER32(000000A9), ref: 001E30F2
              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 001E3101
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
              • API String ID: 2914291525-1005189915
              • Opcode ID: 25bab11a1dab7b834ba2655fa28b44873062ac8c0f18566b21f685fb68b56b3f
              • Instruction ID: 9a698452799146744a2fc5b411ef4cca92acd1f7a6b07e751fba64e9c21430f9
              • Opcode Fuzzy Hash: 25bab11a1dab7b834ba2655fa28b44873062ac8c0f18566b21f685fb68b56b3f
              • Instruction Fuzzy Hash: ED21C7B1951618AFDF40DFA4FD8DB9EBBF4FB09700F10812AF910A62A0DBB545848F91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 767 1e3633-1e3681 769 1e3683-1e3686 767->769 770 1e36e1-1e36e3 767->770 771 1e3688-1e368f 769->771 772 1e36e7 769->772 770->769 773 1e36e5 770->773 774 1e374b-1e3753 PostQuitMessage 771->774 775 1e3695-1e369a 771->775 777 1e36ed-1e36f0 772->777 778 21d0cc-21d0fa call 1f1070 call 1f1093 772->778 776 1e36ca-1e36d2 DefWindowProcW 773->776 782 1e3711-1e3713 774->782 780 21d154-21d168 call 242527 775->780 781 1e36a0-1e36a2 775->781 783 1e36d8-1e36de 776->783 784 1e3715-1e373c SetTimer RegisterWindowMessageW 777->784 785 1e36f2-1e36f3 777->785 812 21d0ff-21d106 778->812 780->782 806 21d16e 780->806 787 1e36a8-1e36ad 781->787 788 1e3755-1e375f call 1e44a0 781->788 782->783 784->782 789 1e373e-1e3749 CreatePopupMenu 784->789 791 1e36f9-1e370c KillTimer call 1e443a call 1e3114 785->791 792 21d06f-21d072 785->792 794 21d139-21d140 787->794 795 1e36b3-1e36b8 787->795 807 1e3764 788->807 789->782 791->782 798 21d074-21d076 792->798 799 21d0a8-21d0c7 MoveWindow 792->799 794->776 802 21d146-21d14f call 237c36 794->802 804 1e36be-1e36c4 795->804 805 21d124-21d134 call 242d36 795->805 808 21d097-21d0a3 SetFocus 798->808 809 21d078-21d07b 798->809 799->782 802->776 804->776 804->812 805->782 806->776 807->782 808->782 809->804 813 21d081-21d092 call 1f1070 809->813 812->776 816 21d10c-21d11f call 1e443a call 1e434a 812->816 813->782 816->776
              APIs
              • DefWindowProcW.USER32(?,?,?,?), ref: 001E36D2
              • KillTimer.USER32(?,00000001), ref: 001E36FC
              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 001E371F
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 001E372A
              • CreatePopupMenu.USER32 ref: 001E373E
              • PostQuitMessage.USER32(00000000), ref: 001E374D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
              • String ID: TaskbarCreated$%'
              • API String ID: 129472671-3979774045
              • Opcode ID: f6c33ca3e2b17e8c86295bfc5c3b012fa7d02e86ea0f34d8162f4e96cb926e05
              • Instruction ID: 02803f02088d6f2ac9640678d0b00734111756e6e7f6ea1c35275da03a03ecc7
              • Opcode Fuzzy Hash: f6c33ca3e2b17e8c86295bfc5c3b012fa7d02e86ea0f34d8162f4e96cb926e05
              • Instruction Fuzzy Hash: 1B4145B2610D85FBDF285F75FC0DBBE3795EB1A300F140125F912872A1CFA49EA09661

              Control-flow Graph

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$R*
              • API String ID: 1825951767-1315436122
              • Opcode ID: 31fcd64e3549d3c9f3c3187b6980bd2ab0bc89e4bf0b78763558e9c3520c1d11
              • Instruction ID: f47303b97031684349958c64f9f48d51e9c03f04f719f75c24ca9c560fd2e23c
              • Opcode Fuzzy Hash: 31fcd64e3549d3c9f3c3187b6980bd2ab0bc89e4bf0b78763558e9c3520c1d11
              • Instruction Fuzzy Hash: 7AA16F71910AADABDF05EBA5DC59EEEB778BF25300F40042AF815B7192DF745A08CB60

              Control-flow Graph

              APIs
                • Part of subcall function 00200162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00200193
                • Part of subcall function 00200162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0020019B
                • Part of subcall function 00200162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 002001A6
                • Part of subcall function 00200162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 002001B1
                • Part of subcall function 00200162: MapVirtualKeyW.USER32(00000011,00000000), ref: 002001B9
                • Part of subcall function 00200162: MapVirtualKeyW.USER32(00000012,00000000), ref: 002001C1
                • Part of subcall function 001F60F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,001EF930), ref: 001F6154
              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 001EF9CD
              • OleInitialize.OLE32(00000000), ref: 001EFA4A
              • CloseHandle.KERNEL32(00000000), ref: 002245C8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
              • String ID: <W*$\T*$%'$i
              • API String ID: 1986988660-2250869090
              • Opcode ID: a6ffe400d69fc5f13bb143e8947ee95eab075bebe53bc275ca038384d13d5a1f
              • Instruction ID: 398a27ae6fa546ee36bb91e101d3a71d029fbe53e5d8ae4bad3afc225ea5ffa6
              • Opcode Fuzzy Hash: a6ffe400d69fc5f13bb143e8947ee95eab075bebe53bc275ca038384d13d5a1f
              • Instruction Fuzzy Hash: 0B81DEB0815EA0DF8784DF79BC4861BBBE5FB9E306790816AD519CB262EFB004958F10

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 983 f5ce28-f5ced6 call f5a7c8 986 f5cedd-f5cf03 call f5dd38 CreateFileW 983->986 989 f5cf05 986->989 990 f5cf0a-f5cf1a 986->990 991 f5d055-f5d059 989->991 998 f5cf21-f5cf3b VirtualAlloc 990->998 999 f5cf1c 990->999 992 f5d09b-f5d09e 991->992 993 f5d05b-f5d05f 991->993 995 f5d0a1-f5d0a8 992->995 996 f5d061-f5d064 993->996 997 f5d06b-f5d06f 993->997 1002 f5d0fd-f5d112 995->1002 1003 f5d0aa-f5d0b5 995->1003 996->997 1004 f5d071-f5d07b 997->1004 1005 f5d07f-f5d083 997->1005 1000 f5cf42-f5cf59 ReadFile 998->1000 1001 f5cf3d 998->1001 999->991 1006 f5cf60-f5cfa0 VirtualAlloc 1000->1006 1007 f5cf5b 1000->1007 1001->991 1010 f5d114-f5d11f VirtualFree 1002->1010 1011 f5d122-f5d12a 1002->1011 1008 f5d0b7 1003->1008 1009 f5d0b9-f5d0c5 1003->1009 1004->1005 1012 f5d085-f5d08f 1005->1012 1013 f5d093 1005->1013 1014 f5cfa7-f5cfc2 call f5df88 1006->1014 1015 f5cfa2 1006->1015 1007->991 1008->1002 1016 f5d0c7-f5d0d7 1009->1016 1017 f5d0d9-f5d0e5 1009->1017 1010->1011 1012->1013 1013->992 1023 f5cfcd-f5cfd7 1014->1023 1015->991 1019 f5d0fb 1016->1019 1020 f5d0e7-f5d0f0 1017->1020 1021 f5d0f2-f5d0f8 1017->1021 1019->995 1020->1019 1021->1019 1024 f5cfd9-f5d008 call f5df88 1023->1024 1025 f5d00a-f5d01e call f5dd98 1023->1025 1024->1023 1030 f5d020 1025->1030 1031 f5d022-f5d026 1025->1031 1030->991 1033 f5d032-f5d036 1031->1033 1034 f5d028-f5d02c CloseHandle 1031->1034 1035 f5d046-f5d04f 1033->1035 1036 f5d038-f5d043 VirtualFree 1033->1036 1034->1033 1035->986 1035->991 1036->1035
              APIs
              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00F5CEF9
              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F5D11F
              Memory Dump Source
              • Source File: 00000000.00000002.2247128171.0000000000F5A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F5A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f5a000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CreateFileFreeVirtual
              • String ID:
              • API String ID: 204039940-0
              • Opcode ID: 30e8af4b53c3aa052917812e21e5e8fbde56ed90f0e39d50c947676a587081b9
              • Instruction ID: 26d8e187c9767089dd41cc348e81244cb4aa05d93f900e65da4c56b398ef69b5
              • Opcode Fuzzy Hash: 30e8af4b53c3aa052917812e21e5e8fbde56ed90f0e39d50c947676a587081b9
              • Instruction Fuzzy Hash: 38A12B71E01209EBDB24CFA4C888BEEB7B5BF48315F208159EA01BB2C4D7759A45DF91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1114 209ae6-209af2 call 203187 call 209d3c 1119 209af4-209afb call 209b5c 1114->1119 1120 209afc-209b0f call 209d8a 1114->1120 1120->1119 1125 209b11-209b19 call 2087d5 1120->1125 1127 209b1e-209b24 1125->1127 1128 209b53-209b5b call 209b5c 1127->1128 1129 209b26-209b36 call 209de6 1127->1129 1129->1128 1134 209b38-209b52 call 209a33 GetCurrentThreadId 1129->1134
              APIs
              • __init_pointers.LIBCMT ref: 00209AE6
                • Part of subcall function 00203187: EncodePointer.KERNEL32(00000000), ref: 0020318A
                • Part of subcall function 00203187: __initp_misc_winsig.LIBCMT ref: 002031A5
                • Part of subcall function 00203187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00209EA0
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00209EB4
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00209EC7
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00209EDA
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00209EED
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00209F00
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00209F13
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00209F26
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00209F39
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00209F4C
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00209F5F
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00209F72
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00209F85
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00209F98
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00209FAB
                • Part of subcall function 00203187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00209FBE
              • __mtinitlocks.LIBCMT ref: 00209AEB
              • __mtterm.LIBCMT ref: 00209AF4
                • Part of subcall function 00209B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00209AF9,00207CD0,0029A0B8,00000014), ref: 00209C56
                • Part of subcall function 00209B5C: _free.LIBCMT ref: 00209C5D
                • Part of subcall function 00209B5C: DeleteCriticalSection.KERNEL32(02*,?,?,00209AF9,00207CD0,0029A0B8,00000014), ref: 00209C7F
              • __calloc_crt.LIBCMT ref: 00209B19
              • __initptd.LIBCMT ref: 00209B3B
              • GetCurrentThreadId.KERNEL32 ref: 00209B42
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
              • String ID:
              • API String ID: 3567560977-0
              • Opcode ID: 09937f969faa64a54b85a7d791fba7db1a3f3710d818e82163eeae8655d93bc3
              • Instruction ID: 40f320e3bd5e50e0bdfecc161142383b2936d68e0d9987e32a1580480f4f61a9
              • Opcode Fuzzy Hash: 09937f969faa64a54b85a7d791fba7db1a3f3710d818e82163eeae8655d93bc3
              • Instruction Fuzzy Hash: 5AF090326797129AEB34BB74BC0774B3B949F02774F204A1AF4A6D51D3FF6084E149A0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1137 1e39d5-1e3a45 CreateWindowExW * 2 ShowWindow * 2
              APIs
              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 001E3A03
              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 001E3A24
              • ShowWindow.USER32(00000000,?,?), ref: 001E3A38
              • ShowWindow.USER32(00000000,?,?), ref: 001E3A41
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$CreateShow
              • String ID: AutoIt v3$edit
              • API String ID: 1584632944-3779509399
              • Opcode ID: 8033e7549498c10a8f8860eb6123253abadd994e3780f2dd44a565683ad266ff
              • Instruction ID: f1a416a1a7db9270a1ed8fdc2faedb79b89d95d78a3eda0b4bff97609b7e69e7
              • Opcode Fuzzy Hash: 8033e7549498c10a8f8860eb6123253abadd994e3780f2dd44a565683ad266ff
              • Instruction Fuzzy Hash: 12F034706012A0BFFA315B23BC4CF2B2E7DE7C7F50F00402ABE00A21B0CAA10850DAB0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1490 f5cb78-f5cd1b call f5a7c8 call f5ca68 CreateFileW 1497 f5cd22-f5cd35 1490->1497 1498 f5cd1d 1490->1498 1501 f5cd37 1497->1501 1502 f5cd3c-f5cd56 VirtualAlloc 1497->1502 1499 f5cdd8-f5cddd 1498->1499 1501->1499 1503 f5cd58 1502->1503 1504 f5cd5a-f5cd74 ReadFile 1502->1504 1503->1499 1505 f5cd76 1504->1505 1506 f5cd78-f5cdb2 call f5caa8 call f5ba68 1504->1506 1505->1499 1511 f5cdb4-f5cdc9 call f5caf8 1506->1511 1512 f5cdce-f5cdd6 ExitProcess 1506->1512 1511->1512 1512->1499
              APIs
                • Part of subcall function 00F5CA68: Sleep.KERNELBASE(000001F4), ref: 00F5CA79
              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00F5CD0E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2247128171.0000000000F5A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F5A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f5a000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CreateFileSleep
              • String ID: UVZ3AVP0D6QW7ZIHPAPAGYI8Y
              • API String ID: 2694422964-2014000054
              • Opcode ID: a60807b329e66ae9dddb1d1bce27906da51921d349e20136268f6569280c4b51
              • Instruction ID: a6620856112f4f946fbf685ed22bc9cb1981b2d9ea5b68e1c808dfe7f52621ce
              • Opcode Fuzzy Hash: a60807b329e66ae9dddb1d1bce27906da51921d349e20136268f6569280c4b51
              • Instruction Fuzzy Hash: FD718530D0438CDAEF15DBE4D814BEEBB75AF15301F004199E619BB2C1D77A4A49CBA6
              APIs
              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0021D3D7
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
              • _memset.LIBCMT ref: 001E40FC
              • _wcscpy.LIBCMT ref: 001E4150
              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 001E4160
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
              • String ID: Line:
              • API String ID: 3942752672-1585850449
              • Opcode ID: beb8a0a5bfb2649d9d95a4169687ed26da2f9d9bf5480a149f873f99c256411f
              • Instruction ID: 15343c8b620e1f388e06834d41ac1031ec22cf68e1b8429b81f604991467fd9d
              • Opcode Fuzzy Hash: beb8a0a5bfb2649d9d95a4169687ed26da2f9d9bf5480a149f873f99c256411f
              • Instruction Fuzzy Hash: DB31D071008B85ABE721EF61EC49BDF77D8AF65310F10451AF685820D2DF74A658CB82
              APIs
                • Part of subcall function 001E4DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,002A52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 001E4E0F
              • _free.LIBCMT ref: 0021E263
              • _free.LIBCMT ref: 0021E2AA
                • Part of subcall function 001E6A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 001E6BAD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _free$CurrentDirectoryLibraryLoad
              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
              • API String ID: 2861923089-1757145024
              • Opcode ID: 1a78fc2709d7e20471b7cef05e55b2a149689eb13d23e27a56d1af49dd114e47
              • Instruction ID: 1eefec668b8aac3f904262ccac79ec20608fac458609b057c5cd612348fadcbb
              • Opcode Fuzzy Hash: 1a78fc2709d7e20471b7cef05e55b2a149689eb13d23e27a56d1af49dd114e47
              • Instruction Fuzzy Hash: E5918E7192065AAFCF04EFA4CC919EDB7B8FF29314F104429F815AB2A1DB709D65CB50
              APIs
              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,001E35A1,SwapMouseButtons,00000004,?), ref: 001E35D4
              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,001E35A1,SwapMouseButtons,00000004,?,?,?,?,001E2754), ref: 001E35F5
              • RegCloseKey.KERNELBASE(00000000,?,?,001E35A1,SwapMouseButtons,00000004,?,?,?,?,001E2754), ref: 001E3617
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CloseOpenQueryValue
              • String ID: Control Panel\Mouse
              • API String ID: 3677997916-824357125
              • Opcode ID: a675e2b8e85e25f889089983d9af544c37c2ac7775be26fa08389b0c4ca81f2a
              • Instruction ID: 3596ee1b1785191c989dcfa44d578802df428b5cb1237a2861a892217aee88e9
              • Opcode Fuzzy Hash: a675e2b8e85e25f889089983d9af544c37c2ac7775be26fa08389b0c4ca81f2a
              • Instruction Fuzzy Hash: E2114871510648BFDF20CFA5EC88AAEB7B8EF09740F018469E805D7210D3719F409760
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 00F5C223
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00F5C2B9
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00F5C2DB
              Memory Dump Source
              • Source File: 00000000.00000002.2247128171.0000000000F5A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F5A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f5a000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: b497c3f98e6e70b5e646438de2a52bb31286a04038d1a50b70c1a456b66b63a7
              • Instruction ID: be23b770fe47d0a3f71b11691abeeefad8cb5fd05ec22e1625a5e3ff943c83f3
              • Opcode Fuzzy Hash: b497c3f98e6e70b5e646438de2a52bb31286a04038d1a50b70c1a456b66b63a7
              • Instruction Fuzzy Hash: C9620B30A14218DBEB24CFA4CC51BDEB372EF58301F1091A9D60DEB290E7799E85DB59
              APIs
                • Part of subcall function 001E4EE5: _fseek.LIBCMT ref: 001E4EFD
                • Part of subcall function 00249734: _wcscmp.LIBCMT ref: 00249824
                • Part of subcall function 00249734: _wcscmp.LIBCMT ref: 00249837
              • _free.LIBCMT ref: 002496A2
              • _free.LIBCMT ref: 002496A9
              • _free.LIBCMT ref: 00249714
                • Part of subcall function 00202D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00209A24), ref: 00202D69
                • Part of subcall function 00202D55: GetLastError.KERNEL32(00000000,?,00209A24), ref: 00202D7B
              • _free.LIBCMT ref: 0024971C
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
              • String ID:
              • API String ID: 1552873950-0
              • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
              • Instruction ID: e86ca9c3fb66edeb557b26b6ed8faf377c16f5bb4f1c3cae9d2f647fc33ba483
              • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
              • Instruction Fuzzy Hash: 8C517FB1D14258AFDF299F65DC85A9EBBB9EF48300F10049EF209A3241DB715E90CF58
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
              • String ID:
              • API String ID: 2782032738-0
              • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
              • Instruction ID: 8af68465f3c847b6cc38c5a6570b5a77d34b046d8e6a64040bdfb42e755bed93
              • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
              • Instruction Fuzzy Hash: 7A41F8F4A207469BDB18EE69CC8096EB7A6EF85360B10C53DEA15C76D2D770DD608B40
              APIs
              • _memset.LIBCMT ref: 001E44CF
                • Part of subcall function 001E407C: _memset.LIBCMT ref: 001E40FC
                • Part of subcall function 001E407C: _wcscpy.LIBCMT ref: 001E4150
                • Part of subcall function 001E407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 001E4160
              • KillTimer.USER32(?,00000001,?,?), ref: 001E4524
              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 001E4533
              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0021D4B9
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
              • String ID:
              • API String ID: 1378193009-0
              • Opcode ID: 46ef66083ceca1d309c6f5573f5059de9363ffcb9f84916723a4762477faf6ca
              • Instruction ID: ff0bc726ad1bc4ba32512e2d86e97f4047af6533645c6bcf8d61070ae023e1e8
              • Opcode Fuzzy Hash: 46ef66083ceca1d309c6f5573f5059de9363ffcb9f84916723a4762477faf6ca
              • Instruction Fuzzy Hash: 50210770504794EFEB32CB24A849BEBBBECAF15304F04049DE78E56181C7B42984CB51
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memmove
              • String ID: AU3!P/'$EA06
              • API String ID: 4104443479-1088489766
              • Opcode ID: 06d81544e3294b2280a68d35a8b0c7d63464ead6b62d64edfb6e842497372247
              • Instruction ID: 2d7ddabef6cda039b85a9c68eeee74206af121800352d77cfb8d5d5a4ed9564e
              • Opcode Fuzzy Hash: 06d81544e3294b2280a68d35a8b0c7d63464ead6b62d64edfb6e842497372247
              • Instruction Fuzzy Hash: 66418D31A04AD89BDF259FD6CC517BE7FA2EB75300F294474FC829B282D7209D4483A1
              APIs
              • _memset.LIBCMT ref: 0021EA39
              • GetOpenFileNameW.COMDLG32(?), ref: 0021EA83
                • Part of subcall function 001E4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001E4743,?,?,001E37AE,?), ref: 001E4770
                • Part of subcall function 00200791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 002007B0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Name$Path$FileFullLongOpen_memset
              • String ID: X
              • API String ID: 3777226403-3081909835
              • Opcode ID: f90d247d8d507088d56ca2403edf874d9ab9949f3823528b59d7069d6333bb9b
              • Instruction ID: e3a469ac15af81faece30fd42601e47518ddaf486c72696c02ec6dc83699c809
              • Opcode Fuzzy Hash: f90d247d8d507088d56ca2403edf874d9ab9949f3823528b59d7069d6333bb9b
              • Instruction Fuzzy Hash: A1210530A106889BDF01DF94DC45BEE7BF8AF19300F04405AE908A7281DFF459988FA1
              APIs
              • GetTempPathW.KERNEL32(00000104,?), ref: 002498F8
              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0024990F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Temp$FileNamePath
              • String ID: aut
              • API String ID: 3285503233-3010740371
              • Opcode ID: 2ca15b66cab6809419261bbc2533b88ddd339ac9dc7a22a33e79f7f2d00b5109
              • Instruction ID: 5b7100d49f306d70d69340e759b86532a435d7005e3ba98bcd7bc0d1d5f04b06
              • Opcode Fuzzy Hash: 2ca15b66cab6809419261bbc2533b88ddd339ac9dc7a22a33e79f7f2d00b5109
              • Instruction Fuzzy Hash: C3D05E7954030DABDF909BA0FC0EF9A773CE704704F0042B1FE54910A1EAB095A88FA1
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d13f32885c9c3b34c1bb834cd73738ad51bef2a5b3073655c2fc4ed1969c82ca
              • Instruction ID: 24115fe6e406845bce4da6179da76dd804f3c2eb55fec5a50cbe4f9fc89048ae
              • Opcode Fuzzy Hash: d13f32885c9c3b34c1bb834cd73738ad51bef2a5b3073655c2fc4ed1969c82ca
              • Instruction Fuzzy Hash: 79F147706183419FCB14DF29C484A6EBBE5FF88314F24892EF8999B251D770E959CF82
              APIs
              • _memset.LIBCMT ref: 001E4370
              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 001E4415
              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 001E4432
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: IconNotifyShell_$_memset
              • String ID:
              • API String ID: 1505330794-0
              • Opcode ID: 6884f39195637eeb8e60eaa7f29d17efa1cc6c0f0e2680d1d0a8ee3d2aa2698d
              • Instruction ID: 7c9bb0b8909f5d30629e23dde5ecb2ed00587f1844a780acc35425744d6a2e56
              • Opcode Fuzzy Hash: 6884f39195637eeb8e60eaa7f29d17efa1cc6c0f0e2680d1d0a8ee3d2aa2698d
              • Instruction Fuzzy Hash: E6318570504B51DFD761DF35E88879BBBF8FB59308F00092EF69A82291D771A944CB52
              APIs
              • __FF_MSGBANNER.LIBCMT ref: 00205733
                • Part of subcall function 0020A16B: __NMSG_WRITE.LIBCMT ref: 0020A192
                • Part of subcall function 0020A16B: __NMSG_WRITE.LIBCMT ref: 0020A19C
              • __NMSG_WRITE.LIBCMT ref: 0020573A
                • Part of subcall function 0020A1C8: GetModuleFileNameW.KERNEL32(00000000,002A33BA,00000104,?,00000001,00000000), ref: 0020A25A
                • Part of subcall function 0020A1C8: ___crtMessageBoxW.LIBCMT ref: 0020A308
                • Part of subcall function 0020309F: ___crtCorExitProcess.LIBCMT ref: 002030A5
                • Part of subcall function 0020309F: ExitProcess.KERNEL32 ref: 002030AE
                • Part of subcall function 00208B28: __getptd_noexit.LIBCMT ref: 00208B28
              • RtlAllocateHeap.NTDLL(00EC0000,00000000,00000001,00000000,?,?,?,00200DD3,?), ref: 0020575F
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
              • String ID:
              • API String ID: 1372826849-0
              • Opcode ID: ad4a6183485bd23805147fcf489f24c233a9f11832523b6d0691366aeb18a5dc
              • Instruction ID: aa988ffbdb7680473347ded99abe9e3e1dce2ff1ad3b4484e28af47853d0cbf1
              • Opcode Fuzzy Hash: ad4a6183485bd23805147fcf489f24c233a9f11832523b6d0691366aeb18a5dc
              • Instruction Fuzzy Hash: 77019235270B22DBD7106B38AC86A2BB3489B82761F500536F409DA1E3DEB49C20AE61
              APIs
              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00249548,?,?,?,?,?,00000004), ref: 002498BB
              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00249548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 002498D1
              • CloseHandle.KERNEL32(00000000,?,00249548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 002498D8
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: File$CloseCreateHandleTime
              • String ID:
              • API String ID: 3397143404-0
              • Opcode ID: 76c660fb6ba6a9dda20e4b5ffff83130784de7e427975046a0bf5dff8a986588
              • Instruction ID: a71f42da737022dee9cbd83defc2255b74fb85fd1410fe8f83821e65b45d9a12
              • Opcode Fuzzy Hash: 76c660fb6ba6a9dda20e4b5ffff83130784de7e427975046a0bf5dff8a986588
              • Instruction Fuzzy Hash: 9BE08632141214B7DB211F54FD0DFCA7B59AB067A0F108220FB14690E087F115219798
              APIs
              • _free.LIBCMT ref: 00248D1B
                • Part of subcall function 00202D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00209A24), ref: 00202D69
                • Part of subcall function 00202D55: GetLastError.KERNEL32(00000000,?,00209A24), ref: 00202D7B
              • _free.LIBCMT ref: 00248D2C
              • _free.LIBCMT ref: 00248D3E
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
              • Instruction ID: e0cb5193624e2ad2f2a50d7f736573cda1c8edb52b83b9e303229b760aaf1420
              • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
              • Instruction Fuzzy Hash: B0E012A1A32712C6CB28A9B8B944A9713DC4F5C752754091EB40DD71C7CE64FC668524
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID: CALL
              • API String ID: 0-4196123274
              • Opcode ID: 3f88842bbc6cf8ac77ab51e64f2006fef932694c77a343773387c30995f0789a
              • Instruction ID: 3b4f5eb2f5a3c29488f4a561c6fcb3d8eef98db51cc672a9d134063046c3ba46
              • Opcode Fuzzy Hash: 3f88842bbc6cf8ac77ab51e64f2006fef932694c77a343773387c30995f0789a
              • Instruction Fuzzy Hash: B9227970518781DFD728DF15C494A6EBBE1BF88304F15896DE89A8B362D731EC85CB82
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: 9dd4efb868ffb8a5767105da0b16a8b73f80e319b4c4c742e2df27cd6dceb9ed
              • Instruction ID: fc9d126b7d651382f6805460d13999b2b72fc68ae48983787603f54b27097678
              • Opcode Fuzzy Hash: 9dd4efb868ffb8a5767105da0b16a8b73f80e319b4c4c742e2df27cd6dceb9ed
              • Instruction Fuzzy Hash: 4131B8B1614A46AFD704DF69C8D1E6DF3A5FF88310B198629E519CB3D1EB30E960CB90
              APIs
                • Part of subcall function 0020571C: __FF_MSGBANNER.LIBCMT ref: 00205733
                • Part of subcall function 0020571C: __NMSG_WRITE.LIBCMT ref: 0020573A
                • Part of subcall function 0020571C: RtlAllocateHeap.NTDLL(00EC0000,00000000,00000001,00000000,?,?,?,00200DD3,?), ref: 0020575F
              • std::exception::exception.LIBCMT ref: 00200DEC
              • __CxxThrowException@8.LIBCMT ref: 00200E01
                • Part of subcall function 0020859B: RaiseException.KERNEL32(?,?,?,00299E78,00000000,?,?,?,?,00200E06,?,00299E78,?,00000001), ref: 002085F0
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
              • String ID:
              • API String ID: 3902256705-0
              • Opcode ID: f0b43c38314c0565bbaea9f9b0c42166e92267abafbdeb7a29050bea896c52b8
              • Instruction ID: 9cdd05f64a29a77da78a1db7fcc433aac060b603f995a3fe712927922f19e12f
              • Opcode Fuzzy Hash: f0b43c38314c0565bbaea9f9b0c42166e92267abafbdeb7a29050bea896c52b8
              • Instruction Fuzzy Hash: BEF0A93152031EA6DB10AE98EC41ADF77ACDF05311F104456F948A61D3DF719A74D9E1
              APIs
                • Part of subcall function 00208B28: __getptd_noexit.LIBCMT ref: 00208B28
              • __lock_file.LIBCMT ref: 002053EB
                • Part of subcall function 00206C11: __lock.LIBCMT ref: 00206C34
              • __fclose_nolock.LIBCMT ref: 002053F6
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
              • String ID:
              • API String ID: 2800547568-0
              • Opcode ID: 89ab5753cfe8e85408a3a1ce26f0b8334097effefe10a71abcc86e68e803ee73
              • Instruction ID: 513f3f7394dd5d301b35a8e452d5843e5abcaba55d63440f666fe746fb4103bc
              • Opcode Fuzzy Hash: 89ab5753cfe8e85408a3a1ce26f0b8334097effefe10a71abcc86e68e803ee73
              • Instruction Fuzzy Hash: AEF09031830B159ADB10BF7598067AF76A06F41374F258249A4A4AB1C3CBFC89619F62
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 00F5C223
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00F5C2B9
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00F5C2DB
              Memory Dump Source
              • Source File: 00000000.00000002.2247128171.0000000000F5A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F5A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f5a000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: f9c04f56f6e2c6f85c849e8443e087477217ac0bd06f40ce2b8fc88a40a2bb6b
              • Instruction ID: 3d3df925eac37694a422327759b45adffa79c65c43aba2e524430406cad82b9d
              • Opcode Fuzzy Hash: f9c04f56f6e2c6f85c849e8443e087477217ac0bd06f40ce2b8fc88a40a2bb6b
              • Instruction Fuzzy Hash: F712DF20E14658C6EB24DF64D8507DEB232EF68301F10A0E9910DEB7A5E77A4F85CF5A
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ProtectVirtual
              • String ID:
              • API String ID: 544645111-0
              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction ID: 590c2f5bd641ccbb740d314ba80d0a536900d45bcaf845eddf9d340c04f91291
              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction Fuzzy Hash: 5A31A770A102069BE718DF58C4C4A69F7B5FB59300F6886A6E40ACB396D771EDE1DB80
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ClearVariant
              • String ID:
              • API String ID: 1473721057-0
              • Opcode ID: 2c9129d829bfe03b71dce4877f4f1a73a051f332e963bc3f2dbe78c6944024fe
              • Instruction ID: f6ebda1ed63346e938cbdf38f764d86e98c2ad305ac32715444c308b8426d1bb
              • Opcode Fuzzy Hash: 2c9129d829bfe03b71dce4877f4f1a73a051f332e963bc3f2dbe78c6944024fe
              • Instruction Fuzzy Hash: 0A412774508751DFDB14DF15C484B1ABBE1BF49318F1988ACE8998B362C731E855CF52
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: 4ba02f4591312cf4a0ed71574ccf86de6ff97123af463ce1f77dbb092e238bad
              • Instruction ID: 30de4c1a7f8f0b94909339dabde00ede8872eabcfda08ecf927a359855256f00
              • Opcode Fuzzy Hash: 4ba02f4591312cf4a0ed71574ccf86de6ff97123af463ce1f77dbb092e238bad
              • Instruction Fuzzy Hash: A9210572624A08EBEF144F16FC417AD7BF4FB24350F22842FE885C5090EB3080E09781
              APIs
                • Part of subcall function 001E4BB5: FreeLibrary.KERNEL32(00000000,?), ref: 001E4BEF
                • Part of subcall function 0020525B: __wfsopen.LIBCMT ref: 00205266
              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,002A52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 001E4E0F
                • Part of subcall function 001E4B6A: FreeLibrary.KERNEL32(00000000), ref: 001E4BA4
                • Part of subcall function 001E4C70: _memmove.LIBCMT ref: 001E4CBA
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Library$Free$Load__wfsopen_memmove
              • String ID:
              • API String ID: 1396898556-0
              • Opcode ID: 8bdb43fafc463dea694a5a5a957da57e1890dbe1c896dc9f46ba5446877a7347
              • Instruction ID: 836d2ca02a1077bda1131d2b61d301b3360aba28540659ff578ff1f971d06eea
              • Opcode Fuzzy Hash: 8bdb43fafc463dea694a5a5a957da57e1890dbe1c896dc9f46ba5446877a7347
              • Instruction Fuzzy Hash: 0811E331610646ABCF14EF75C816FAE77A8AF54B10F108829F942A7181DB759A119B50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ClearVariant
              • String ID:
              • API String ID: 1473721057-0
              • Opcode ID: 950b91271eef887e9b343f314cf94b5be4141b11bd7d7ffe7d49070adda71c8c
              • Instruction ID: 9deb68d4cd1f46c63e32f13649888c5cd2b219a4b3b8545a2e7bcbabf3d0cd3f
              • Opcode Fuzzy Hash: 950b91271eef887e9b343f314cf94b5be4141b11bd7d7ffe7d49070adda71c8c
              • Instruction Fuzzy Hash: 812122B0918741DFDB14DF64C884A2EBBE1BF88304F058868F98A57762D731E814CB92
              APIs
              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 002007B0
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: LongNamePath
              • String ID:
              • API String ID: 82841172-0
              • Opcode ID: 93828b0f7d449951fec27b0093aa7a2bc9f16c7dda435481036d6c76ff432394
              • Instruction ID: 6d5defc5eca88f705289b5991f015e49b0486bdc705f560fa1c6c5a91832d334
              • Opcode Fuzzy Hash: 93828b0f7d449951fec27b0093aa7a2bc9f16c7dda435481036d6c76ff432394
              • Instruction Fuzzy Hash: 2E0149735545549FC321CB20EC46EE477B8EF86220B0801E6FC94CB861D624AE18CB91
              APIs
              • __lock_file.LIBCMT ref: 002048A6
                • Part of subcall function 00208B28: __getptd_noexit.LIBCMT ref: 00208B28
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __getptd_noexit__lock_file
              • String ID:
              • API String ID: 2597487223-0
              • Opcode ID: 0749deeab5b93385ecbfdedf90c3b1082e54d0d460fef8b3592fc0bf9b9376a1
              • Instruction ID: 24860319d447cf6a45adb1c00356085015a832eb7662c2d3f46190c48abf8172
              • Opcode Fuzzy Hash: 0749deeab5b93385ecbfdedf90c3b1082e54d0d460fef8b3592fc0bf9b9376a1
              • Instruction Fuzzy Hash: AFF08171920709EBDF11BF648C0979E76A0AF01325F15C914B5149A1D3CB788971DF51
              APIs
              • FreeLibrary.KERNEL32(?,?,002A52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 001E4E7E
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FreeLibrary
              • String ID:
              • API String ID: 3664257935-0
              • Opcode ID: 6cb70d716c5f56bc4f3e7f710c73434ccf795d26f72553a16a66e9b459314da6
              • Instruction ID: 7301c6221fe6d03539f4663950e67657b6b6cca21041e66554757e66c46ce2c9
              • Opcode Fuzzy Hash: 6cb70d716c5f56bc4f3e7f710c73434ccf795d26f72553a16a66e9b459314da6
              • Instruction Fuzzy Hash: DBF03071505B51CFCB349F65E49481AB7E1BF14365315897EE1D682610C7759840DF40
              APIs
              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 002007B0
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: LongNamePath_memmove
              • String ID:
              • API String ID: 2514874351-0
              • Opcode ID: 3e3439a14612873335806582bed8f816fa841b891380182fb8a19045b10caf0a
              • Instruction ID: 68cf9b4bbeed4b1b464732a16c72c482c3e1098a09bbefc9f284aaf1a8484159
              • Opcode Fuzzy Hash: 3e3439a14612873335806582bed8f816fa841b891380182fb8a19045b10caf0a
              • Instruction Fuzzy Hash: 7BE0CD3690412857C720D659AC06FEA77DDDF887A0F0441B5FD0CD7248D9709C908AD0
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __wfsopen
              • String ID:
              • API String ID: 197181222-0
              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
              • Instruction ID: e6c601143906ccddd45389a7b606dbd80d5ebdd34d5020e2dd752cb52627b2a5
              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
              • Instruction Fuzzy Hash: ADB0927644020C7BCF012A82EC02A4A3B199B41764F408020FF0C181A2A673A6749E89
              APIs
              • Sleep.KERNELBASE(000001F4), ref: 00F5CA79
              Memory Dump Source
              • Source File: 00000000.00000002.2247128171.0000000000F5A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F5A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f5a000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
              • Instruction ID: 8c4dd6e240bab75ff16340a6a55999b7b900a8cc3b35ccc39761991f330eec37
              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
              • Instruction Fuzzy Hash: 43E0BF7494020EEFDB00DFB4D5496DD7BB4EF04302F1005A1FD05D7680DB309E549A62
              APIs
              • Sleep.KERNELBASE(000001F4), ref: 00F5CA79
              Memory Dump Source
              • Source File: 00000000.00000002.2247128171.0000000000F5A000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F5A000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f5a000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction ID: cb7251c43be05bd413c4136351a2d32e1a7b592ff61010ef0405f7cccb05e0d4
              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction Fuzzy Hash: A7E0E67494020EDFDB00DFB4D54969D7FB4EF04302F100161FD05D2280D7309D509A62
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0026CB37
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0026CB95
              • GetWindowLongW.USER32(?,000000F0), ref: 0026CBD6
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0026CC00
              • SendMessageW.USER32 ref: 0026CC29
              • _wcsncpy.LIBCMT ref: 0026CC95
              • GetKeyState.USER32(00000011), ref: 0026CCB6
              • GetKeyState.USER32(00000009), ref: 0026CCC3
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0026CCD9
              • GetKeyState.USER32(00000010), ref: 0026CCE3
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0026CD0C
              • SendMessageW.USER32 ref: 0026CD33
              • SendMessageW.USER32(?,00001030,?,0026B348), ref: 0026CE37
              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0026CE4D
              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0026CE60
              • SetCapture.USER32(?), ref: 0026CE69
              • ClientToScreen.USER32(?,?), ref: 0026CECE
              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0026CEDB
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0026CEF5
              • ReleaseCapture.USER32 ref: 0026CF00
              • GetCursorPos.USER32(?), ref: 0026CF3A
              • ScreenToClient.USER32(?,?), ref: 0026CF47
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0026CFA3
              • SendMessageW.USER32 ref: 0026CFD1
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0026D00E
              • SendMessageW.USER32 ref: 0026D03D
              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0026D05E
              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0026D06D
              • GetCursorPos.USER32(?), ref: 0026D08D
              • ScreenToClient.USER32(?,?), ref: 0026D09A
              • GetParent.USER32(?), ref: 0026D0BA
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0026D123
              • SendMessageW.USER32 ref: 0026D154
              • ClientToScreen.USER32(?,?), ref: 0026D1B2
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0026D1E2
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0026D20C
              • SendMessageW.USER32 ref: 0026D22F
              • ClientToScreen.USER32(?,?), ref: 0026D281
              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0026D2B5
                • Part of subcall function 001E25DB: GetWindowLongW.USER32(?,000000EB), ref: 001E25EC
              • GetWindowLongW.USER32(?,000000F0), ref: 0026D351
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
              • String ID: @GUI_DRAGID$F$pb*$xM
              • API String ID: 3977979337-1954401080
              • Opcode ID: 48068eeedefc0202b50c03716b247cd8c40d6c7543f0715f9032a477c8654066
              • Instruction ID: efcbafcd05edfd19aecf97baecde4983a9c6d931754a28087f6c1c9c5ff7198f
              • Opcode Fuzzy Hash: 48068eeedefc0202b50c03716b247cd8c40d6c7543f0715f9032a477c8654066
              • Instruction Fuzzy Hash: 4142EF34614641AFDB20DF24E888EBABBE5FF49314F244519F5A5872B0C771D8A0DF92
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memmove$_memset
              • String ID: ])$DEFINE$P\)$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
              • API String ID: 1357608183-1781545781
              • Opcode ID: 57de71f699143e8e837c8023048282a64dc593bfb7da8a2554b0e9f34c33b5ff
              • Instruction ID: 7d5e3870980a8737d59db1330fdaf6c1d6ec8ef9530729be7e30514f1c6c5ec1
              • Opcode Fuzzy Hash: 57de71f699143e8e837c8023048282a64dc593bfb7da8a2554b0e9f34c33b5ff
              • Instruction Fuzzy Hash: E19393B5A1421ADFDB24CF58C881BBDB7B1FF48710F25816AE945EB281E7709E91CB40
              APIs
              • GetForegroundWindow.USER32(00000000,?), ref: 001E48DF
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0021D665
              • IsIconic.USER32(?), ref: 0021D66E
              • ShowWindow.USER32(?,00000009), ref: 0021D67B
              • SetForegroundWindow.USER32(?), ref: 0021D685
              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0021D69B
              • GetCurrentThreadId.KERNEL32 ref: 0021D6A2
              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0021D6AE
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0021D6BF
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0021D6C7
              • AttachThreadInput.USER32(00000000,?,00000001), ref: 0021D6CF
              • SetForegroundWindow.USER32(?), ref: 0021D6D2
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0021D6E7
              • keybd_event.USER32(00000012,00000000), ref: 0021D6F2
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0021D6FC
              • keybd_event.USER32(00000012,00000000), ref: 0021D701
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0021D70A
              • keybd_event.USER32(00000012,00000000), ref: 0021D70F
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0021D719
              • keybd_event.USER32(00000012,00000000), ref: 0021D71E
              • SetForegroundWindow.USER32(?), ref: 0021D721
              • AttachThreadInput.USER32(?,?,00000000), ref: 0021D748
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
              • String ID: Shell_TrayWnd
              • API String ID: 4125248594-2988720461
              • Opcode ID: a46f74a9b1616625bf250fe0a22537ba15b5ba9cdc630836206267e59aa56aaa
              • Instruction ID: bbf1bd862cf8e2195e596a8914adb7b5639a4dc45c46a134e37a13049ad917ea
              • Opcode Fuzzy Hash: a46f74a9b1616625bf250fe0a22537ba15b5ba9cdc630836206267e59aa56aaa
              • Instruction Fuzzy Hash: C031A771A90318BBEF216F61AD49FBF7F6CEB44B50F104025FA05EA1D1C6F05C51AAA1
              APIs
                • Part of subcall function 002387E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0023882B
                • Part of subcall function 002387E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00238858
                • Part of subcall function 002387E1: GetLastError.KERNEL32 ref: 00238865
              • _memset.LIBCMT ref: 00238353
              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 002383A5
              • CloseHandle.KERNEL32(?), ref: 002383B6
              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 002383CD
              • GetProcessWindowStation.USER32 ref: 002383E6
              • SetProcessWindowStation.USER32(00000000), ref: 002383F0
              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0023840A
                • Part of subcall function 002381CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00238309), ref: 002381E0
                • Part of subcall function 002381CB: CloseHandle.KERNEL32(?,?,00238309), ref: 002381F2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
              • String ID: $default$winsta0
              • API String ID: 2063423040-1027155976
              • Opcode ID: dea4d1a06cb5b78fe8d776a99e766c4f1fd98c0f4a0faaeaa389a47c3c33146a
              • Instruction ID: d1c18370ead775b25bb8f4111b3f7e57184436eb85f3a3ead0d5f22f8612d783
              • Opcode Fuzzy Hash: dea4d1a06cb5b78fe8d776a99e766c4f1fd98c0f4a0faaeaa389a47c3c33146a
              • Instruction Fuzzy Hash: 348150B192030AAFDF119FA4DD49AEE7B79FF04304F148169F915BA161DB718E24DB20
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 0024C78D
              • FindClose.KERNEL32(00000000), ref: 0024C7E1
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0024C806
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0024C81D
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0024C844
              • __swprintf.LIBCMT ref: 0024C890
              • __swprintf.LIBCMT ref: 0024C8D3
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
              • __swprintf.LIBCMT ref: 0024C927
                • Part of subcall function 00203698: __woutput_l.LIBCMT ref: 002036F1
              • __swprintf.LIBCMT ref: 0024C975
                • Part of subcall function 00203698: __flsbuf.LIBCMT ref: 00203713
                • Part of subcall function 00203698: __flsbuf.LIBCMT ref: 0020372B
              • __swprintf.LIBCMT ref: 0024C9C4
              • __swprintf.LIBCMT ref: 0024CA13
              • __swprintf.LIBCMT ref: 0024CA62
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
              • API String ID: 3953360268-2428617273
              • Opcode ID: 741e18dca31658c587cca3f057050fc09b36f2bf15de66f12ebf5c191e5f3961
              • Instruction ID: 0e145f076bd1d363919e5f6bb6bfcf2660bb2fbf83b283edcd322980db225fc8
              • Opcode Fuzzy Hash: 741e18dca31658c587cca3f057050fc09b36f2bf15de66f12ebf5c191e5f3961
              • Instruction Fuzzy Hash: 4EA16DB1418785ABD744EFA5C885DAFB7ECFF95704F400929F58587192EB30DA08CB62
              APIs
              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 0024EFB6
              • _wcscmp.LIBCMT ref: 0024EFCB
              • _wcscmp.LIBCMT ref: 0024EFE2
              • GetFileAttributesW.KERNEL32(?), ref: 0024EFF4
              • SetFileAttributesW.KERNEL32(?,?), ref: 0024F00E
              • FindNextFileW.KERNEL32(00000000,?), ref: 0024F026
              • FindClose.KERNEL32(00000000), ref: 0024F031
              • FindFirstFileW.KERNEL32(*.*,?), ref: 0024F04D
              • _wcscmp.LIBCMT ref: 0024F074
              • _wcscmp.LIBCMT ref: 0024F08B
              • SetCurrentDirectoryW.KERNEL32(?), ref: 0024F09D
              • SetCurrentDirectoryW.KERNEL32(00298920), ref: 0024F0BB
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0024F0C5
              • FindClose.KERNEL32(00000000), ref: 0024F0D2
              • FindClose.KERNEL32(00000000), ref: 0024F0E4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
              • String ID: *.*
              • API String ID: 1803514871-438819550
              • Opcode ID: d0e8476d944ca02fe0d14fb6213416c55edc4941624412995a5d2420af672974
              • Instruction ID: 94a372928846c3ebdf6a00747a3d4c09ef8e0842af25a44679e66c7a28a84649
              • Opcode Fuzzy Hash: d0e8476d944ca02fe0d14fb6213416c55edc4941624412995a5d2420af672974
              • Instruction Fuzzy Hash: 3231F5325112096BDF58DFB4FD48AEE77AC9F89360F144176E804E21A1EBB0DA64CE61
              APIs
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00260953
              • RegCreateKeyExW.ADVAPI32(?,?,00000000,0026F910,00000000,?,00000000,?,?), ref: 002609C1
              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00260A09
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00260A92
              • RegCloseKey.ADVAPI32(?), ref: 00260DB2
              • RegCloseKey.ADVAPI32(00000000), ref: 00260DBF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Close$ConnectCreateRegistryValue
              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
              • API String ID: 536824911-966354055
              • Opcode ID: 33a0799db0d924566a3da04af2197fec1c3deb475000d37084b782dcb9e091e3
              • Instruction ID: 45202b4f3dd4a9cbbc84c12819e37e0262c49483b2e64cfaf98b855dfe5e0425
              • Opcode Fuzzy Hash: 33a0799db0d924566a3da04af2197fec1c3deb475000d37084b782dcb9e091e3
              • Instruction Fuzzy Hash: D10258756106419FCB54EF25C885E2AB7E5FF89324F04855DF88A9B3A2CB70EC51CB81
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID: 0D($0E($0F($ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$lldfrplldfrplld9rplld5rplld1rplld0rplldfrplldfrplldfrplldfrplldfrplldfrplld8rplld9rplld4rplld5rplldfrplld4rplld8rplld3rplld7rplldd$pG(
              • API String ID: 0-942742358
              • Opcode ID: e51ed30ef2ef352d092a4cc8db6400031a9e9517e67d9b78a9221ae35698d3f3
              • Instruction ID: b0228cda670c70882ba1b26bc2f2b356796b702b66045bf8a6d0115a235e6b4f
              • Opcode Fuzzy Hash: e51ed30ef2ef352d092a4cc8db6400031a9e9517e67d9b78a9221ae35698d3f3
              • Instruction Fuzzy Hash: 19727FB5E10219DBDB14CF58C8817BEB7B5FF48310F14816AE949EB291EB709E91CB90
              APIs
              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 0024F113
              • _wcscmp.LIBCMT ref: 0024F128
              • _wcscmp.LIBCMT ref: 0024F13F
                • Part of subcall function 00244385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 002443A0
              • FindNextFileW.KERNEL32(00000000,?), ref: 0024F16E
              • FindClose.KERNEL32(00000000), ref: 0024F179
              • FindFirstFileW.KERNEL32(*.*,?), ref: 0024F195
              • _wcscmp.LIBCMT ref: 0024F1BC
              • _wcscmp.LIBCMT ref: 0024F1D3
              • SetCurrentDirectoryW.KERNEL32(?), ref: 0024F1E5
              • SetCurrentDirectoryW.KERNEL32(00298920), ref: 0024F203
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0024F20D
              • FindClose.KERNEL32(00000000), ref: 0024F21A
              • FindClose.KERNEL32(00000000), ref: 0024F22C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
              • String ID: *.*
              • API String ID: 1824444939-438819550
              • Opcode ID: b480e87d2a33f4fde7f20abb18079611ff5b3a651f8e84cce6173e650cf0f834
              • Instruction ID: 67bca2cd9194d4fbe21b69aeef69e3ff4c368ff616b6bfae1dc666371d3341f5
              • Opcode Fuzzy Hash: b480e87d2a33f4fde7f20abb18079611ff5b3a651f8e84cce6173e650cf0f834
              • Instruction Fuzzy Hash: 7F31073651121A6ADF58DF60FD48AEE77AC9F8A320F144171EC04E21A0DBB0DE65CE54
              APIs
              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0024A20F
              • __swprintf.LIBCMT ref: 0024A231
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0024A26E
              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0024A293
              • _memset.LIBCMT ref: 0024A2B2
              • _wcsncpy.LIBCMT ref: 0024A2EE
              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0024A323
              • CloseHandle.KERNEL32(00000000), ref: 0024A32E
              • RemoveDirectoryW.KERNEL32(?), ref: 0024A337
              • CloseHandle.KERNEL32(00000000), ref: 0024A341
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
              • String ID: :$\$\??\%s
              • API String ID: 2733774712-3457252023
              • Opcode ID: 53a7786c5445f96d2fa50a05477885b08cbcdd97573ce336fc020ad5469666a8
              • Instruction ID: f7ac86e678b283890c751c097dc34f81c2628b60a540bcfc67256d3b53c8780d
              • Opcode Fuzzy Hash: 53a7786c5445f96d2fa50a05477885b08cbcdd97573ce336fc020ad5469666a8
              • Instruction Fuzzy Hash: D631D4B155020AABDB20DFA0EC49FEB37BCEF89740F1041B6F908D2161E7B096648F25
              APIs
              • GetKeyboardState.USER32(?), ref: 00240097
              • SetKeyboardState.USER32(?), ref: 00240102
              • GetAsyncKeyState.USER32(000000A0), ref: 00240122
              • GetKeyState.USER32(000000A0), ref: 00240139
              • GetAsyncKeyState.USER32(000000A1), ref: 00240168
              • GetKeyState.USER32(000000A1), ref: 00240179
              • GetAsyncKeyState.USER32(00000011), ref: 002401A5
              • GetKeyState.USER32(00000011), ref: 002401B3
              • GetAsyncKeyState.USER32(00000012), ref: 002401DC
              • GetKeyState.USER32(00000012), ref: 002401EA
              • GetAsyncKeyState.USER32(0000005B), ref: 00240213
              • GetKeyState.USER32(0000005B), ref: 00240221
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: State$Async$Keyboard
              • String ID:
              • API String ID: 541375521-0
              • Opcode ID: 1f3352b3f6ed7f3e63c729fc9ccdc2276072a01cbb632ac90c4e5f4b0ca15347
              • Instruction ID: 07303a25d1107d0f003a11e8260331a74952872a27017377ad43c639c3e88edb
              • Opcode Fuzzy Hash: 1f3352b3f6ed7f3e63c729fc9ccdc2276072a01cbb632ac90c4e5f4b0ca15347
              • Instruction Fuzzy Hash: B051EE2091478919FB39DFA089947AABFB49F01380F08459EDAC65B1C3D6B49BDCCB61
              APIs
                • Part of subcall function 00260E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0025FDAD,?,?), ref: 00260E31
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002604AC
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0026054B
              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 002605E3
              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00260822
              • RegCloseKey.ADVAPI32(00000000), ref: 0026082F
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
              • String ID:
              • API String ID: 1240663315-0
              • Opcode ID: 9c5cb579372ee178f46607bfeb1a6f4cbc280fd973d723e8fa1ca2adf35831f6
              • Instruction ID: 4e664dc2ccfc41729fc50129858825c05c791b0cfbed02c4604c78d7ad963273
              • Opcode Fuzzy Hash: 9c5cb579372ee178f46607bfeb1a6f4cbc280fd973d723e8fa1ca2adf35831f6
              • Instruction Fuzzy Hash: F9E15C70614205AFCB14DF25C895E2BBBE8EF89314F04856DF84ADB2A1DB30ED51DB91
              APIs
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
              • CoInitialize.OLE32 ref: 00258403
              • CoUninitialize.OLE32 ref: 0025840E
              • CoCreateInstance.OLE32(?,00000000,00000017,00272BEC,?), ref: 0025846E
              • IIDFromString.OLE32(?,?), ref: 002584E1
              • VariantInit.OLEAUT32(?), ref: 0025857B
              • VariantClear.OLEAUT32(?), ref: 002585DC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
              • API String ID: 834269672-1287834457
              • Opcode ID: 601f38d2aa74ad16a18b54c7178f18a05166f6e61e95f62d0e2ff3e4bd49f553
              • Instruction ID: 9f8f1be5cf6d9f8ffa6868f2d077e95df70964cbc31d33a426f7c80a54c5ebf7
              • Opcode Fuzzy Hash: 601f38d2aa74ad16a18b54c7178f18a05166f6e61e95f62d0e2ff3e4bd49f553
              • Instruction Fuzzy Hash: A461EF706283129FCB10DF14D848F6EB7E8AF49755F404419FD82AB2A1DBB0ED58CB96
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
              • String ID:
              • API String ID: 1737998785-0
              • Opcode ID: 1f038839115581ad4f0260ad41f1171d4054ee05fab7af10145deaa5a95cd9b8
              • Instruction ID: 64165aa8622163f7ed321a8646518a17f2a4efcd8279564a412f699ff67110cc
              • Opcode Fuzzy Hash: 1f038839115581ad4f0260ad41f1171d4054ee05fab7af10145deaa5a95cd9b8
              • Instruction Fuzzy Hash: 06219E752106149FDB00AF20FD0DB6EBBA8EF14711F00C02AFD46DB2B1DBB0A8508B95
              APIs
                • Part of subcall function 001E4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001E4743,?,?,001E37AE,?), ref: 001E4770
                • Part of subcall function 00244A31: GetFileAttributesW.KERNEL32(?,0024370B), ref: 00244A32
              • FindFirstFileW.KERNEL32(?,?), ref: 002438A3
              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0024394B
              • MoveFileW.KERNEL32(?,?), ref: 0024395E
              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0024397B
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0024399D
              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 002439B9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
              • String ID: \*.*
              • API String ID: 4002782344-1173974218
              • Opcode ID: 75d9b72be9fdcb4c092452b31990ff23e5e480b15fd3e2df51d23e30703302e4
              • Instruction ID: 33ec1302f88fb6c41009974048a17eb8adf89c55b414108a740578c82dfc12c2
              • Opcode Fuzzy Hash: 75d9b72be9fdcb4c092452b31990ff23e5e480b15fd3e2df51d23e30703302e4
              • Instruction Fuzzy Hash: FC51BF3181458DAADF09FFA1DA929EDB779AF24304F604069E402B7192EF706F19CB60
              APIs
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0024F440
              • Sleep.KERNEL32(0000000A), ref: 0024F470
              • _wcscmp.LIBCMT ref: 0024F484
              • _wcscmp.LIBCMT ref: 0024F49F
              • FindNextFileW.KERNEL32(?,?), ref: 0024F53D
              • FindClose.KERNEL32(00000000), ref: 0024F553
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
              • String ID: *.*
              • API String ID: 713712311-438819550
              • Opcode ID: 87355f39e0aee1bd31cc2c8d392c1cacc0e04a69d00d26e7fb58bb99d169724c
              • Instruction ID: 4462a34af89b70c3500fbc2d3f4d365a137ac5742de4980dea1e3f4d4529b355
              • Opcode Fuzzy Hash: 87355f39e0aee1bd31cc2c8d392c1cacc0e04a69d00d26e7fb58bb99d169724c
              • Instruction Fuzzy Hash: 8341E37181024AAFCF54EF64DD48AEEBBB8FF45310F504466E815A3291EB709EA4CF50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: 9d51a79fa634eda4fc0f90d1d7806038e90bf54d5567dfc7e1d2bf5edaf9b4ea
              • Instruction ID: 1a43bc69bef86fb5f28f470001da4385166680a6209e31a2156a18b52ecf7647
              • Opcode Fuzzy Hash: 9d51a79fa634eda4fc0f90d1d7806038e90bf54d5567dfc7e1d2bf5edaf9b4ea
              • Instruction Fuzzy Hash: 19129EB0A00A09DFDF04DFA5D991AAEB7F6FF48304F104529E546A7291EB35AD21CB60
              APIs
                • Part of subcall function 001E4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001E4743,?,?,001E37AE,?), ref: 001E4770
                • Part of subcall function 00244A31: GetFileAttributesW.KERNEL32(?,0024370B), ref: 00244A32
              • FindFirstFileW.KERNEL32(?,?), ref: 00243B89
              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00243BD9
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00243BEA
              • FindClose.KERNEL32(00000000), ref: 00243C01
              • FindClose.KERNEL32(00000000), ref: 00243C0A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
              • String ID: \*.*
              • API String ID: 2649000838-1173974218
              • Opcode ID: 6eae2fc3179a8c0f159bf6982bb3e9bda7ce85c4817ab338148518595c1f1152
              • Instruction ID: 7e71d1bec6d174e68e47833df20362135ad5e63fabb461efc99f7b6990d5f649
              • Opcode Fuzzy Hash: 6eae2fc3179a8c0f159bf6982bb3e9bda7ce85c4817ab338148518595c1f1152
              • Instruction Fuzzy Hash: 6231A0310187C59BC705EF64D8958AFB7E8BEA5308F444D2EF4D592191EB20DA18CBA3
              APIs
                • Part of subcall function 002387E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0023882B
                • Part of subcall function 002387E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00238858
                • Part of subcall function 002387E1: GetLastError.KERNEL32 ref: 00238865
              • ExitWindowsEx.USER32(?,00000000), ref: 002451F9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
              • String ID: $@$SeShutdownPrivilege
              • API String ID: 2234035333-194228
              • Opcode ID: 8bdb5118085905bbb31a66e8349bad86aa4853532a95f8045ce4c8d7b2c7a3be
              • Instruction ID: 1da1e047ed8d05236b247d1631adf73a4d05faa16c4eb76a20b554f9b2d6e116
              • Opcode Fuzzy Hash: 8bdb5118085905bbb31a66e8349bad86aa4853532a95f8045ce4c8d7b2c7a3be
              • Instruction Fuzzy Hash: 2101FC356B16325BEB2CAA74BC9AFBB72589B05740F140422FD97E60D3D9D15C208990
              APIs
              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 002562DC
              • WSAGetLastError.WSOCK32(00000000), ref: 002562EB
              • bind.WSOCK32(00000000,?,00000010), ref: 00256307
              • listen.WSOCK32(00000000,00000005), ref: 00256316
              • WSAGetLastError.WSOCK32(00000000), ref: 00256330
              • closesocket.WSOCK32(00000000,00000000), ref: 00256344
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorLast$bindclosesocketlistensocket
              • String ID:
              • API String ID: 1279440585-0
              • Opcode ID: 58193af70a6778a7d7d1178d1e854dcfbab8abf1231380beaefb1c3134e7b30d
              • Instruction ID: de330d965be3dedf86f9851a9f301dd429bb57cee846c082e66165667a6918b4
              • Opcode Fuzzy Hash: 58193af70a6778a7d7d1178d1e854dcfbab8abf1231380beaefb1c3134e7b30d
              • Instruction Fuzzy Hash: 1921D271610604AFCB00EF64E94DE6EB7A9EF44721F5481A8EC16A73A1CBB0AC15CB51
              APIs
                • Part of subcall function 00200DB6: std::exception::exception.LIBCMT ref: 00200DEC
                • Part of subcall function 00200DB6: __CxxThrowException@8.LIBCMT ref: 00200E01
              • _memmove.LIBCMT ref: 00230258
              • _memmove.LIBCMT ref: 0023036D
              • _memmove.LIBCMT ref: 00230414
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memmove$Exception@8Throwstd::exception::exception
              • String ID:
              • API String ID: 1300846289-0
              • Opcode ID: b67b9e24f574a9fe708747f3f22a93f2b933229b8d52368898d92119e2d5c22c
              • Instruction ID: aa2cd388d86ef19f6b8316b92b5a6631578cc874265de252302bb8797b59b908
              • Opcode Fuzzy Hash: b67b9e24f574a9fe708747f3f22a93f2b933229b8d52368898d92119e2d5c22c
              • Instruction Fuzzy Hash: 8002E2B0A10609DBDF04DF65D9D1ABE7BB5EF44310F1480A9E90ADB295EB30DD60CBA1
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
              • DefDlgProcW.USER32(?,?,?,?,?), ref: 001E19FA
              • GetSysColor.USER32(0000000F), ref: 001E1A4E
              • SetBkColor.GDI32(?,00000000), ref: 001E1A61
                • Part of subcall function 001E1290: DefDlgProcW.USER32(?,00000020,?), ref: 001E12D8
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ColorProc$LongWindow
              • String ID:
              • API String ID: 3744519093-0
              • Opcode ID: 520c87967cc61682ad21b7c13a08ade6f601a45b0ef2e01dcf5d99bbc268da20
              • Instruction ID: 190cd2caa85fe597b9db91a02983393948deca7b040755e2fa3647c87db3316e
              • Opcode Fuzzy Hash: 520c87967cc61682ad21b7c13a08ade6f601a45b0ef2e01dcf5d99bbc268da20
              • Instruction Fuzzy Hash: 5CA19B70122CC5BBDB2DAF2B5C48DBF35ADDF96381B250129F502D7192CB348DA18AB1
              APIs
                • Part of subcall function 00257D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00257DB6
              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0025679E
              • WSAGetLastError.WSOCK32(00000000), ref: 002567C7
              • bind.WSOCK32(00000000,?,00000010), ref: 00256800
              • WSAGetLastError.WSOCK32(00000000), ref: 0025680D
              • closesocket.WSOCK32(00000000,00000000), ref: 00256821
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorLast$bindclosesocketinet_addrsocket
              • String ID:
              • API String ID: 99427753-0
              • Opcode ID: f805aa01adea1133f7ca9a3afcffc936d2b32c9ad384559c51efe60dc0072d2f
              • Instruction ID: 1e8a0f9f0eb0cac83ff661491a64939579b7a5e815f598cfefdf6df064f99da7
              • Opcode Fuzzy Hash: f805aa01adea1133f7ca9a3afcffc936d2b32c9ad384559c51efe60dc0072d2f
              • Instruction Fuzzy Hash: 2441F475A00644AFDB50FF699C8AF6E77A8EF58710F448468FD19AB3D2CB709D008B91
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$EnabledForegroundIconicVisibleZoomed
              • String ID:
              • API String ID: 292994002-0
              • Opcode ID: cc3fbaed753fb09d43002514eaa9d80e92f798acc95473b9e223613e8b27d32a
              • Instruction ID: b9e4037bb7d3a910353f275caa79bc1c58a757d942c3e8c19f8b3f770867d31c
              • Opcode Fuzzy Hash: cc3fbaed753fb09d43002514eaa9d80e92f798acc95473b9e223613e8b27d32a
              • Instruction Fuzzy Hash: 7911E6313109616BDB215F26EC48A2F7B9CFF547A0F408069F806D3241CBB09C618690
              APIs
              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 002380C0
              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 002380CA
              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 002380D9
              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 002380E0
              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 002380F6
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: 979a3d6ee7b0ef97e452eceef3d8349c3cc9f17699d2f54ad1ef4d6a124df81b
              • Instruction ID: 2b444656dcc5496bc1efe833f3f19008288d10e8f3caa7cc5582310653325256
              • Opcode Fuzzy Hash: 979a3d6ee7b0ef97e452eceef3d8349c3cc9f17699d2f54ad1ef4d6a124df81b
              • Instruction Fuzzy Hash: 98F062B1254315AFEB100FA5FC8DE673BACFF8A795F104025F949D6150CBA19C51DA60
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,001E4AD0), ref: 001E4B45
              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 001E4B57
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: GetNativeSystemInfo$kernel32.dll
              • API String ID: 2574300362-192647395
              • Opcode ID: f570e7b31c338d766992d66d81a93c40ad6f0e1c4d0952c617f3cc9e05703939
              • Instruction ID: 50acf9a8fe604ee9cc086d875aa1cdaf2e4daa258597f537dc39c9c1b6b5ee14
              • Opcode Fuzzy Hash: f570e7b31c338d766992d66d81a93c40ad6f0e1c4d0952c617f3cc9e05703939
              • Instruction Fuzzy Hash: 2BD01234A10713CFDB609F32F918B0676D4AF06395B11C879D485D6550D7B0D4C0C654
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __itow__swprintf
              • String ID:
              • API String ID: 674341424-0
              • Opcode ID: 42d6e27660be635dd3ebc87d4dd0b530415b6ff6bc94a2e434f4e2e0a38e9ffe
              • Instruction ID: 594cd7011bcc5f3744392572b8ad187625144a134184023a4ac9f266beb9725c
              • Opcode Fuzzy Hash: 42d6e27660be635dd3ebc87d4dd0b530415b6ff6bc94a2e434f4e2e0a38e9ffe
              • Instruction Fuzzy Hash: 6922CC716183559FC728DF64D881B6EB7E4BF84300F00492DFAAA97291DB71EE04CB92
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 0025EE3D
              • Process32FirstW.KERNEL32(00000000,?), ref: 0025EE4B
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
              • Process32NextW.KERNEL32(00000000,?), ref: 0025EF0B
              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0025EF1A
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
              • String ID:
              • API String ID: 2576544623-0
              • Opcode ID: 3fdd34bef094bcef1318226035a46bf4ddd79382e35de972d2e1dae4802623e5
              • Instruction ID: 80e4f56056c21500131ef9fac5e47a9a59ab3e0eb3c747212b77ade2f270222c
              • Opcode Fuzzy Hash: 3fdd34bef094bcef1318226035a46bf4ddd79382e35de972d2e1dae4802623e5
              • Instruction Fuzzy Hash: 7F51AE711047419FD710EF25DC86EAFB7E8EF94710F00482DF895862A1EB70A908CB92
              APIs
              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0023E628
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: ($|
              • API String ID: 1659193697-1631851259
              • Opcode ID: e9873d52975e9fa9e0c8bc777c3b8268942e159b30d84523cd46cac4063ad113
              • Instruction ID: 6c511ea6c0d2fb2beb93581e60597d68d63ec1a0e50107eef05110bd401b6d9b
              • Opcode Fuzzy Hash: e9873d52975e9fa9e0c8bc777c3b8268942e159b30d84523cd46cac4063ad113
              • Instruction Fuzzy Hash: 383205B5A107059FDB28CF19C481AAAB7F1FF48310B16C56EE89ADB3A1D770E951CB40
              APIs
              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0025180A,00000000), ref: 002523E1
              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00252418
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Internet$AvailableDataFileQueryRead
              • String ID:
              • API String ID: 599397726-0
              • Opcode ID: b4038a4a216b2474fd0fd176c63446de07793d5a11d6be9580d0fc51d98a3f91
              • Instruction ID: e66fea710b5c1f8209006f14a0b1f01f838bc389f1b6ac51ec3b795cf5c27057
              • Opcode Fuzzy Hash: b4038a4a216b2474fd0fd176c63446de07793d5a11d6be9580d0fc51d98a3f91
              • Instruction Fuzzy Hash: C441F771520309FFEB10DE55DC85EBBB7BCEB41315F10406AFE00A61C1DAB49E6D9A58
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 0024B343
              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0024B39D
              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0024B3EA
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorMode$DiskFreeSpace
              • String ID:
              • API String ID: 1682464887-0
              • Opcode ID: 23ffb2e5c3e44c0f991f1c85eb7967f6e19f632570097606fa6075848283819c
              • Instruction ID: 11f60f516542a3e2ca997d19c656c79807830d3fa7e6c0245124feb3b9fbe35b
              • Opcode Fuzzy Hash: 23ffb2e5c3e44c0f991f1c85eb7967f6e19f632570097606fa6075848283819c
              • Instruction Fuzzy Hash: 67216075A10508EFCB00EFA5E885EEDBBB8FF49314F1480AAE905AB361CB319955CF51
              APIs
                • Part of subcall function 00200DB6: std::exception::exception.LIBCMT ref: 00200DEC
                • Part of subcall function 00200DB6: __CxxThrowException@8.LIBCMT ref: 00200E01
              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0023882B
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00238858
              • GetLastError.KERNEL32 ref: 00238865
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
              • String ID:
              • API String ID: 1922334811-0
              • Opcode ID: 56e8af8ad8006db8e66d3a4e8b33c0a6d4250fed7714fdbf665e8ac25d8c9393
              • Instruction ID: d23f23e285ec0de5f1b37270b8b1d9af1fcabb59a57d501dfb17d624e69a2a78
              • Opcode Fuzzy Hash: 56e8af8ad8006db8e66d3a4e8b33c0a6d4250fed7714fdbf665e8ac25d8c9393
              • Instruction Fuzzy Hash: 3C118FB2524309AFE718DFA4EC85D6BB7FDEB44710B20852EF45597241EB70BC518B60
              APIs
              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00238774
              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0023878B
              • FreeSid.ADVAPI32(?), ref: 0023879B
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AllocateCheckFreeInitializeMembershipToken
              • String ID:
              • API String ID: 3429775523-0
              • Opcode ID: a5404f2c6d2c49bb669ccedbadc1523abcc0155c8f9ee89b7c492cb6ac1aa0cb
              • Instruction ID: 341f2ddb712eb636fd37270533bf572cb93290373dcb07ecc88602f180d0531c
              • Opcode Fuzzy Hash: a5404f2c6d2c49bb669ccedbadc1523abcc0155c8f9ee89b7c492cb6ac1aa0cb
              • Instruction Fuzzy Hash: 98F04F7591130DBFDF00DFF4ED89AADB7BCEF08201F104469E501E2181D6755A048B50
              APIs
              • __time64.LIBCMT ref: 0024889B
                • Part of subcall function 0020520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00248F6E,00000000,?,?,?,?,0024911F,00000000,?), ref: 00205213
                • Part of subcall function 0020520A: __aulldiv.LIBCMT ref: 00205233
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Time$FileSystem__aulldiv__time64
              • String ID: 0e*
              • API String ID: 2893107130-404449974
              • Opcode ID: 7aa7e880daf42cf0728346d8a27d2d7051cc3e4002b6d0ce0b34725fc783a75c
              • Instruction ID: 370a48b6c4764feb8d35df61a5198c67e0f22b70d0869df49b16d1d3e1f955a7
              • Opcode Fuzzy Hash: 7aa7e880daf42cf0728346d8a27d2d7051cc3e4002b6d0ce0b34725fc783a75c
              • Instruction Fuzzy Hash: 7121AF32A356108BC729CF29D845A52B3E1EFA5311B688E6CE1F5CB2C0CF34A905CB54
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 0024C6FB
              • FindClose.KERNEL32(00000000), ref: 0024C72B
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Find$CloseFileFirst
              • String ID:
              • API String ID: 2295610775-0
              • Opcode ID: def51829af8c209c7ca9fd2a76b5981bc0579c9bdeeef85d6074d09792f771db
              • Instruction ID: eac29880d2591928e6e1bb72f5ba1d92a5a5c21f818b5e50a931536755eedd49
              • Opcode Fuzzy Hash: def51829af8c209c7ca9fd2a76b5981bc0579c9bdeeef85d6074d09792f771db
              • Instruction Fuzzy Hash: E4118E726106449FDB14DF29D849A2AF7E8FF95324F10851EF8A9872A0DB70A811CF81
              APIs
              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00259468,?,0026FB84,?), ref: 0024A097
              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00259468,?,0026FB84,?), ref: 0024A0A9
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorFormatLastMessage
              • String ID:
              • API String ID: 3479602957-0
              • Opcode ID: 34c448074c96752b0a5f8422281c780351ac9297d3f4aab837a9924743ca2d0a
              • Instruction ID: 9e0bb147fc79c2f2236ba96521493de161e32cb0296be231943d91668784e09b
              • Opcode Fuzzy Hash: 34c448074c96752b0a5f8422281c780351ac9297d3f4aab837a9924743ca2d0a
              • Instruction Fuzzy Hash: 27F0E23515422DABDB209FA4DC48FEA736CFF18361F008265F919D2180C6709950CBA1
              APIs
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00238309), ref: 002381E0
              • CloseHandle.KERNEL32(?,?,00238309), ref: 002381F2
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AdjustCloseHandlePrivilegesToken
              • String ID:
              • API String ID: 81990902-0
              • Opcode ID: d97e04023c2cae6ed198d7fa965c1c563670715ab3db76c39ddadd8e353f5fa1
              • Instruction ID: 01090e3594759cd3f31bad21bd0edff43ed7a341d02fa356f431aea0372434e5
              • Opcode Fuzzy Hash: d97e04023c2cae6ed198d7fa965c1c563670715ab3db76c39ddadd8e353f5fa1
              • Instruction Fuzzy Hash: 4EE0E672014611AFFB652B60FC09E7777E9EF04350B24C86DF49584471DB616CA1DB10
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00208D57,?,?,?,00000001), ref: 0020A15A
              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0020A163
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 01e7a4aa8deb7107035726d5042a64595ad139e117f8ecca1d9e6fdd9203aae7
              • Instruction ID: d898067241f4514a02a015ae2e47edacae8055c4ecc738d6b8b4c9180c18861f
              • Opcode Fuzzy Hash: 01e7a4aa8deb7107035726d5042a64595ad139e117f8ecca1d9e6fdd9203aae7
              • Instruction Fuzzy Hash: 1EB09231058248ABCE802B91FD0DB883F68EB44AA2F4080A0FE0D84260EBA254608A91
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bb9b25c515429f69aaea69200ee2d3d0c1de153b675b70a1336e55a9850ee046
              • Instruction ID: 8f5f64db472089ef8db2bf76cfc665d269912e60ad1d51cf3cf8c386db117f07
              • Opcode Fuzzy Hash: bb9b25c515429f69aaea69200ee2d3d0c1de153b675b70a1336e55a9850ee046
              • Instruction Fuzzy Hash: 4632F122D79F414DD7639A34D926336A249AFB73C8F15D737E81AB5DA6EB28C4C34100
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e5f829415a5a3ba4920251c734b089f88e7350bf70b0f65a34ce03dffb6106ac
              • Instruction ID: c6e1be3a6983aad40bc8cb085d4df5f62a088ead3f743c3798bed2d3dfe71290
              • Opcode Fuzzy Hash: e5f829415a5a3ba4920251c734b089f88e7350bf70b0f65a34ce03dffb6106ac
              • Instruction Fuzzy Hash: 4CB1EF20D2AF414DD2239A39983933AB69CAFFB2D5B51D71BFC1A74D22EB2285D34141
              APIs
              • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00244C4A
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: mouse_event
              • String ID:
              • API String ID: 2434400541-0
              • Opcode ID: 2f2141b124179ffeb5d541cf91fe9d39b8479715ab58d09cf0318d52aa2142be
              • Instruction ID: c3d117daa3f4f180ef892bb5f82272f3f8687e80361a78f4dc3e2961282256b6
              • Opcode Fuzzy Hash: 2f2141b124179ffeb5d541cf91fe9d39b8479715ab58d09cf0318d52aa2142be
              • Instruction Fuzzy Hash: BBD05E9117560A38FC1C2B20EE4FF7A0108E30078AFD8814B75028A0C2ECC05C605031
              APIs
              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00238389), ref: 002387D1
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: LogonUser
              • String ID:
              • API String ID: 1244722697-0
              • Opcode ID: b265b94ae88916a381ec6c0d4c15622d0c43c4af042c244e399844f8b1dc6fbd
              • Instruction ID: f55c4336a91e637be2523439f5c6b6166255ab6c03e3749bd7ac9935e5c7ed39
              • Opcode Fuzzy Hash: b265b94ae88916a381ec6c0d4c15622d0c43c4af042c244e399844f8b1dc6fbd
              • Instruction Fuzzy Hash: 45D05E3226050EBBEF018EA4ED05EAE3B69EB04B01F408111FE15C50A1C7B5D835AB60
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0020A12A
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 59f0343101511ca07af5f0e10827daf2deb1f348253de4dd0c77a3173637d93e
              • Instruction ID: 215693e53f5258dc03837f7dc13d7aaf7e588d85fbd82c99b9a39994d8f9260f
              • Opcode Fuzzy Hash: 59f0343101511ca07af5f0e10827daf2deb1f348253de4dd0c77a3173637d93e
              • Instruction Fuzzy Hash: DCA0113000020CAB8E002B82FC08888BFACEA002A0B0080A0FC0C80222ABB2A8208A80
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 48968177975b07d463f4176d106c03445505027e5d407ab4a80a3229bea80824
              • Instruction ID: 35fd883deec9d89c7ba0e314ad558e037b122079ba9dbad43826014e8ce4f61d
              • Opcode Fuzzy Hash: 48968177975b07d463f4176d106c03445505027e5d407ab4a80a3229bea80824
              • Instruction Fuzzy Hash: D4221470A1452ACBDF288F24C4D477DB7A1FB41348F28806BDA9A8B592DBB09DA1C751
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
              • Instruction ID: 6a1b529c8d2155fcd5ba211bb97123ba5cf51a3ce91ce79abab1db67a5540b17
              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
              • Instruction Fuzzy Hash: 99C1CC322252534ADF2D4A39C43803EFFA15EA27B135A075ED8B3DB5D6EE20C979D610
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
              • Instruction ID: 00b810292242b7bc9c25d0089e5e29e60c5a14b60a8bc2b1b71048fb6f21ef5a
              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
              • Instruction Fuzzy Hash: 54C1BA322152934ADF2D4A39C43813EFBA15FA27B135A075ED4B3DB4D6EE10C938D620
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
              • Instruction ID: f0cb673887d2c3e667611ceaea86dc6962152aca4831edc2922e5a880f1a3e8f
              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
              • Instruction Fuzzy Hash: AAC1A63222529309DF2D4A39C47413EFBA15EA2BB135A076DD4B3CB5C6FE20C935D620
              APIs
              • DeleteObject.GDI32(00000000), ref: 0025785B
              • DeleteObject.GDI32(00000000), ref: 0025786D
              • DestroyWindow.USER32 ref: 0025787B
              • GetDesktopWindow.USER32 ref: 00257895
              • GetWindowRect.USER32(00000000), ref: 0025789C
              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 002579DD
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 002579ED
              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00257A35
              • GetClientRect.USER32(00000000,?), ref: 00257A41
              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00257A7B
              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00257A9D
              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00257AB0
              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00257ABB
              • GlobalLock.KERNEL32(00000000), ref: 00257AC4
              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00257AD3
              • GlobalUnlock.KERNEL32(00000000), ref: 00257ADC
              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00257AE3
              • GlobalFree.KERNEL32(00000000), ref: 00257AEE
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00257B00
              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00272CAC,00000000), ref: 00257B16
              • GlobalFree.KERNEL32(00000000), ref: 00257B26
              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00257B4C
              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00257B6B
              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00257B8D
              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00257D7A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
              • String ID: $AutoIt v3$DISPLAY$static
              • API String ID: 2211948467-2373415609
              • Opcode ID: d25d3f383a8ae71e891841e32136ddad71afcaa966f211aaba25e077b2ec8f7f
              • Instruction ID: 3434444dd327cab310b52efdfd25bc3e4b243e134399b47e35de1222bb5038ff
              • Opcode Fuzzy Hash: d25d3f383a8ae71e891841e32136ddad71afcaa966f211aaba25e077b2ec8f7f
              • Instruction Fuzzy Hash: E6027871910119EFDF14DFA4ED89EAE7BB9EB49311F008169FD15AB2A1CB70AD01CB60
              APIs
              • CharUpperBuffW.USER32(?,?,0026F910), ref: 00263627
              • IsWindowVisible.USER32(?), ref: 0026364B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: BuffCharUpperVisibleWindow
              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
              • API String ID: 4105515805-45149045
              • Opcode ID: 6230d870d0136a8c2a3bd2ade859ecbcc1af519208a60601f30762fd20bf049e
              • Instruction ID: e4203d3102ed882dab55926caef11f5ce9141e22965bffce431842a6302202e2
              • Opcode Fuzzy Hash: 6230d870d0136a8c2a3bd2ade859ecbcc1af519208a60601f30762fd20bf049e
              • Instruction Fuzzy Hash: FBD17C702343419BCF04EF14C895AAEB7A5AF95354F144468F8825B3E3DB71EEAACB41
              APIs
              • SetTextColor.GDI32(?,00000000), ref: 0026A630
              • GetSysColorBrush.USER32(0000000F), ref: 0026A661
              • GetSysColor.USER32(0000000F), ref: 0026A66D
              • SetBkColor.GDI32(?,000000FF), ref: 0026A687
              • SelectObject.GDI32(?,00000000), ref: 0026A696
              • InflateRect.USER32(?,000000FF,000000FF), ref: 0026A6C1
              • GetSysColor.USER32(00000010), ref: 0026A6C9
              • CreateSolidBrush.GDI32(00000000), ref: 0026A6D0
              • FrameRect.USER32(?,?,00000000), ref: 0026A6DF
              • DeleteObject.GDI32(00000000), ref: 0026A6E6
              • InflateRect.USER32(?,000000FE,000000FE), ref: 0026A731
              • FillRect.USER32(?,?,00000000), ref: 0026A763
              • GetWindowLongW.USER32(?,000000F0), ref: 0026A78E
                • Part of subcall function 0026A8CA: GetSysColor.USER32(00000012), ref: 0026A903
                • Part of subcall function 0026A8CA: SetTextColor.GDI32(?,?), ref: 0026A907
                • Part of subcall function 0026A8CA: GetSysColorBrush.USER32(0000000F), ref: 0026A91D
                • Part of subcall function 0026A8CA: GetSysColor.USER32(0000000F), ref: 0026A928
                • Part of subcall function 0026A8CA: GetSysColor.USER32(00000011), ref: 0026A945
                • Part of subcall function 0026A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0026A953
                • Part of subcall function 0026A8CA: SelectObject.GDI32(?,00000000), ref: 0026A964
                • Part of subcall function 0026A8CA: SetBkColor.GDI32(?,00000000), ref: 0026A96D
                • Part of subcall function 0026A8CA: SelectObject.GDI32(?,?), ref: 0026A97A
                • Part of subcall function 0026A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0026A999
                • Part of subcall function 0026A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0026A9B0
                • Part of subcall function 0026A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0026A9C5
                • Part of subcall function 0026A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0026A9ED
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
              • String ID:
              • API String ID: 3521893082-0
              • Opcode ID: 8b376eac205500d55f3069cdc67cd7d88189f459c372f4d22ccb13612a2ccf0e
              • Instruction ID: 4323d0de0cfd876819edd4a3e78057ea799b9f3a8fffdf4932928df5ce52aaeb
              • Opcode Fuzzy Hash: 8b376eac205500d55f3069cdc67cd7d88189f459c372f4d22ccb13612a2ccf0e
              • Instruction Fuzzy Hash: 7C919F72008301EFCB519F64ED4CA5BBBA9FF49321F108A29F562A61A0D7B0D944CF52
              APIs
              • DestroyWindow.USER32(00000000), ref: 002574DE
              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0025759D
              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 002575DB
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 002575ED
              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00257633
              • GetClientRect.USER32(00000000,?), ref: 0025763F
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00257683
              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00257692
              • GetStockObject.GDI32(00000011), ref: 002576A2
              • SelectObject.GDI32(00000000,00000000), ref: 002576A6
              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 002576B6
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002576BF
              • DeleteDC.GDI32(00000000), ref: 002576C8
              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 002576F4
              • SendMessageW.USER32(00000030,00000000,00000001), ref: 0025770B
              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00257746
              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0025775A
              • SendMessageW.USER32(00000404,00000001,00000000), ref: 0025776B
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0025779B
              • GetStockObject.GDI32(00000011), ref: 002577A6
              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 002577B1
              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 002577BB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
              • API String ID: 2910397461-517079104
              • Opcode ID: 9c80c14511335efa467a53f1fb1810fa7da0379fffa2f9e142eb617e0c66793c
              • Instruction ID: d830131649335e4d131cd989fe305cf25e40f7b622cdadc7b5bf1f67b9eb7736
              • Opcode Fuzzy Hash: 9c80c14511335efa467a53f1fb1810fa7da0379fffa2f9e142eb617e0c66793c
              • Instruction Fuzzy Hash: 9BA15F71A50615BFEB14DFA4ED4AFAF7BA9EB05710F008114FA15A72E0DBB0AD10CB64
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 0024AD1E
              • GetDriveTypeW.KERNEL32(?,0026FAC0,?,\\.\,0026F910), ref: 0024ADFB
              • SetErrorMode.KERNEL32(00000000,0026FAC0,?,\\.\,0026F910), ref: 0024AF59
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorMode$DriveType
              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
              • API String ID: 2907320926-4222207086
              • Opcode ID: 1b6548aaae9b6b981ed3c7ce37bc5f3083bca4d4b4fc7e5ada007b43914da907
              • Instruction ID: 7532e6e6282cae9a1c50983b3e6cdba42e5540d41bf6d5272505b2eb9edb53d4
              • Opcode Fuzzy Hash: 1b6548aaae9b6b981ed3c7ce37bc5f3083bca4d4b4fc7e5ada007b43914da907
              • Instruction Fuzzy Hash: D451B2B16B4606EB8F08DF10C952CBD73A1EB1A7047294066E407EB6D1CBB29D35DB83
              APIs
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00269AD2
              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00269B8B
              • SendMessageW.USER32(?,00001102,00000002,?), ref: 00269BA7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$Window
              • String ID: 0$xM
              • API String ID: 2326795674-2111700025
              • Opcode ID: 00d981541b36f9cc285cb2813b89a47e61aec37c9e7109fde8ee37144feae6d1
              • Instruction ID: 99b20cf5b1cfa544af537b878ec4d6790e1417f0abb0d7ba576e7c8ed8baa32d
              • Opcode Fuzzy Hash: 00d981541b36f9cc285cb2813b89a47e61aec37c9e7109fde8ee37144feae6d1
              • Instruction Fuzzy Hash: 9802E030128202AFDB15CF14D948BAABBE8FF4A714F04852DF995D62A1CB75DCE4CB52
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __wcsnicmp
              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
              • API String ID: 1038674560-86951937
              • Opcode ID: 201ba53e490cc54f1b85b7ab6c88019fde2a6883fea35f53363f24ef324684d3
              • Instruction ID: 86837e70f03c3c92b8311cf65b3075a433095c96a0ec33a11b69d5e9e32d5af8
              • Opcode Fuzzy Hash: 201ba53e490cc54f1b85b7ab6c88019fde2a6883fea35f53363f24ef324684d3
              • Instruction Fuzzy Hash: 3B8127B0620746AADF20AE62EC43FBE77A8AF25744F444025FC056B1D3EB70DE65C661
              APIs
              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00268AC1
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00268AD2
              • CharNextW.USER32(0000014E), ref: 00268B01
              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00268B42
              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00268B58
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00268B69
              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00268B86
              • SetWindowTextW.USER32(?,0000014E), ref: 00268BD8
              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00268BEE
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00268C1F
              • _memset.LIBCMT ref: 00268C44
              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00268C8D
              • _memset.LIBCMT ref: 00268CEC
              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00268D16
              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00268D6E
              • SendMessageW.USER32(?,0000133D,?,?), ref: 00268E1B
              • InvalidateRect.USER32(?,00000000,00000001), ref: 00268E3D
              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00268E87
              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00268EB4
              • DrawMenuBar.USER32(?), ref: 00268EC3
              • SetWindowTextW.USER32(?,0000014E), ref: 00268EEB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
              • String ID: 0$xM
              • API String ID: 1073566785-2111700025
              • Opcode ID: c60f85d27d88a79e74c26fb66a312dd42a483b126d01ceff3192189d3c8cb59e
              • Instruction ID: b8b0470344d5f765da585f8697ae44dba6b1f26a11cf19ebcd7b3ab3d24933db
              • Opcode Fuzzy Hash: c60f85d27d88a79e74c26fb66a312dd42a483b126d01ceff3192189d3c8cb59e
              • Instruction Fuzzy Hash: F6E17471920219AFDF20DF54DC88EEE7BB9EF09710F108256F915AA191DBB089E4DF60
              APIs
              • GetSysColor.USER32(00000012), ref: 0026A903
              • SetTextColor.GDI32(?,?), ref: 0026A907
              • GetSysColorBrush.USER32(0000000F), ref: 0026A91D
              • GetSysColor.USER32(0000000F), ref: 0026A928
              • CreateSolidBrush.GDI32(?), ref: 0026A92D
              • GetSysColor.USER32(00000011), ref: 0026A945
              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0026A953
              • SelectObject.GDI32(?,00000000), ref: 0026A964
              • SetBkColor.GDI32(?,00000000), ref: 0026A96D
              • SelectObject.GDI32(?,?), ref: 0026A97A
              • InflateRect.USER32(?,000000FF,000000FF), ref: 0026A999
              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0026A9B0
              • GetWindowLongW.USER32(00000000,000000F0), ref: 0026A9C5
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0026A9ED
              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0026AA14
              • InflateRect.USER32(?,000000FD,000000FD), ref: 0026AA32
              • DrawFocusRect.USER32(?,?), ref: 0026AA3D
              • GetSysColor.USER32(00000011), ref: 0026AA4B
              • SetTextColor.GDI32(?,00000000), ref: 0026AA53
              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0026AA67
              • SelectObject.GDI32(?,0026A5FA), ref: 0026AA7E
              • DeleteObject.GDI32(?), ref: 0026AA89
              • SelectObject.GDI32(?,?), ref: 0026AA8F
              • DeleteObject.GDI32(?), ref: 0026AA94
              • SetTextColor.GDI32(?,?), ref: 0026AA9A
              • SetBkColor.GDI32(?,?), ref: 0026AAA4
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
              • String ID:
              • API String ID: 1996641542-0
              • Opcode ID: 1214b116a73aa2b6d7fea11b0fba76036c1954d3429838cf23452b125c2f92ba
              • Instruction ID: ba01f6a1f3572f6afea5042db849caa340de4e9c5eef620cc45bf38f52ffb0a4
              • Opcode Fuzzy Hash: 1214b116a73aa2b6d7fea11b0fba76036c1954d3429838cf23452b125c2f92ba
              • Instruction Fuzzy Hash: FB514D71901208EFDF109FA4ED48EAEBB79EF08320F218165F915AB2A1D7B19950CF90
              APIs
              • GetCursorPos.USER32(?), ref: 002649CA
              • GetDesktopWindow.USER32 ref: 002649DF
              • GetWindowRect.USER32(00000000), ref: 002649E6
              • GetWindowLongW.USER32(?,000000F0), ref: 00264A48
              • DestroyWindow.USER32(?), ref: 00264A74
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00264A9D
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00264ABB
              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00264AE1
              • SendMessageW.USER32(?,00000421,?,?), ref: 00264AF6
              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00264B09
              • IsWindowVisible.USER32(?), ref: 00264B29
              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00264B44
              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00264B58
              • GetWindowRect.USER32(?,?), ref: 00264B70
              • MonitorFromPoint.USER32(?,?,00000002), ref: 00264B96
              • GetMonitorInfoW.USER32(00000000,?), ref: 00264BB0
              • CopyRect.USER32(?,?), ref: 00264BC7
              • SendMessageW.USER32(?,00000412,00000000), ref: 00264C32
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
              • String ID: ($0$tooltips_class32
              • API String ID: 698492251-4156429822
              • Opcode ID: 7a72416300f5f987470b01bb26e90c47f19cbc5342fa0061a91c2bcaf6c0d381
              • Instruction ID: 7546ce9fb94707957e3a3c6f9b8722204bdc26976109f3478295218da52a187f
              • Opcode Fuzzy Hash: 7a72416300f5f987470b01bb26e90c47f19cbc5342fa0061a91c2bcaf6c0d381
              • Instruction Fuzzy Hash: B1B1BB70614341AFDB04EF65D948B6ABBE4FF84304F008A1CF9999B2A1C7B1EC54CB91
              APIs
              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 002444AC
              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 002444D2
              • _wcscpy.LIBCMT ref: 00244500
              • _wcscmp.LIBCMT ref: 0024450B
              • _wcscat.LIBCMT ref: 00244521
              • _wcsstr.LIBCMT ref: 0024452C
              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00244548
              • _wcscat.LIBCMT ref: 00244591
              • _wcscat.LIBCMT ref: 00244598
              • _wcsncpy.LIBCMT ref: 002445C3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
              • API String ID: 699586101-1459072770
              • Opcode ID: cf7edc20a8d86aac6692b3ea996543ee044e701bda3edebf2db628c322e8d0c4
              • Instruction ID: c01b0ec25b72b3053be4fe42a798eec8f457dd8c447365464e0bba6637bd20a3
              • Opcode Fuzzy Hash: cf7edc20a8d86aac6692b3ea996543ee044e701bda3edebf2db628c322e8d0c4
              • Instruction Fuzzy Hash: 67410371A20301BBEB14BB70DC47FBF776CDF46710F14006AF904A61C3EA70AA218AA5
              APIs
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 001E28BC
              • GetSystemMetrics.USER32(00000007), ref: 001E28C4
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 001E28EF
              • GetSystemMetrics.USER32(00000008), ref: 001E28F7
              • GetSystemMetrics.USER32(00000004), ref: 001E291C
              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 001E2939
              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 001E2949
              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 001E297C
              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 001E2990
              • GetClientRect.USER32(00000000,000000FF), ref: 001E29AE
              • GetStockObject.GDI32(00000011), ref: 001E29CA
              • SendMessageW.USER32(00000000,00000030,00000000), ref: 001E29D5
                • Part of subcall function 001E2344: GetCursorPos.USER32(?), ref: 001E2357
                • Part of subcall function 001E2344: ScreenToClient.USER32(002A57B0,?), ref: 001E2374
                • Part of subcall function 001E2344: GetAsyncKeyState.USER32(00000001), ref: 001E2399
                • Part of subcall function 001E2344: GetAsyncKeyState.USER32(00000002), ref: 001E23A7
              • SetTimer.USER32(00000000,00000000,00000028,001E1256), ref: 001E29FC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
              • String ID: AutoIt v3 GUI
              • API String ID: 1458621304-248962490
              • Opcode ID: d842a3963da97d19de6ac814bcd1f8418731ad456486442a7edd0ddc23c62d18
              • Instruction ID: 4cbc1f230df0cb347f5c915559ba2e6b1364e524aab3767f677796bff20b711b
              • Opcode Fuzzy Hash: d842a3963da97d19de6ac814bcd1f8418731ad456486442a7edd0ddc23c62d18
              • Instruction Fuzzy Hash: B4B1907165064AEFDF14DFA9ED59BEE7BB8FB08310F108129FA16A7290CB749850CB50
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
              • DragQueryPoint.SHELL32(?,?), ref: 0026C627
                • Part of subcall function 0026AB37: ClientToScreen.USER32(?,?), ref: 0026AB60
                • Part of subcall function 0026AB37: GetWindowRect.USER32(?,?), ref: 0026ABD6
                • Part of subcall function 0026AB37: PtInRect.USER32(?,?,0026C014), ref: 0026ABE6
              • SendMessageW.USER32(?,000000B0,?,?), ref: 0026C690
              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0026C69B
              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0026C6BE
              • _wcscat.LIBCMT ref: 0026C6EE
              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0026C705
              • SendMessageW.USER32(?,000000B0,?,?), ref: 0026C71E
              • SendMessageW.USER32(?,000000B1,?,?), ref: 0026C735
              • SendMessageW.USER32(?,000000B1,?,?), ref: 0026C757
              • DragFinish.SHELL32(?), ref: 0026C75E
              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0026C851
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pb*$xM
              • API String ID: 169749273-1898325468
              • Opcode ID: 037085138584c373e12167c5d656b7d501ddacf2add3846e13c39b7636104e01
              • Instruction ID: 816b1b1d7861fb30f035a4913d6188b352d94caf084c03443cb914dba95d06c9
              • Opcode Fuzzy Hash: 037085138584c373e12167c5d656b7d501ddacf2add3846e13c39b7636104e01
              • Instruction Fuzzy Hash: 97617971108340AFCB01EF64DC89DAFBBE8FF99710F00492EF5A5921A1DB709A58CB52
              APIs
              • GetClassNameW.USER32(?,?,00000100), ref: 0023A47A
              • __swprintf.LIBCMT ref: 0023A51B
              • _wcscmp.LIBCMT ref: 0023A52E
              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0023A583
              • _wcscmp.LIBCMT ref: 0023A5BF
              • GetClassNameW.USER32(?,?,00000400), ref: 0023A5F6
              • GetDlgCtrlID.USER32(?), ref: 0023A648
              • GetWindowRect.USER32(?,?), ref: 0023A67E
              • GetParent.USER32(?), ref: 0023A69C
              • ScreenToClient.USER32(00000000), ref: 0023A6A3
              • GetClassNameW.USER32(?,?,00000100), ref: 0023A71D
              • _wcscmp.LIBCMT ref: 0023A731
              • GetWindowTextW.USER32(?,?,00000400), ref: 0023A757
              • _wcscmp.LIBCMT ref: 0023A76B
                • Part of subcall function 0020362C: _iswctype.LIBCMT ref: 00203634
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
              • String ID: %s%u
              • API String ID: 3744389584-679674701
              • Opcode ID: 0385e2bc4422699115db592883b55941bfc082a9154b2cd12fff9f4c72bbf201
              • Instruction ID: a2880c7d2fb35074fc942368ab225d6373d07a32ccdee0fbda26d1e151824f97
              • Opcode Fuzzy Hash: 0385e2bc4422699115db592883b55941bfc082a9154b2cd12fff9f4c72bbf201
              • Instruction Fuzzy Hash: D3A1A2B1224707ABDB15DF64C888BAAF7E8FF44314F008529F9D9D2191DB30E965CB92
              APIs
              • GetClassNameW.USER32(00000008,?,00000400), ref: 0023AF18
              • _wcscmp.LIBCMT ref: 0023AF29
              • GetWindowTextW.USER32(00000001,?,00000400), ref: 0023AF51
              • CharUpperBuffW.USER32(?,00000000), ref: 0023AF6E
              • _wcscmp.LIBCMT ref: 0023AF8C
              • _wcsstr.LIBCMT ref: 0023AF9D
              • GetClassNameW.USER32(00000018,?,00000400), ref: 0023AFD5
              • _wcscmp.LIBCMT ref: 0023AFE5
              • GetWindowTextW.USER32(00000002,?,00000400), ref: 0023B00C
              • GetClassNameW.USER32(00000018,?,00000400), ref: 0023B055
              • _wcscmp.LIBCMT ref: 0023B065
              • GetClassNameW.USER32(00000010,?,00000400), ref: 0023B08D
              • GetWindowRect.USER32(00000004,?), ref: 0023B0F6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
              • String ID: @$ThumbnailClass
              • API String ID: 1788623398-1539354611
              • Opcode ID: 898633851eec4a4b8384ced3346aa5925566924053bf8827e5d53d0b186548f6
              • Instruction ID: a87401565a4c2689d08d690177e91fc036b01405a40f516d7698b1ee9e089efc
              • Opcode Fuzzy Hash: 898633851eec4a4b8384ced3346aa5925566924053bf8827e5d53d0b186548f6
              • Instruction Fuzzy Hash: 0F81B3B11283069FDB05DF10D885FAA7BE8FF54314F048469FE899A092DB30DD55CBA1
              APIs
              • _memset.LIBCMT ref: 0026A259
              • DestroyWindow.USER32(?,?), ref: 0026A2D3
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0026A34D
              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0026A36F
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0026A382
              • DestroyWindow.USER32(00000000), ref: 0026A3A4
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,001E0000,00000000), ref: 0026A3DB
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0026A3F4
              • GetDesktopWindow.USER32 ref: 0026A40D
              • GetWindowRect.USER32(00000000), ref: 0026A414
              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0026A42C
              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0026A444
                • Part of subcall function 001E25DB: GetWindowLongW.USER32(?,000000EB), ref: 001E25EC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
              • String ID: 0$tooltips_class32$xM
              • API String ID: 1297703922-2934765289
              • Opcode ID: 91c34e226a55ccff8f13619ecfaa5859bda5cd4ae71915205c4ffd004b42a68d
              • Instruction ID: 3823bd6c6e8cf63641da05922f3d914091c10b86aaf45b199ae9c5e1c2713296
              • Opcode Fuzzy Hash: 91c34e226a55ccff8f13619ecfaa5859bda5cd4ae71915205c4ffd004b42a68d
              • Instruction Fuzzy Hash: 9571CD70150205AFDB21CF28DC48F6A7BE9FB89700F04452CF995972A1DBB5E9A2CF52
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __wcsnicmp
              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
              • API String ID: 1038674560-1810252412
              • Opcode ID: 81c8b8b38f43dba2ad367e3e19f1418a7852f7624f49158342d1d4ce8c4c7b24
              • Instruction ID: f9054a9ca40e97da1ef1a83824a6054ee4f348ca63ab465708f41bc8c52000ee
              • Opcode Fuzzy Hash: 81c8b8b38f43dba2ad367e3e19f1418a7852f7624f49158342d1d4ce8c4c7b24
              • Instruction Fuzzy Hash: E231B471A7860AA7EF14FB51DD03EEE7764AF21B11F20042AF442710E2EF616F24CA56
              APIs
              • LoadCursorW.USER32(00000000,00007F8A), ref: 00255013
              • LoadCursorW.USER32(00000000,00007F00), ref: 0025501E
              • LoadCursorW.USER32(00000000,00007F03), ref: 00255029
              • LoadCursorW.USER32(00000000,00007F8B), ref: 00255034
              • LoadCursorW.USER32(00000000,00007F01), ref: 0025503F
              • LoadCursorW.USER32(00000000,00007F81), ref: 0025504A
              • LoadCursorW.USER32(00000000,00007F88), ref: 00255055
              • LoadCursorW.USER32(00000000,00007F80), ref: 00255060
              • LoadCursorW.USER32(00000000,00007F86), ref: 0025506B
              • LoadCursorW.USER32(00000000,00007F83), ref: 00255076
              • LoadCursorW.USER32(00000000,00007F85), ref: 00255081
              • LoadCursorW.USER32(00000000,00007F82), ref: 0025508C
              • LoadCursorW.USER32(00000000,00007F84), ref: 00255097
              • LoadCursorW.USER32(00000000,00007F04), ref: 002550A2
              • LoadCursorW.USER32(00000000,00007F02), ref: 002550AD
              • LoadCursorW.USER32(00000000,00007F89), ref: 002550B8
              • GetCursorInfo.USER32(?), ref: 002550C8
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Cursor$Load$Info
              • String ID:
              • API String ID: 2577412497-0
              • Opcode ID: 68d23da7e7b6bd9319f85d51e2344e32e0e161f2809c03a5bc277dafa40a30d6
              • Instruction ID: 067ac943ae4582976571e2420171d4f29b8b363deb17de6d34b97ffb8697424b
              • Opcode Fuzzy Hash: 68d23da7e7b6bd9319f85d51e2344e32e0e161f2809c03a5bc277dafa40a30d6
              • Instruction Fuzzy Hash: 3A3133B1D1871E6ADF109FB68C8996FBFE8FF08750F50452AE50CE7280DA78A5048F95
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 00264424
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0026446F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: BuffCharMessageSendUpper
              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
              • API String ID: 3974292440-4258414348
              • Opcode ID: abbfa6dca8b70bd87b24fe16fb92754a13dc9660b85a3d6e7021da4a5d18aaef
              • Instruction ID: 8fc91d11d2232cfb623373f3b3bc062a3c75c694baff0f7987f0f95c47affc55
              • Opcode Fuzzy Hash: abbfa6dca8b70bd87b24fe16fb92754a13dc9660b85a3d6e7021da4a5d18aaef
              • Instruction Fuzzy Hash: 81917F702247419FCB04EF14C451A6EB7E5AFA5354F44886CF8D65B3A2CB70EDA9CB81
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0026C1FC
              • GetFocus.USER32 ref: 0026C20C
              • GetDlgCtrlID.USER32(00000000), ref: 0026C217
              • _memset.LIBCMT ref: 0026C342
              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0026C36D
              • GetMenuItemCount.USER32(?), ref: 0026C38D
              • GetMenuItemID.USER32(?,00000000), ref: 0026C3A0
              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0026C3D4
              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0026C41C
              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0026C454
              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0026C489
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
              • String ID: 0$xM
              • API String ID: 1296962147-2111700025
              • Opcode ID: 050532b2686fbba8d360fe1335913c731ddb04d9106469842456e0deea535dc4
              • Instruction ID: 84c7cb88ea9f079ae613991f5f71d0c9484b649c3cfcd7802b8ee111acb6cb40
              • Opcode Fuzzy Hash: 050532b2686fbba8d360fe1335913c731ddb04d9106469842456e0deea535dc4
              • Instruction Fuzzy Hash: FF81A1702193529FDB10EF14D894A7BBBE8FF88714F20452EF99597291CB70D8A4CB52
              APIs
              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0026B8B4
              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,002691C2), ref: 0026B910
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0026B949
              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0026B98C
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0026B9C3
              • FreeLibrary.KERNEL32(?), ref: 0026B9CF
              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0026B9DF
              • DestroyIcon.USER32(?,?,?,?,?,002691C2), ref: 0026B9EE
              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0026BA0B
              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0026BA17
                • Part of subcall function 00202EFD: __wcsicmp_l.LIBCMT ref: 00202F86
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
              • String ID: .dll$.exe$.icl
              • API String ID: 1212759294-1154884017
              • Opcode ID: caa790e6e455ffba3e4f58f87e20101ec97036caebd297d47356001be0b9dffc
              • Instruction ID: 5f7620332c39614a736a4343c265c37aee500e372c8d0cf602b692c86c6a17bf
              • Opcode Fuzzy Hash: caa790e6e455ffba3e4f58f87e20101ec97036caebd297d47356001be0b9dffc
              • Instruction Fuzzy Hash: 1F61FE71960209BAEB15DF64DC45FBE7BACFB08710F10811AFA11D60D1DBB4A9E0DBA0
              APIs
                • Part of subcall function 001E1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,001E2036,?,00000000,?,?,?,?,001E16CB,00000000,?), ref: 001E1B9A
              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 001E20D3
              • KillTimer.USER32(-00000001,?,?,?,?,001E16CB,00000000,?,?,001E1AE2,?,?), ref: 001E216E
              • DestroyAcceleratorTable.USER32(00000000), ref: 0021BCA6
              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,001E16CB,00000000,?,?,001E1AE2,?,?), ref: 0021BCD7
              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,001E16CB,00000000,?,?,001E1AE2,?,?), ref: 0021BCEE
              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,001E16CB,00000000,?,?,001E1AE2,?,?), ref: 0021BD0A
              • DeleteObject.GDI32(00000000), ref: 0021BD1C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
              • String ID: xM
              • API String ID: 641708696-315438632
              • Opcode ID: 7613b89c35ccc5913ef1ba129dff14f893c13419a700803bf8627110db24beb3
              • Instruction ID: e7270c2ed174fd63049f6a031d0f08bf523d8d732dc219a5d13502a2bd82a495
              • Opcode Fuzzy Hash: 7613b89c35ccc5913ef1ba129dff14f893c13419a700803bf8627110db24beb3
              • Instruction Fuzzy Hash: 78618B31110E61DFCB3A9F16E95CB2AB7F5FB51312F108529E5429A9B0CBB4A8D0DF90
              APIs
              • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00249C7F
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00249CA0
              • __swprintf.LIBCMT ref: 00249CF9
              • __swprintf.LIBCMT ref: 00249D12
              • _wprintf.LIBCMT ref: 00249DB9
              • _wprintf.LIBCMT ref: 00249DD7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: LoadString__swprintf_wprintf$_memmove
              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
              • API String ID: 311963372-3080491070
              • Opcode ID: 051f7642b75524940e86f84f73e1348b1829a143ff9860615486cc3a1060e467
              • Instruction ID: 7cbedf3dc04b00ba8e65c7fdae4d1a5ad3c68ff48c375b8dc515ee15827f4f83
              • Opcode Fuzzy Hash: 051f7642b75524940e86f84f73e1348b1829a143ff9860615486cc3a1060e467
              • Instruction Fuzzy Hash: 1E518131D10A4AAADF14FBE1DD46EEEB778AF25304F500065F505720A2DB312F68CB61
              APIs
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
              • CharLowerBuffW.USER32(?,?), ref: 0024A3CB
              • GetDriveTypeW.KERNEL32 ref: 0024A418
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0024A460
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0024A497
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0024A4C5
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
              • API String ID: 2698844021-4113822522
              • Opcode ID: 952213f31321911c4550e12207cfcc53dffdedc7055eac624ca05f2a10cfb3ac
              • Instruction ID: 685dfd2146c4a7aea8f4e4d8aa870b5f79c2c9efc8979f87e3114cfdc3aaf266
              • Opcode Fuzzy Hash: 952213f31321911c4550e12207cfcc53dffdedc7055eac624ca05f2a10cfb3ac
              • Instruction Fuzzy Hash: DC519D711147459FD704EF11C88186EB3E8EFA5718F04886DF88A972A1DB31EE09CB42
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0021E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0023F8DF
              • LoadStringW.USER32(00000000,?,0021E029,00000001), ref: 0023F8E8
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0021E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0023F90A
              • LoadStringW.USER32(00000000,?,0021E029,00000001), ref: 0023F90D
              • __swprintf.LIBCMT ref: 0023F95D
              • __swprintf.LIBCMT ref: 0023F96E
              • _wprintf.LIBCMT ref: 0023FA17
              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0023FA2E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
              • API String ID: 984253442-2268648507
              • Opcode ID: a735a866588088148e67fe048d622a7c047e50b5fbfd4e11e553e21dd4e2b7c1
              • Instruction ID: 9b1af016ca7e244a56ea00591f24311fd3dd691b03df5910cf496533eaf4603d
              • Opcode Fuzzy Hash: a735a866588088148e67fe048d622a7c047e50b5fbfd4e11e553e21dd4e2b7c1
              • Instruction Fuzzy Hash: 39413B72804649AADF04FBE1DE86EEE777CAF25304F100065F506B60A2EB316F19CB61
              APIs
                • Part of subcall function 001E25DB: GetWindowLongW.USER32(?,000000EB), ref: 001E25EC
              • GetSysColor.USER32(0000000F), ref: 001E21D3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ColorLongWindow
              • String ID: xM
              • API String ID: 259745315-315438632
              • Opcode ID: 2f14fdebda471dcd08550ee8110af2776418f7b53080d86ae92b5dbd2b9b962f
              • Instruction ID: 039cd2673a5bb67ea8a3b4ab8378870d014dc73ee7aeebe6bde50b72c9960cc9
              • Opcode Fuzzy Hash: 2f14fdebda471dcd08550ee8110af2776418f7b53080d86ae92b5dbd2b9b962f
              • Instruction Fuzzy Hash: 5C4192310009919BDF255F29EC98BBD3BA9EB16731F248265FE658A1E1C7718C82DB21
              APIs
              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00269207,?,?), ref: 0026BA56
              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00269207,?,?,00000000,?), ref: 0026BA6D
              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00269207,?,?,00000000,?), ref: 0026BA78
              • CloseHandle.KERNEL32(00000000,?,?,?,?,00269207,?,?,00000000,?), ref: 0026BA85
              • GlobalLock.KERNEL32(00000000), ref: 0026BA8E
              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00269207,?,?,00000000,?), ref: 0026BA9D
              • GlobalUnlock.KERNEL32(00000000), ref: 0026BAA6
              • CloseHandle.KERNEL32(00000000,?,?,?,?,00269207,?,?,00000000,?), ref: 0026BAAD
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00269207,?,?,00000000,?), ref: 0026BABE
              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00272CAC,?), ref: 0026BAD7
              • GlobalFree.KERNEL32(00000000), ref: 0026BAE7
              • GetObjectW.GDI32(00000000,00000018,?), ref: 0026BB0B
              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0026BB36
              • DeleteObject.GDI32(00000000), ref: 0026BB5E
              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0026BB74
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
              • String ID:
              • API String ID: 3840717409-0
              • Opcode ID: 21f829864f9315d4fe045ddab865f73b655375c83e4784546bf6cae489145e09
              • Instruction ID: 9c4e79d1aef4d42f1e818a1b95a60141cbc18e2b1c107891890fd679e1bef6d8
              • Opcode Fuzzy Hash: 21f829864f9315d4fe045ddab865f73b655375c83e4784546bf6cae489145e09
              • Instruction Fuzzy Hash: 53414A75600205EFDB119FA5ED8CEAA7BB8FF89711F108068F909D7260D7B09D91CB60
              APIs
              • __wsplitpath.LIBCMT ref: 0024DA10
              • _wcscat.LIBCMT ref: 0024DA28
              • _wcscat.LIBCMT ref: 0024DA3A
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0024DA4F
              • SetCurrentDirectoryW.KERNEL32(?), ref: 0024DA63
              • GetFileAttributesW.KERNEL32(?), ref: 0024DA7B
              • SetFileAttributesW.KERNEL32(?,00000000), ref: 0024DA95
              • SetCurrentDirectoryW.KERNEL32(?), ref: 0024DAA7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
              • String ID: *.*
              • API String ID: 34673085-438819550
              • Opcode ID: d65cbf5f06db015883eba659d1c4e266ed6ef25fbd0d9e5cac223644974745ce
              • Instruction ID: b5852887170408af33dff12cd3175d8356f11fb83200ed7e59335e1b0a7ac143
              • Opcode Fuzzy Hash: d65cbf5f06db015883eba659d1c4e266ed6ef25fbd0d9e5cac223644974745ce
              • Instruction Fuzzy Hash: 3F81A2725243419FCB68EF64C844A6EB7E4BF89314F18882EF889CB251E770DD55CB52
              APIs
              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00266FA5
              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00266FA8
              • GetWindowLongW.USER32(?,000000F0), ref: 00266FCC
              • _memset.LIBCMT ref: 00266FDD
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00266FEF
              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00267067
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$LongWindow_memset
              • String ID: xM
              • API String ID: 830647256-315438632
              • Opcode ID: a89a9971e799ff5cb5b1ce38c851b26c46ebd372d2e96d79721a6962cab21b0a
              • Instruction ID: 812664141a4b774a13b9cae53f5b63e7c3c36d55214f8564b6ffe0359dbc18e7
              • Opcode Fuzzy Hash: a89a9971e799ff5cb5b1ce38c851b26c46ebd372d2e96d79721a6962cab21b0a
              • Instruction Fuzzy Hash: A861AE70910218AFDB10DFA4DC85EEE77F8EB09704F10019AFA15AB2A1C771AD95CF60
              APIs
              • GetDC.USER32(00000000), ref: 0025738F
              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0025739B
              • CreateCompatibleDC.GDI32(?), ref: 002573A7
              • SelectObject.GDI32(00000000,?), ref: 002573B4
              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00257408
              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00257444
              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00257468
              • SelectObject.GDI32(00000006,?), ref: 00257470
              • DeleteObject.GDI32(?), ref: 00257479
              • DeleteDC.GDI32(00000006), ref: 00257480
              • ReleaseDC.USER32(00000000,?), ref: 0025748B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
              • String ID: (
              • API String ID: 2598888154-3887548279
              • Opcode ID: b1810451dea7670d2ccdd023b7c84ec1ffa398327185f5b748fc0dc564a518de
              • Instruction ID: 678f396b71f3d1f4c92455d984fda71fe0360302ba2b87dc83626f4ac9c76350
              • Opcode Fuzzy Hash: b1810451dea7670d2ccdd023b7c84ec1ffa398327185f5b748fc0dc564a518de
              • Instruction Fuzzy Hash: E9515971914309EFCB14CFA8EC88EAEBBB9EF48310F14842DF95997211D771A854CB50
              APIs
              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0025FDAD,?,?), ref: 00260E31
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU$r
              • API String ID: 3964851224-3410716189
              • Opcode ID: 1e654cfab64368aaf0223e09ba2a86ebd0054049fc54c64bb79dce3dedfc00b0
              • Instruction ID: f9788de5aed2d81680e814213b342b594ad5b537f3e656243e2483c729bb37a1
              • Opcode Fuzzy Hash: 1e654cfab64368aaf0223e09ba2a86ebd0054049fc54c64bb79dce3dedfc00b0
              • Instruction Fuzzy Hash: 78417E3123038A8BDF21EF14D895AEF3764AF25314F140418FC951B692DB709EBADBA0
              APIs
                • Part of subcall function 00200957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,001E6B0C,?,00008000), ref: 00200973
                • Part of subcall function 001E4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001E4743,?,?,001E37AE,?), ref: 001E4770
              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 001E6BAD
              • SetCurrentDirectoryW.KERNEL32(?), ref: 001E6CFA
                • Part of subcall function 001E586D: _wcscpy.LIBCMT ref: 001E58A5
                • Part of subcall function 0020363D: _iswctype.LIBCMT ref: 00203645
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
              • API String ID: 537147316-1018226102
              • Opcode ID: acd23acdb022e6600a9468de43e1ac4dec652f0441fdbe2d59d09dfa0abdb640
              • Instruction ID: 238c38a08caf878ab8498219dac86f7995f777372fac701514e933aa96047a7b
              • Opcode Fuzzy Hash: acd23acdb022e6600a9468de43e1ac4dec652f0441fdbe2d59d09dfa0abdb640
              • Instruction Fuzzy Hash: E202C1301187819FCB14EF21C8819AFBBE5FFA9354F54481DF485972A2DB30D999CB52
              APIs
              • _memset.LIBCMT ref: 00242D50
              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00242DDD
              • GetMenuItemCount.USER32(002A5890), ref: 00242E66
              • DeleteMenu.USER32(002A5890,00000005,00000000,000000F5,?,?), ref: 00242EF6
              • DeleteMenu.USER32(002A5890,00000004,00000000), ref: 00242EFE
              • DeleteMenu.USER32(002A5890,00000006,00000000), ref: 00242F06
              • DeleteMenu.USER32(002A5890,00000003,00000000), ref: 00242F0E
              • GetMenuItemCount.USER32(002A5890), ref: 00242F16
              • SetMenuItemInfoW.USER32(002A5890,00000004,00000000,00000030), ref: 00242F4C
              • GetCursorPos.USER32(?), ref: 00242F56
              • SetForegroundWindow.USER32(00000000), ref: 00242F5F
              • TrackPopupMenuEx.USER32(002A5890,00000000,?,00000000,00000000,00000000), ref: 00242F72
              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00242F7E
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
              • String ID:
              • API String ID: 3993528054-0
              • Opcode ID: a9552f55f4829352e550ea8859a5a952c6b64d89d49961522462e1a797bbf097
              • Instruction ID: d00101818aa74e19f3dbf23fa55b69d30bca075436fe7b083aadd9337f1b4a54
              • Opcode Fuzzy Hash: a9552f55f4829352e550ea8859a5a952c6b64d89d49961522462e1a797bbf097
              • Instruction Fuzzy Hash: 9E71E770610216FBEB298F56EC49FAABF64FF04314F904216F615AA1E1C7B16C78DB50
              APIs
              • VariantInit.OLEAUT32(?), ref: 002588D7
              • CoInitialize.OLE32(00000000), ref: 00258904
              • CoUninitialize.OLE32 ref: 0025890E
              • GetRunningObjectTable.OLE32(00000000,?), ref: 00258A0E
              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00258B3B
              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00272C0C), ref: 00258B6F
              • CoGetObject.OLE32(?,00000000,00272C0C,?), ref: 00258B92
              • SetErrorMode.KERNEL32(00000000), ref: 00258BA5
              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00258C25
              • VariantClear.OLEAUT32(?), ref: 00258C35
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
              • String ID: ,,'
              • API String ID: 2395222682-1378728019
              • Opcode ID: 44bcd26d818095cb5a144a6491160efeed0543c6d5fac97ed66b3f630a894c37
              • Instruction ID: 0e08ab589463a09d657b75b6b1823fc0972e6f8f951cca4e32bd8c2a22e49c2e
              • Opcode Fuzzy Hash: 44bcd26d818095cb5a144a6491160efeed0543c6d5fac97ed66b3f630a894c37
              • Instruction Fuzzy Hash: D3C125B1218305AFD700DF24C88492AB7E9FF89349F00496DF989DB251DBB1ED19CB52
              APIs
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
              • _memset.LIBCMT ref: 0023786B
              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 002378A0
              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 002378BC
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 002378D8
              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00237902
              • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0023792A
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00237935
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0023793A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
              • API String ID: 1411258926-22481851
              • Opcode ID: 2ddb3ad72bafaa0058e2cec90acf96139cd551b3a83b073fa05f1683559c0c67
              • Instruction ID: 141f94716f15096f826c58be957e6c7e178441a5b291ffcac6f928218e890272
              • Opcode Fuzzy Hash: 2ddb3ad72bafaa0058e2cec90acf96139cd551b3a83b073fa05f1683559c0c67
              • Instruction Fuzzy Hash: 6A4138B2C2462DABDF21EFA5EC85DEDB778BF14350F004029E905A31A1DB709D14CB90
              APIs
              • _memset.LIBCMT ref: 0026716A
              • CreateMenu.USER32 ref: 00267185
              • SetMenu.USER32(?,00000000), ref: 00267194
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00267221
              • IsMenu.USER32(?), ref: 00267237
              • CreatePopupMenu.USER32 ref: 00267241
              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0026726E
              • DrawMenuBar.USER32 ref: 00267276
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
              • String ID: 0$F$xM
              • API String ID: 176399719-3658317446
              • Opcode ID: 9044f9d857ae6779d834248536a7c6f740d952c23cc6637de5db0a75965ecc64
              • Instruction ID: 07fefa61f2790fabb8f40900bb40c532feba1e3b7e33c65cf3f18bca1e8f874f
              • Opcode Fuzzy Hash: 9044f9d857ae6779d834248536a7c6f740d952c23cc6637de5db0a75965ecc64
              • Instruction Fuzzy Hash: B6417674A21209EFDB20DF64E998E9ABBB5FF09310F144029FD06A7360D771AD64CB90
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0021E2A0,00000010,?,Bad directive syntax error,0026F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0023F7C2
              • LoadStringW.USER32(00000000,?,0021E2A0,00000010), ref: 0023F7C9
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
              • _wprintf.LIBCMT ref: 0023F7FC
              • __swprintf.LIBCMT ref: 0023F81E
              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0023F88D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
              • API String ID: 1506413516-4153970271
              • Opcode ID: 7c784637671a99b2d8202be7a7962bd8520c5128f03a3b4d92055d22e48c2582
              • Instruction ID: 67eef665e496adb6c0bbddf16633d7b12ee3269c30cb17b16f355bbffeefa8bb
              • Opcode Fuzzy Hash: 7c784637671a99b2d8202be7a7962bd8520c5128f03a3b4d92055d22e48c2582
              • Instruction Fuzzy Hash: C1219131D2025AFBDF15EF90DD0AEEE7739BF25300F040466F515660A2EB719628CB51
              APIs
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
                • Part of subcall function 001E7924: _memmove.LIBCMT ref: 001E79AD
              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00245330
              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00245346
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00245357
              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00245369
              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0024537A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: SendString$_memmove
              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
              • API String ID: 2279737902-1007645807
              • Opcode ID: a7e86f519ce7f15c90b360892024f5d4f357d3f3caa064fcb15d79a39c5ae478
              • Instruction ID: 3be8d1dea076339fec9c054921a0c6ccc83b418f0656e697823713a585ee6eed
              • Opcode Fuzzy Hash: a7e86f519ce7f15c90b360892024f5d4f357d3f3caa064fcb15d79a39c5ae478
              • Instruction Fuzzy Hash: 0511B62196056A7AEB24BBA2DC49DFFBB7CEFA3B44F040469B401920D2DFA00D15C561
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
              • String ID: 0.0.0.0
              • API String ID: 208665112-3771769585
              • Opcode ID: 4a060ccaa4cb4c583c1e4fbcbd8cd52560e4b29a17efe46ff1b3626daecd7643
              • Instruction ID: 09479fb63b44314cca11376115ec87f11bdbdb38914329288e533a5569258755
              • Opcode Fuzzy Hash: 4a060ccaa4cb4c583c1e4fbcbd8cd52560e4b29a17efe46ff1b3626daecd7643
              • Instruction Fuzzy Hash: D011D531524215AFDB19BB30AC4AFEAB7BCEB42711F0441B6F54596092EFB09DA28A50
              APIs
              • timeGetTime.WINMM ref: 00244F7A
                • Part of subcall function 0020049F: timeGetTime.WINMM(?,7694B400,001F0E7B), ref: 002004A3
              • Sleep.KERNEL32(0000000A), ref: 00244FA6
              • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00244FCA
              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00244FEC
              • SetActiveWindow.USER32 ref: 0024500B
              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00245019
              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00245038
              • Sleep.KERNEL32(000000FA), ref: 00245043
              • IsWindow.USER32 ref: 0024504F
              • EndDialog.USER32(00000000), ref: 00245060
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
              • String ID: BUTTON
              • API String ID: 1194449130-3405671355
              • Opcode ID: 6766e1959195b3150e260f6e4658166d50979082156f733e50560bbc7f54fb96
              • Instruction ID: ee87020a7d40caef4788946c23efbb9de3e94c2201b789cf4e57a1b306d507dd
              • Opcode Fuzzy Hash: 6766e1959195b3150e260f6e4658166d50979082156f733e50560bbc7f54fb96
              • Instruction Fuzzy Hash: E321F374614602BFEB146F30FD8CB263BADEB0A745F496024F502811F1CFB18D28CA61
              APIs
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
              • CoInitialize.OLE32(00000000), ref: 0024D5EA
              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0024D67D
              • SHGetDesktopFolder.SHELL32(?), ref: 0024D691
              • CoCreateInstance.OLE32(00272D7C,00000000,00000001,00298C1C,?), ref: 0024D6DD
              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0024D74C
              • CoTaskMemFree.OLE32(?,?), ref: 0024D7A4
              • _memset.LIBCMT ref: 0024D7E1
              • SHBrowseForFolderW.SHELL32(?), ref: 0024D81D
              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0024D840
              • CoTaskMemFree.OLE32(00000000), ref: 0024D847
              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0024D87E
              • CoUninitialize.OLE32(00000001,00000000), ref: 0024D880
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
              • String ID:
              • API String ID: 1246142700-0
              • Opcode ID: 27f95234a447ab0c32728f76f84e6002e6233c1c80a2ba437ad5ab6b0cd7ed40
              • Instruction ID: 4e7113d020bdec1744ce5e806be6aa71c13e0aaf1966e0de0b685495762dd218
              • Opcode Fuzzy Hash: 27f95234a447ab0c32728f76f84e6002e6233c1c80a2ba437ad5ab6b0cd7ed40
              • Instruction Fuzzy Hash: 9FB10B75A10109AFDB04DFA4D888DAEBBB9FF48314F1484A9F909EB261DB70ED41CB50
              APIs
              • GetDlgItem.USER32(?,00000001), ref: 0023C283
              • GetWindowRect.USER32(00000000,?), ref: 0023C295
              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0023C2F3
              • GetDlgItem.USER32(?,00000002), ref: 0023C2FE
              • GetWindowRect.USER32(00000000,?), ref: 0023C310
              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0023C364
              • GetDlgItem.USER32(?,000003E9), ref: 0023C372
              • GetWindowRect.USER32(00000000,?), ref: 0023C383
              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0023C3C6
              • GetDlgItem.USER32(?,000003EA), ref: 0023C3D4
              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0023C3F1
              • InvalidateRect.USER32(?,00000000,00000001), ref: 0023C3FE
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$ItemMoveRect$Invalidate
              • String ID:
              • API String ID: 3096461208-0
              • Opcode ID: b14332c0d41a6d19ca5799ece0988cf97fedd5723823ed93cd1409f68b193e63
              • Instruction ID: 646000834f0e2e0b1bf72c8450c6a5a3abb44f865a004668874218867b075c58
              • Opcode Fuzzy Hash: b14332c0d41a6d19ca5799ece0988cf97fedd5723823ed93cd1409f68b193e63
              • Instruction Fuzzy Hash: CC5132B1B10205AFDF18CFA9ED89A6EBBB9FB88710F14812DF515E7290D7B09D008B10
              APIs
              • CharLowerBuffW.USER32(?,?,0026F910), ref: 0024A90B
              • GetDriveTypeW.KERNEL32(00000061,002989A0,00000061), ref: 0024A9D5
              • _wcscpy.LIBCMT ref: 0024A9FF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: BuffCharDriveLowerType_wcscpy
              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
              • API String ID: 2820617543-1000479233
              • Opcode ID: 9600dc4155cb35d3ce3421a9bbe4883101595d3087f5e146ed57e5458698303b
              • Instruction ID: 8feb956233123b34c31906ab02a1c9f1b7f71b76bbc3d151e391de0b63a2cdd5
              • Opcode Fuzzy Hash: 9600dc4155cb35d3ce3421a9bbe4883101595d3087f5e146ed57e5458698303b
              • Instruction Fuzzy Hash: 7751DF311683419BCB08EF14C892AAFB7A9FF95304F04482DF596972E2DB709D28CA43
              APIs
              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 002686FF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: InvalidateRect
              • String ID: xM
              • API String ID: 634782764-315438632
              • Opcode ID: 4c070ddd4b61a815027029a35697debcf169018fdfd2838862a34fa6ea77c80a
              • Instruction ID: 1697b98d13146c12d919b20f0b75139b8a53c4c9813ad9d365d851bf3aa5206e
              • Opcode Fuzzy Hash: 4c070ddd4b61a815027029a35697debcf169018fdfd2838862a34fa6ea77c80a
              • Instruction Fuzzy Hash: B2519F34520249BFEF219F24DC89FAD7BA8AB05710F604311FA11E61A0CFB1A9E0CB51
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __i64tow__itow__swprintf
              • String ID: %.15g$0x%p$False$True
              • API String ID: 421087845-2263619337
              • Opcode ID: 53189454b63bc4d3672665255e5acb20d246ba84daabbf9012288aacbc32b4df
              • Instruction ID: 663e12738af4531fc53751635873e2550f465deea8efed411ca9d7ac7ab80085
              • Opcode Fuzzy Hash: 53189454b63bc4d3672665255e5acb20d246ba84daabbf9012288aacbc32b4df
              • Instruction Fuzzy Hash: B941E471520709AFEB28DF35D942EBA73E9FF06300F60447EE559DB292EB3199518B10
              APIs
              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0026755E
              • CreateCompatibleDC.GDI32(00000000), ref: 00267565
              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00267578
              • SelectObject.GDI32(00000000,00000000), ref: 00267580
              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0026758B
              • DeleteDC.GDI32(00000000), ref: 00267594
              • GetWindowLongW.USER32(?,000000EC), ref: 0026759E
              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 002675B2
              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 002675BE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
              • String ID: static
              • API String ID: 2559357485-2160076837
              • Opcode ID: 5d903a7d29e764d8b270f43721ea382ef6cde4ffd75120d3885e06a3dba7d69d
              • Instruction ID: 3efab344b5ea8ac387bcbcba25d852aa07f996ce4f8a83dee7fe271323b6e77c
              • Opcode Fuzzy Hash: 5d903a7d29e764d8b270f43721ea382ef6cde4ffd75120d3885e06a3dba7d69d
              • Instruction Fuzzy Hash: 82319E72114215BBDF129F64FC08FDB3B69FF09364F114224FA26A20A0D771D861DBA0
              APIs
              • _memset.LIBCMT ref: 00206E3E
                • Part of subcall function 00208B28: __getptd_noexit.LIBCMT ref: 00208B28
              • __gmtime64_s.LIBCMT ref: 00206ED7
              • __gmtime64_s.LIBCMT ref: 00206F0D
              • __gmtime64_s.LIBCMT ref: 00206F2A
              • __allrem.LIBCMT ref: 00206F80
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00206F9C
              • __allrem.LIBCMT ref: 00206FB3
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00206FD1
              • __allrem.LIBCMT ref: 00206FE8
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00207006
              • __invoke_watson.LIBCMT ref: 00207077
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
              • String ID:
              • API String ID: 384356119-0
              • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
              • Instruction ID: 0f1932e1ff91646f114b9b2357fb6644148ffa4d5f83f51e1fea19108df00581
              • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
              • Instruction Fuzzy Hash: 8F7117B2E10717ABD714EE68DC85BAAB3E9AF14320F144229F514D72C2E770ED708B90
              APIs
              • _memset.LIBCMT ref: 00242542
              • GetMenuItemInfoW.USER32(002A5890,000000FF,00000000,00000030), ref: 002425A3
              • SetMenuItemInfoW.USER32(002A5890,00000004,00000000,00000030), ref: 002425D9
              • Sleep.KERNEL32(000001F4), ref: 002425EB
              • GetMenuItemCount.USER32(?), ref: 0024262F
              • GetMenuItemID.USER32(?,00000000), ref: 0024264B
              • GetMenuItemID.USER32(?,-00000001), ref: 00242675
              • GetMenuItemID.USER32(?,?), ref: 002426BA
              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00242700
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00242714
              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00242735
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
              • String ID:
              • API String ID: 4176008265-0
              • Opcode ID: 7d226fbbf94f0cc96c1ed2fede76553df3e6bd3ff4c0f9e0bd6d75056d1724fb
              • Instruction ID: 06f635c811fbd03ebad44ef5fd03a6a9944af396ef3d0a3b7f5d2ea5eac57e88
              • Opcode Fuzzy Hash: 7d226fbbf94f0cc96c1ed2fede76553df3e6bd3ff4c0f9e0bd6d75056d1724fb
              • Instruction Fuzzy Hash: 4661A47092024AEFDF19CF65ED88EBEBBB8EB01304F944059F84297251D771AD29DB21
              APIs
              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00236BBF
              • SafeArrayAllocData.OLEAUT32(?), ref: 00236C18
              • VariantInit.OLEAUT32(?), ref: 00236C2A
              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00236C4A
              • VariantCopy.OLEAUT32(?,?), ref: 00236C9D
              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00236CB1
              • VariantClear.OLEAUT32(?), ref: 00236CC6
              • SafeArrayDestroyData.OLEAUT32(?), ref: 00236CD3
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00236CDC
              • VariantClear.OLEAUT32(?), ref: 00236CEE
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00236CF9
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
              • String ID:
              • API String ID: 2706829360-0
              • Opcode ID: daa5d2739da1f4f96119f2e2f196a1b2c2ece478fd83bb888a93cd2d9d8645c4
              • Instruction ID: e04943fb9d7ab761eec03fd9578617d69554ce9675b60134e6582b98e6576819
              • Opcode Fuzzy Hash: daa5d2739da1f4f96119f2e2f196a1b2c2ece478fd83bb888a93cd2d9d8645c4
              • Instruction Fuzzy Hash: F7416071A10219AFCF00DFA8E94C9AEBBB9FF08354F00C469E955E7261CB70A955CF90
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
              • GetSystemMetrics.USER32(0000000F), ref: 0026D47C
              • GetSystemMetrics.USER32(0000000F), ref: 0026D49C
              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0026D6D7
              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0026D6F5
              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0026D716
              • ShowWindow.USER32(00000003,00000000), ref: 0026D735
              • InvalidateRect.USER32(?,00000000,00000001), ref: 0026D75A
              • DefDlgProcW.USER32(?,00000005,?,?), ref: 0026D77D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
              • String ID: xM
              • API String ID: 1211466189-315438632
              • Opcode ID: 356070cac5e898cabe0e0a62af5c51c17f16d5cecfaa861f3ecc832fb93b1b44
              • Instruction ID: 15401afecaadfdbaead862cf61665bfa6e82c1edff0a898ddfa42726182c9745
              • Opcode Fuzzy Hash: 356070cac5e898cabe0e0a62af5c51c17f16d5cecfaa861f3ecc832fb93b1b44
              • Instruction Fuzzy Hash: 2CB1AE75A1022AEFDF14CF68D9857AD7BB1BF04701F08C069EC499B295D774A9A0CB90
              APIs
                • Part of subcall function 001FFC86: _wcscpy.LIBCMT ref: 001FFCA9
              • _memset.LIBCMT ref: 00242B87
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00242BB6
              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00242C69
              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00242C97
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ItemMenu$Info$Default_memset_wcscpy
              • String ID: 0$8$8$XO$XO
              • API String ID: 4152858687-3464290333
              • Opcode ID: 5c766c6be0ced30f7de1aff46db9c2923ff33357a75f67142bb5f882a1c2c286
              • Instruction ID: ceca20ea1602e8d4603b62e7b923961f3211bfbb4394fcbd50e5a08ffe41b345
              • Opcode Fuzzy Hash: 5c766c6be0ced30f7de1aff46db9c2923ff33357a75f67142bb5f882a1c2c286
              • Instruction Fuzzy Hash: 0951E131128312DBD7189E2AD88476FB7E8EF55314F45092EF881D71D1DBA0CC688B52
              APIs
              • WSAStartup.WSOCK32(00000101,?), ref: 00255793
              • inet_addr.WSOCK32(?,?,?), ref: 002557D8
              • gethostbyname.WSOCK32(?), ref: 002557E4
              • IcmpCreateFile.IPHLPAPI ref: 002557F2
              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00255862
              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00255878
              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 002558ED
              • WSACleanup.WSOCK32 ref: 002558F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
              • String ID: Ping
              • API String ID: 1028309954-2246546115
              • Opcode ID: 0c64caea9ac04f1869a9bd2473dac4c70f0f98c3348e0ee17059bda54e72b51f
              • Instruction ID: 73a61df70bc636fd59aff89b0e9b6808aaf71c9b99b905a58cf8d7e59898e330
              • Opcode Fuzzy Hash: 0c64caea9ac04f1869a9bd2473dac4c70f0f98c3348e0ee17059bda54e72b51f
              • Instruction Fuzzy Hash: EF51DD31614B11DFDB10EF25DC59B2AB7E4EF48320F048929F996DB2A1DB70E854CB46
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 0024B4D0
              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0024B546
              • GetLastError.KERNEL32 ref: 0024B550
              • SetErrorMode.KERNEL32(00000000,READY), ref: 0024B5BD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Error$Mode$DiskFreeLastSpace
              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
              • API String ID: 4194297153-14809454
              • Opcode ID: cfbf70979212e70fc8587eab42bc536929ae24a152aa5bea350818d6c086424c
              • Instruction ID: b71d5dbdf0413b20326fee69c994dcc77bc3897819b0aeb77ab55037a051c138
              • Opcode Fuzzy Hash: cfbf70979212e70fc8587eab42bc536929ae24a152aa5bea350818d6c086424c
              • Instruction Fuzzy Hash: 8731E435A1020ADFCB05EF68D845EBDB7B4FF09314F548065E505D7291DB70DA62CB50
              APIs
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
                • Part of subcall function 0023AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0023AABC
              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00239014
              • GetDlgCtrlID.USER32 ref: 0023901F
              • GetParent.USER32 ref: 0023903B
              • SendMessageW.USER32(00000000,?,00000111,?), ref: 0023903E
              • GetDlgCtrlID.USER32(?), ref: 00239047
              • GetParent.USER32(?), ref: 00239063
              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00239066
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$CtrlParent$ClassName_memmove
              • String ID: ComboBox$ListBox
              • API String ID: 1536045017-1403004172
              • Opcode ID: 5a747880ac13848aa5d988fcdcd192fe9aa3473e691dac467149dececb83c9dc
              • Instruction ID: f42e78f92ddb6cff289d5a12a7681054f32ade945d2e59e11ea77bbd7d77f8a8
              • Opcode Fuzzy Hash: 5a747880ac13848aa5d988fcdcd192fe9aa3473e691dac467149dececb83c9dc
              • Instruction Fuzzy Hash: 2B21C4B0A10108BBDF04ABA0DC89EFEBB79FF55310F104129F961972A1DBB55865DA20
              APIs
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
                • Part of subcall function 0023AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0023AABC
              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 002390FD
              • GetDlgCtrlID.USER32 ref: 00239108
              • GetParent.USER32 ref: 00239124
              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00239127
              • GetDlgCtrlID.USER32(?), ref: 00239130
              • GetParent.USER32(?), ref: 0023914C
              • SendMessageW.USER32(00000000,?,?,00000111), ref: 0023914F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$CtrlParent$ClassName_memmove
              • String ID: ComboBox$ListBox
              • API String ID: 1536045017-1403004172
              • Opcode ID: 82fd4a3edc0fa3ca93c7a7bdc5287ef8ce58f051dcb1387ee10579daedda8175
              • Instruction ID: c2bc8d8d66a23ce74e66689217ed9150e16a91ae94f252088e05af63b23d62d0
              • Opcode Fuzzy Hash: 82fd4a3edc0fa3ca93c7a7bdc5287ef8ce58f051dcb1387ee10579daedda8175
              • Instruction Fuzzy Hash: B121F5B4A10109BBDF00ABA1DC89EFEBB78FF55300F004025F961972A2DBB54865DF20
              APIs
              • GetParent.USER32 ref: 0023916F
              • GetClassNameW.USER32(00000000,?,00000100), ref: 00239184
              • _wcscmp.LIBCMT ref: 00239196
              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00239211
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ClassMessageNameParentSend_wcscmp
              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
              • API String ID: 1704125052-3381328864
              • Opcode ID: 2491e773817cef1019b6b844030d47bac226873ef5df00bffd23ade757b27a6c
              • Instruction ID: 26b928a9fcecd3e8b0a1f90636bf601ab060a15055295d525538afc5c3c8a7c8
              • Opcode Fuzzy Hash: 2491e773817cef1019b6b844030d47bac226873ef5df00bffd23ade757b27a6c
              • Instruction Fuzzy Hash: 25110AB62BC707BAFF116624EC0ADA7379CDB17720F200026FD14A50E2EEE168B15D94
              APIs
              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00247A6C
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ArraySafeVartype
              • String ID:
              • API String ID: 1725837607-0
              • Opcode ID: 40e84659fadeca42cc3ad0fa89805d15247abbe0c237d9bafbffc2ece70abeb3
              • Instruction ID: 1090de9cc4fdee0a8bdccf177616ac0bf23b6aef896b24fd8e6b3f646a58b210
              • Opcode Fuzzy Hash: 40e84659fadeca42cc3ad0fa89805d15247abbe0c237d9bafbffc2ece70abeb3
              • Instruction Fuzzy Hash: ADB1A17192421A9FDB04DFA4D8C4BBEB7B4FF09325F20442AEA21EB241D774E951CB90
              APIs
              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 001EFAA6
              • OleUninitialize.OLE32(?,00000000), ref: 001EFB45
              • UnregisterHotKey.USER32(?), ref: 001EFC9C
              • DestroyWindow.USER32(?), ref: 002245D6
              • FreeLibrary.KERNEL32(?), ref: 0022463B
              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00224668
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
              • String ID: close all
              • API String ID: 469580280-3243417748
              • Opcode ID: 12098e6e9e573680600590550443c091dce16ae88c0a12ef8d1867f7f48218b9
              • Instruction ID: 9d8c553bc7e1a124992fde8cf65775bd48bfed2441bd9057eb45897922e61a2b
              • Opcode Fuzzy Hash: 12098e6e9e573680600590550443c091dce16ae88c0a12ef8d1867f7f48218b9
              • Instruction Fuzzy Hash: 4FA18B30711626DFCB29EF51D594E7DF368AF15704F6142ADE80AAB262CB30AD26CF50
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Variant$ClearInit$_memset
              • String ID: ,,'$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
              • API String ID: 2862541840-799487193
              • Opcode ID: 8d4fec70f06829fa01da5690c0148adf0e78a8987737f46d9e32904c85a9facf
              • Instruction ID: 8f332061da3a835c2b29ea06c29173bd66fece0a4c57f3263d73c802424fe3fb
              • Opcode Fuzzy Hash: 8d4fec70f06829fa01da5690c0148adf0e78a8987737f46d9e32904c85a9facf
              • Instruction Fuzzy Hash: 5091B030A20216EBDF24CFA5C848FAEB7B8EF45711F108159F905EB280D7709998CFA4
              APIs
              • EnumChildWindows.USER32(?,0023A439), ref: 0023A377
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ChildEnumWindows
              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
              • API String ID: 3555792229-1603158881
              • Opcode ID: 00914eb8739f53ae062ca3e16e1ce55c6d52daaacd0f974060cda931fd56c576
              • Instruction ID: c082dfcb7dbbe8725d503a53fe33ff22ba7397caa8aa8c840eb3dd8bf0b3113a
              • Opcode Fuzzy Hash: 00914eb8739f53ae062ca3e16e1ce55c6d52daaacd0f974060cda931fd56c576
              • Instruction Fuzzy Hash: 4F91C770624606AADF08DFA0C485BEEFB74FF04300F548129E9D9A7191DF316AB9CB91
              APIs
              • IsWindow.USER32(00ED4D78), ref: 0026B3EB
              • IsWindowEnabled.USER32(00ED4D78), ref: 0026B3F7
              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0026B4DB
              • SendMessageW.USER32(00ED4D78,000000B0,?,?), ref: 0026B512
              • IsDlgButtonChecked.USER32(?,?), ref: 0026B54F
              • GetWindowLongW.USER32(00ED4D78,000000EC), ref: 0026B571
              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0026B589
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
              • String ID: xM
              • API String ID: 4072528602-315438632
              • Opcode ID: b66a92b290293143102a706e1cf730c6b6762933c20d4b6fbac3513b339a523c
              • Instruction ID: 5014ef2f4e489169f099bb24f298e4c7f4af82dade6c237d5b5f40725cfe0ee0
              • Opcode Fuzzy Hash: b66a92b290293143102a706e1cf730c6b6762933c20d4b6fbac3513b339a523c
              • Instruction Fuzzy Hash: CE71B534614615EFDB229F54D8A4FBA77B9EF09300F144059F952D7362CB71A8E0CB50
              APIs
              • SetWindowLongW.USER32(?,000000EB), ref: 001E2EAE
                • Part of subcall function 001E1DB3: GetClientRect.USER32(?,?), ref: 001E1DDC
                • Part of subcall function 001E1DB3: GetWindowRect.USER32(?,?), ref: 001E1E1D
                • Part of subcall function 001E1DB3: ScreenToClient.USER32(?,?), ref: 001E1E45
              • GetDC.USER32 ref: 0021CD32
              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0021CD45
              • SelectObject.GDI32(00000000,00000000), ref: 0021CD53
              • SelectObject.GDI32(00000000,00000000), ref: 0021CD68
              • ReleaseDC.USER32(?,00000000), ref: 0021CD70
              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0021CDFB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
              • String ID: U
              • API String ID: 4009187628-3372436214
              • Opcode ID: e24555f1e01655e87982b9379d7a72cbedd3d2b3f769428c317881e8d8af2ccb
              • Instruction ID: 7b94eec70cf84ba35a46df12b3194a7e70abbba95fca7d20a21d7abfb8b48c27
              • Opcode Fuzzy Hash: e24555f1e01655e87982b9379d7a72cbedd3d2b3f769428c317881e8d8af2ccb
              • Instruction Fuzzy Hash: D971023441060ADFCF258F64DC84AEA7BF5FF59320F24426AED559A2A6C7308CA0DF60
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00251A50
              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00251A7C
              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00251ABE
              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00251AD3
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00251AE0
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00251B10
              • InternetCloseHandle.WININET(00000000), ref: 00251B57
                • Part of subcall function 00252483: GetLastError.KERNEL32(?,?,00251817,00000000,00000000,00000001), ref: 00252498
                • Part of subcall function 00252483: SetEvent.KERNEL32(?,?,00251817,00000000,00000000,00000001), ref: 002524AD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
              • String ID:
              • API String ID: 2603140658-3916222277
              • Opcode ID: 8375dbe6ff757f08ea70e6073820dd5c7a628fcb9e7b9e2ac095d31d7b7b9454
              • Instruction ID: 56e66b4963225f86aa853daca09cd885331a82377be1454b71ec1862c4ca0312
              • Opcode Fuzzy Hash: 8375dbe6ff757f08ea70e6073820dd5c7a628fcb9e7b9e2ac095d31d7b7b9454
              • Instruction Fuzzy Hash: D74183B1511219BFEB128F50DC89FBB77ACEF08355F008126FD059A181E7B09E689BA4
              APIs
              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 002662EC
              • GetWindowLongW.USER32(00ED4D78,000000F0), ref: 0026631F
              • GetWindowLongW.USER32(00ED4D78,000000F0), ref: 00266354
              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00266386
              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 002663B0
              • GetWindowLongW.USER32(00000000,000000F0), ref: 002663C1
              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 002663DB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: LongWindow$MessageSend
              • String ID: xM
              • API String ID: 2178440468-315438632
              • Opcode ID: 6f3b948bf70bfacce09f9ffb857cb3c594053a8a78622aff42b91d237f0c5cf5
              • Instruction ID: fec0f63f471b4af02e97221d650221f3dc87e2a8223e8a55c6b0480e8a91c770
              • Opcode Fuzzy Hash: 6f3b948bf70bfacce09f9ffb857cb3c594053a8a78622aff42b91d237f0c5cf5
              • Instruction Fuzzy Hash: BD310330654151AFDB20CF18ED88F5937E5FB4AB14F1941A4F521DF2B1CB71ACA09B50
              APIs
              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0026F910), ref: 00258D28
              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0026F910), ref: 00258D5C
              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00258ED6
              • SysFreeString.OLEAUT32(?), ref: 00258F00
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Free$FileLibraryModuleNamePathQueryStringType
              • String ID:
              • API String ID: 560350794-0
              • Opcode ID: 00a9c57214493d2bb967514613e7482ff5efeb4f97f4bcd4e228a5e1a3f45060
              • Instruction ID: 83e1ed2f52d2ef0c10687189c749a528bba57143cf2edb3f84471a9c4ddcdd16
              • Opcode Fuzzy Hash: 00a9c57214493d2bb967514613e7482ff5efeb4f97f4bcd4e228a5e1a3f45060
              • Instruction Fuzzy Hash: 62F15A71A10209EFCF04DF94C888EAEB7B9FF49315F108498F905AB291DB71AE59CB54
              APIs
              • _memset.LIBCMT ref: 0025F6B5
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0025F848
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0025F86C
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0025F8AC
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0025F8CE
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0025FA4A
              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0025FA7C
              • CloseHandle.KERNEL32(?), ref: 0025FAAB
              • CloseHandle.KERNEL32(?), ref: 0025FB22
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
              • String ID:
              • API String ID: 4090791747-0
              • Opcode ID: 2fee31d06bc1c1f9b2b2b48267a4daa36e5cb50889a427383a4136476e8c792b
              • Instruction ID: d2445180daaf3f081aeda6283827571baaacfeaaacd75bb95cd36da4f8a9d03d
              • Opcode Fuzzy Hash: 2fee31d06bc1c1f9b2b2b48267a4daa36e5cb50889a427383a4136476e8c792b
              • Instruction Fuzzy Hash: DDE1D0312143419FCB54EF24C985B6EBBE1AF89314F14886DF8899B2A2CB70DC59CF52
              APIs
                • Part of subcall function 0024466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00243697,?), ref: 0024468B
                • Part of subcall function 0024466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00243697,?), ref: 002446A4
                • Part of subcall function 00244A31: GetFileAttributesW.KERNEL32(?,0024370B), ref: 00244A32
              • lstrcmpiW.KERNEL32(?,?), ref: 00244D40
              • _wcscmp.LIBCMT ref: 00244D5A
              • MoveFileW.KERNEL32(?,?), ref: 00244D75
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
              • String ID:
              • API String ID: 793581249-0
              • Opcode ID: 71b507bbaf62865ad9c436aa7552c40a204269705b367d61cbb9442545cb7183
              • Instruction ID: 8f7b6ed1293a25795a8330505d02b20f9c9de8e66293f98ef5ab20d80bb803f6
              • Opcode Fuzzy Hash: 71b507bbaf62865ad9c436aa7552c40a204269705b367d61cbb9442545cb7183
              • Instruction Fuzzy Hash: C65166B24183859BC724EF90D885ADFB3ECAF84754F00092EF685D3192EF70A598CB56
              APIs
              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0021C2F7
              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0021C319
              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0021C331
              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0021C34F
              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0021C370
              • DestroyIcon.USER32(00000000), ref: 0021C37F
              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0021C39C
              • DestroyIcon.USER32(?), ref: 0021C3AB
                • Part of subcall function 0026A4AF: DeleteObject.GDI32(00000000), ref: 0026A4E8
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
              • String ID:
              • API String ID: 2819616528-0
              • Opcode ID: 5fdf5539e14313ea19e0d3e3d5eb83c595049b38c1972cc5430ef2bf91053101
              • Instruction ID: 39db97a46349cc562192018c7dc26ceebf44902a99c662673c8c50be55e04551
              • Opcode Fuzzy Hash: 5fdf5539e14313ea19e0d3e3d5eb83c595049b38c1972cc5430ef2bf91053101
              • Instruction Fuzzy Hash: BA519B74A50649AFDB24DF25DC59FAE77F9FB18310F204528F912972A0DBB0AC90DB50
              APIs
                • Part of subcall function 0023A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0023A84C
                • Part of subcall function 0023A82C: GetCurrentThreadId.KERNEL32 ref: 0023A853
                • Part of subcall function 0023A82C: AttachThreadInput.USER32(00000000,?,00239683,?,00000001), ref: 0023A85A
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 0023968E
              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 002396AB
              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 002396AE
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 002396B7
              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 002396D5
              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 002396D8
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 002396E1
              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 002396F8
              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 002396FB
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
              • String ID:
              • API String ID: 2014098862-0
              • Opcode ID: 5c659f15e5d3ed63f5b18a07453d952a10503ff03899260e3be3a2ce2a856db0
              • Instruction ID: 9feb3e61d91087d73fb4725e0dbd23ec91cb63dd2d697912aa1a054b03b2ad3f
              • Opcode Fuzzy Hash: 5c659f15e5d3ed63f5b18a07453d952a10503ff03899260e3be3a2ce2a856db0
              • Instruction Fuzzy Hash: 0011E1B1920218BEFA106F60EC8EF6A3B2DEB4D790F104425F654AB0A0C9F35C50DEA4
              APIs
              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0023853C,00000B00,?,?), ref: 0023892A
              • HeapAlloc.KERNEL32(00000000,?,0023853C,00000B00,?,?), ref: 00238931
              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0023853C,00000B00,?,?), ref: 00238946
              • GetCurrentProcess.KERNEL32(?,00000000,?,0023853C,00000B00,?,?), ref: 0023894E
              • DuplicateHandle.KERNEL32(00000000,?,0023853C,00000B00,?,?), ref: 00238951
              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0023853C,00000B00,?,?), ref: 00238961
              • GetCurrentProcess.KERNEL32(0023853C,00000000,?,0023853C,00000B00,?,?), ref: 00238969
              • DuplicateHandle.KERNEL32(00000000,?,0023853C,00000B00,?,?), ref: 0023896C
              • CreateThread.KERNEL32(00000000,00000000,00238992,00000000,00000000,00000000), ref: 00238986
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
              • String ID:
              • API String ID: 1957940570-0
              • Opcode ID: 5c7498c9aafc7c7fbc30a92e6043ed56ebae287e933189e0e9de9d38b2e9a750
              • Instruction ID: e401dc76381a30fde6cb9053aa57a141a715c49f42c3fe1f72ba8a3c97a4c8c5
              • Opcode Fuzzy Hash: 5c7498c9aafc7c7fbc30a92e6043ed56ebae287e933189e0e9de9d38b2e9a750
              • Instruction Fuzzy Hash: 1401BFB5240304FFEB50ABA5ED4DF673B6CEB89751F508461FA09DB191CAB19C00CB20
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID: NULL Pointer assignment$Not an Object type
              • API String ID: 0-572801152
              • Opcode ID: 80066957bb1852a99175f700a070e85392adeaa0e7edc953490138104b1f9ca5
              • Instruction ID: 8e41202fe87c8f5ea4c4f17c7df3d45dee3a16fceef165af4f43ead9fc633b2a
              • Opcode Fuzzy Hash: 80066957bb1852a99175f700a070e85392adeaa0e7edc953490138104b1f9ca5
              • Instruction Fuzzy Hash: 35C1A271A2020ADFDF10DF98D885BAEB7F5FB48315F14846AED05AB280E7709D98CB54
              APIs
                • Part of subcall function 0023710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00237044,80070057,?,?,?,00237455), ref: 00237127
                • Part of subcall function 0023710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00237044,80070057,?,?), ref: 00237142
                • Part of subcall function 0023710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00237044,80070057,?,?), ref: 00237150
                • Part of subcall function 0023710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00237044,80070057,?), ref: 00237160
              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00259806
              • _memset.LIBCMT ref: 00259813
              • _memset.LIBCMT ref: 00259956
              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00259982
              • CoTaskMemFree.OLE32(?), ref: 0025998D
              Strings
              • NULL Pointer assignment, xrefs: 002599DB
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
              • String ID: NULL Pointer assignment
              • API String ID: 1300414916-2785691316
              • Opcode ID: 938f7982430d5dddac74cf0e661356ffedf1f72aba6c5a64bb3c72331d845399
              • Instruction ID: 2dd6f0b778388b56e9593caab791191cf6792addb5d6c76c242017fcbdb32558
              • Opcode Fuzzy Hash: 938f7982430d5dddac74cf0e661356ffedf1f72aba6c5a64bb3c72331d845399
              • Instruction Fuzzy Hash: 95912871D10229EBDF10DFA5DC45EDEBBB9AF08310F10415AF819A7291DB719A54CFA0
              APIs
              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00266E24
              • SendMessageW.USER32(?,00001036,00000000,?), ref: 00266E38
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00266E52
              • _wcscat.LIBCMT ref: 00266EAD
              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00266EC4
              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00266EF2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$Window_wcscat
              • String ID: SysListView32
              • API String ID: 307300125-78025650
              • Opcode ID: 12d9fd7316db48416129ddb29e1cfd5874c73f7b22cc6cf00ff663cf9aa4825a
              • Instruction ID: 8035063adef6fdb4ca636af95202a5a3893fe2f7b0b45653b926e632f1bb6119
              • Opcode Fuzzy Hash: 12d9fd7316db48416129ddb29e1cfd5874c73f7b22cc6cf00ff663cf9aa4825a
              • Instruction Fuzzy Hash: 4841A070A10349ABDF219F64DC89BEEB7E8EF08350F10442AF555A7191D6729DE48B60
              APIs
                • Part of subcall function 00243C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00243C7A
                • Part of subcall function 00243C55: Process32FirstW.KERNEL32(00000000,?), ref: 00243C88
                • Part of subcall function 00243C55: CloseHandle.KERNEL32(00000000), ref: 00243D52
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0025E9A4
              • GetLastError.KERNEL32 ref: 0025E9B7
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0025E9E6
              • TerminateProcess.KERNEL32(00000000,00000000), ref: 0025EA63
              • GetLastError.KERNEL32(00000000), ref: 0025EA6E
              • CloseHandle.KERNEL32(00000000), ref: 0025EAA3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
              • String ID: SeDebugPrivilege
              • API String ID: 2533919879-2896544425
              • Opcode ID: 2b2e0ef09112b74b328c2fdcc54e2fc1da4f82a1809636af36afdf24c7909559
              • Instruction ID: 15c0bd39e967f23302c9405df35363b22132c07d4a28f00e3daef7eb45a9d1ae
              • Opcode Fuzzy Hash: 2b2e0ef09112b74b328c2fdcc54e2fc1da4f82a1809636af36afdf24c7909559
              • Instruction Fuzzy Hash: 2B41CC712102059FDF18EF24DC95F6EB7A5AF50310F148458F9069B2D2CBB4A928CF96
              APIs
              • _memset.LIBCMT ref: 002672AA
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00267351
              • IsMenu.USER32(?), ref: 00267369
              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 002673B1
              • DrawMenuBar.USER32 ref: 002673C4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Menu$Item$DrawInfoInsert_memset
              • String ID: 0$xM
              • API String ID: 3866635326-2111700025
              • Opcode ID: 8f5a779462135ae459103fd5e09e0fd6575736557e8fd2d3869d0961eec4fc23
              • Instruction ID: f0f7526c07a1fb2406c0a92e692cd34291dca9a40bdaf37a8dadec3c7c20a90e
              • Opcode Fuzzy Hash: 8f5a779462135ae459103fd5e09e0fd6575736557e8fd2d3869d0961eec4fc23
              • Instruction Fuzzy Hash: 15413575A14209EFDB20DF50E884AAABBF8FB09318F148469FD15A7390D770ADA0DF50
              APIs
              • LoadIconW.USER32(00000000,00007F03), ref: 00243033
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: IconLoad
              • String ID: blank$info$question$stop$warning
              • API String ID: 2457776203-404129466
              • Opcode ID: b927ab4fff54e40514dfc4323475e14e3d71196b16ddc5362c29c31f3da49dbd
              • Instruction ID: f3df20ba638125cbf68aee8554c4c608327bdacdb2924f5a61f00295aea34554
              • Opcode Fuzzy Hash: b927ab4fff54e40514dfc4323475e14e3d71196b16ddc5362c29c31f3da49dbd
              • Instruction Fuzzy Hash: 571108322AC347BADB29DA14DC46C6B679C9F16320F60012AF900A61C2DAF16F6859A0
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00244312
              • LoadStringW.USER32(00000000), ref: 00244319
              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0024432F
              • LoadStringW.USER32(00000000), ref: 00244336
              • _wprintf.LIBCMT ref: 0024435C
              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0024437A
              Strings
              • %s (%d) : ==> %s: %s %s, xrefs: 00244357
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: HandleLoadModuleString$Message_wprintf
              • String ID: %s (%d) : ==> %s: %s %s
              • API String ID: 3648134473-3128320259
              • Opcode ID: d6237c2b0f705559b0fbbed261a9d7e749e281488e67ba2af7904fb4400a2b19
              • Instruction ID: 3fd2df8c4ba7040e5ec8de77e47792afb7c79e94f697fd2c8c518f28d76b6aa2
              • Opcode Fuzzy Hash: d6237c2b0f705559b0fbbed261a9d7e749e281488e67ba2af7904fb4400a2b19
              • Instruction Fuzzy Hash: 8B0144F2914208BFEB51AB94EE8DFE6776CE708700F0045A2F749E2051EAB45E954B70
              APIs
              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0021C1C7,00000004,00000000,00000000,00000000), ref: 001E2ACF
              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0021C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 001E2B17
              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0021C1C7,00000004,00000000,00000000,00000000), ref: 0021C21A
              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0021C1C7,00000004,00000000,00000000,00000000), ref: 0021C286
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ShowWindow
              • String ID:
              • API String ID: 1268545403-0
              • Opcode ID: 387b41d78d5ac54153a9555c2ec9921901521e10460ae0a53a9b949f2b511162
              • Instruction ID: 3a80c344b8adc15ad91bbd590354fd23d15d7908584053294494a6e595440e45
              • Opcode Fuzzy Hash: 387b41d78d5ac54153a9555c2ec9921901521e10460ae0a53a9b949f2b511162
              • Instruction Fuzzy Hash: F441E735214EC09BCB399B2AEDACB6F7B99AB95310F298429F44783960C77498D1D710
              APIs
              • InterlockedExchange.KERNEL32(?,000001F5), ref: 002470DD
                • Part of subcall function 00200DB6: std::exception::exception.LIBCMT ref: 00200DEC
                • Part of subcall function 00200DB6: __CxxThrowException@8.LIBCMT ref: 00200E01
              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00247114
              • EnterCriticalSection.KERNEL32(?), ref: 00247130
              • _memmove.LIBCMT ref: 0024717E
              • _memmove.LIBCMT ref: 0024719B
              • LeaveCriticalSection.KERNEL32(?), ref: 002471AA
              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 002471BF
              • InterlockedExchange.KERNEL32(?,000001F6), ref: 002471DE
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
              • String ID:
              • API String ID: 256516436-0
              • Opcode ID: 76badeeb749129b6969763f78f94203f8f8c65e9eab42dba416a5572987d5e55
              • Instruction ID: 5d901f238794423d8d860000d1709e2d2acb2e14aa0a66a30c6f07020542a9a5
              • Opcode Fuzzy Hash: 76badeeb749129b6969763f78f94203f8f8c65e9eab42dba416a5572987d5e55
              • Instruction Fuzzy Hash: 0E316E31900205EBDF10DFA4ED89AAEB778FF45310F1481A5E908AB246DB709E20CBA0
              APIs
              • DeleteObject.GDI32(00000000), ref: 002661EB
              • GetDC.USER32(00000000), ref: 002661F3
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002661FE
              • ReleaseDC.USER32(00000000,00000000), ref: 0026620A
              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00266246
              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00266257
              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0026902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00266291
              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 002662B1
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
              • String ID:
              • API String ID: 3864802216-0
              • Opcode ID: 068e25e095a711512b982528f5405f82be57044f0046150af7d22b15bcc1a2ab
              • Instruction ID: 8655bbed48d2d5adb0a5b4a846a08ee8a6693796c4a9f59f8ac6cae496c52550
              • Opcode Fuzzy Hash: 068e25e095a711512b982528f5405f82be57044f0046150af7d22b15bcc1a2ab
              • Instruction Fuzzy Hash: 80317F72111210BFEF118F50ED8AFEA3BADEF49765F044065FE089A2A1C6B59C51CB70
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: f4f88e7c65c8fa0b55a58f520603f1f375605a10c2e94e28170af05f478443c0
              • Instruction ID: 3e4ea7574f66bd195ab61fd7fdbb37f8bc30b950024f9343625fdafaf6f9f318
              • Opcode Fuzzy Hash: f4f88e7c65c8fa0b55a58f520603f1f375605a10c2e94e28170af05f478443c0
              • Instruction Fuzzy Hash: D821C5E1631307BBE6266E119D42FBFB35D9E1134CF048416FE0896683EF64DE3585A1
              APIs
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
                • Part of subcall function 001FFC86: _wcscpy.LIBCMT ref: 001FFCA9
              • _wcstok.LIBCMT ref: 0024EC94
              • _wcscpy.LIBCMT ref: 0024ED23
              • _memset.LIBCMT ref: 0024ED56
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
              • String ID: X
              • API String ID: 774024439-3081909835
              • Opcode ID: 9ae9f4401fe36c11a8e62f59f3b31f99d695d411b987b34f02da58e25f98d35e
              • Instruction ID: e9bf7296bd802b786e21792a0703d3cf7c90388946b0d4a55b7f20436f725fbc
              • Opcode Fuzzy Hash: 9ae9f4401fe36c11a8e62f59f3b31f99d695d411b987b34f02da58e25f98d35e
              • Instruction Fuzzy Hash: 9AC18D306187419FDB18EF24C881A5EB7E4FF95314F01492DF89A9B2A2DB70EC55CB42
              APIs
              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00256C00
              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00256C21
              • WSAGetLastError.WSOCK32(00000000), ref: 00256C34
              • htons.WSOCK32(?,?,?,00000000,?), ref: 00256CEA
              • inet_ntoa.WSOCK32(?), ref: 00256CA7
                • Part of subcall function 0023A7E9: _strlen.LIBCMT ref: 0023A7F3
                • Part of subcall function 0023A7E9: _memmove.LIBCMT ref: 0023A815
              • _strlen.LIBCMT ref: 00256D44
              • _memmove.LIBCMT ref: 00256DAD
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
              • String ID:
              • API String ID: 3619996494-0
              • Opcode ID: 47a1e4405ee68ec632b3a63f14304bdc9fd0bd3c736e2d400470c5d32ffdf174
              • Instruction ID: 716ee942bfd8a07b99d2f12626bc179ee1c7a9eab4b6b91c8806c2d850a941c7
              • Opcode Fuzzy Hash: 47a1e4405ee68ec632b3a63f14304bdc9fd0bd3c736e2d400470c5d32ffdf174
              • Instruction Fuzzy Hash: 12811271214701ABC710EF25DC8AEAEB7B9AF94718F40492CF9459B2D2DB70DD04CB91
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b926a7ac49f5ffa708eb105799d4393b5bd7f2c813d88f01ecd78137424cedb9
              • Instruction ID: 8323f2a1f1a8417891a3b0e405fdb69520106d44b162bcf0282f5293bddb6d80
              • Opcode Fuzzy Hash: b926a7ac49f5ffa708eb105799d4393b5bd7f2c813d88f01ecd78137424cedb9
              • Instruction Fuzzy Hash: 61717C31900549FFCB15CF99CC48EBEBBB9FF85310F248159F915AA291D730AA51CBA0
              APIs
              • _memset.LIBCMT ref: 0025F448
              • _memset.LIBCMT ref: 0025F511
              • ShellExecuteExW.SHELL32(?), ref: 0025F556
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
                • Part of subcall function 001FFC86: _wcscpy.LIBCMT ref: 001FFCA9
              • GetProcessId.KERNEL32(00000000), ref: 0025F5CD
              • CloseHandle.KERNEL32(00000000), ref: 0025F5FC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
              • String ID: @
              • API String ID: 3522835683-2766056989
              • Opcode ID: 5c8c694c5410c5dfceac5ab50b4350c4e68920cb72a9fc52c728506af24fdd6a
              • Instruction ID: fb903075ae06b63e18af15685a9d4cce886063dcda569184ff404f97e1a4426d
              • Opcode Fuzzy Hash: 5c8c694c5410c5dfceac5ab50b4350c4e68920cb72a9fc52c728506af24fdd6a
              • Instruction Fuzzy Hash: 3E61BD71A006599FCF04EFA5C5859AEBBF5FF48310F148069E85AAB361CB30AD55CF84
              APIs
              • GetParent.USER32(?), ref: 00240F8C
              • GetKeyboardState.USER32(?), ref: 00240FA1
              • SetKeyboardState.USER32(?), ref: 00241002
              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00241030
              • PostMessageW.USER32(?,00000101,00000011,?), ref: 0024104F
              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00241095
              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 002410B8
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: acede3b6d8e249bacb0f631db50194eb8c4ad7d73e81b37e23d974737ac2390c
              • Instruction ID: 72701adb778f5ea086c678a8cfa60ad24ed9aed8fe3d34edb763ccd2e168086c
              • Opcode Fuzzy Hash: acede3b6d8e249bacb0f631db50194eb8c4ad7d73e81b37e23d974737ac2390c
              • Instruction Fuzzy Hash: B75125605247D63DFB3A4B348C45BB6BFA95B06300F088589E6D9868C3D6E4ECF8DB51
              APIs
              • GetParent.USER32(00000000), ref: 00240DA5
              • GetKeyboardState.USER32(?), ref: 00240DBA
              • SetKeyboardState.USER32(?), ref: 00240E1B
              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00240E47
              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00240E64
              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00240EA8
              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00240EC9
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: b2f81f930f52f02954d44ac7022b3d276645d30031fce2224cf5af0dc2f453bb
              • Instruction ID: 9bf02fb40cb539e41e03900e1db4e0429ecca1658da7f6183bc8f9642a71e143
              • Opcode Fuzzy Hash: b2f81f930f52f02954d44ac7022b3d276645d30031fce2224cf5af0dc2f453bb
              • Instruction Fuzzy Hash: 9F510B60A247D67DFB3A8B748C85B767E995B06300F088889E2D5868C2D7F5ECF8D750
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _wcsncpy$LocalTime
              • String ID:
              • API String ID: 2945705084-0
              • Opcode ID: 966e7ec24d73229a47d53f8352d2e6d3de4cc1b8eab7822b3c912c0643548156
              • Instruction ID: 89cfc3d3c997cedf817ce20963168936643e77ba8e33a2826980d0635147edb5
              • Opcode Fuzzy Hash: 966e7ec24d73229a47d53f8352d2e6d3de4cc1b8eab7822b3c912c0643548156
              • Instruction Fuzzy Hash: 17418565C30718B6CB15EBB48C46ACFB7BC9F04310F508567E515E3162FA34A265CBE6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID: xM
              • API String ID: 0-315438632
              • Opcode ID: bc5bb6bc6e24dc88a12ca6a8c76986b48002086968cb6a47745d012199ffda85
              • Instruction ID: 2314ab9da7e2b19666e8b4f2b4b8f4c2b1019098870f0acf13bdd333c7a65f70
              • Opcode Fuzzy Hash: bc5bb6bc6e24dc88a12ca6a8c76986b48002086968cb6a47745d012199ffda85
              • Instruction Fuzzy Hash: 0A411735924115AFCB10DF28DC49FA9BBA8FB0A310F1441A5F91AB72E1CB709DE1DE51
              APIs
              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0023D5D4
              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0023D60A
              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0023D61B
              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0023D69D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorMode$AddressCreateInstanceProc
              • String ID: ,,'$DllGetClassObject
              • API String ID: 753597075-2611884504
              • Opcode ID: 5e3949124905e382e65eb04c817fceaf385991cd340c424088618c213bb08437
              • Instruction ID: 2fa31e18b7dade252b8277dd770001d9839d0263c926c709879c04779602e334
              • Opcode Fuzzy Hash: 5e3949124905e382e65eb04c817fceaf385991cd340c424088618c213bb08437
              • Instruction Fuzzy Hash: D44179F1620205EFDB05CF64E885A9ABBB9EF45310F1580A9E8099F205D7B1D964CFA0
              APIs
              • GetCursorPos.USER32(?), ref: 001E2357
              • ScreenToClient.USER32(002A57B0,?), ref: 001E2374
              • GetAsyncKeyState.USER32(00000001), ref: 001E2399
              • GetAsyncKeyState.USER32(00000002), ref: 001E23A7
              Strings
              • lldfrplldfrplld9rplld5rplld1rplld0rplldfrplldfrplldfrplldfrplldfrplldfrplld8rplld9rplld4rplld5rplldfrplld4rplld8rplld3rplld7rplldd, xrefs: 0021BFF9
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AsyncState$ClientCursorScreen
              • String ID: lldfrplldfrplld9rplld5rplld1rplld0rplldfrplldfrplldfrplldfrplldfrplldfrplld8rplld9rplld4rplld5rplldfrplld4rplld8rplld3rplld7rplldd
              • API String ID: 4210589936-141170929
              • Opcode ID: 814092accb6b6baec1eec433f4882ccf672199f5a962245beb34f2b0d9a89fbe
              • Instruction ID: ce0e5d95ed60ce5c60b2e187c413a3390ce3898cc55943d411848f972d6696e7
              • Opcode Fuzzy Hash: 814092accb6b6baec1eec433f4882ccf672199f5a962245beb34f2b0d9a89fbe
              • Instruction Fuzzy Hash: 1C418135614505FBCF198F69CC48AEDBBB8FB19360F20435AF829922A0C7749DA0DF90
              APIs
                • Part of subcall function 0024466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00243697,?), ref: 0024468B
                • Part of subcall function 0024466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00243697,?), ref: 002446A4
              • lstrcmpiW.KERNEL32(?,?), ref: 002436B7
              • _wcscmp.LIBCMT ref: 002436D3
              • MoveFileW.KERNEL32(?,?), ref: 002436EB
              • _wcscat.LIBCMT ref: 00243733
              • SHFileOperationW.SHELL32(?), ref: 0024379F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
              • String ID: \*.*
              • API String ID: 1377345388-1173974218
              • Opcode ID: 7e4b24c724364625eafd9aedb812c64e6194e6e2482cbaf89de2f39e96fcdf25
              • Instruction ID: a04cc1d184c18fbcf074a25680625bb7376240a4389a9bea2999e23151fc6ce9
              • Opcode Fuzzy Hash: 7e4b24c724364625eafd9aedb812c64e6194e6e2482cbaf89de2f39e96fcdf25
              • Instruction Fuzzy Hash: 4441CE71118345AEC755EF60D845ADFB7ECAF88384F00082EF49AC3291EB34D699CB56
              APIs
              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00260FD4
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00260FFE
              • FreeLibrary.KERNEL32(00000000), ref: 002610B5
                • Part of subcall function 00260FA5: RegCloseKey.ADVAPI32(?), ref: 0026101B
                • Part of subcall function 00260FA5: FreeLibrary.KERNEL32(?), ref: 0026106D
                • Part of subcall function 00260FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00261090
              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00261058
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: EnumFreeLibrary$CloseDeleteOpen
              • String ID:
              • API String ID: 395352322-0
              • Opcode ID: f4380dc21d599eeffed177b358cb9ea2eccf855f97f9dfa48472fbe3369f40e2
              • Instruction ID: e6c23decb87aff5ba62949a5b9956d48be928fcb451dd33d5bc6c426453046ec
              • Opcode Fuzzy Hash: f4380dc21d599eeffed177b358cb9ea2eccf855f97f9dfa48472fbe3369f40e2
              • Instruction Fuzzy Hash: 12312D71910109BFDF15DF90ED89EFFB7BCEF08300F04416AE905A2151EA74AEE59AA0
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0023DB2E
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0023DB54
              • SysAllocString.OLEAUT32(00000000), ref: 0023DB57
              • SysAllocString.OLEAUT32(?), ref: 0023DB75
              • SysFreeString.OLEAUT32(?), ref: 0023DB7E
              • StringFromGUID2.OLE32(?,?,00000028), ref: 0023DBA3
              • SysAllocString.OLEAUT32(?), ref: 0023DBB1
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: bc010d2b6df717026a2f8ce7f4577e9ed171c2166f50cce5ea60b9dae7503081
              • Instruction ID: 64a87b349b73b0df071726cd5834fc8b21c305241529109c529fdf7c1e38a827
              • Opcode Fuzzy Hash: bc010d2b6df717026a2f8ce7f4577e9ed171c2166f50cce5ea60b9dae7503081
              • Instruction Fuzzy Hash: C021A7B6614219AFDF10DFA8FC88CBBB3ADEB09364F018565FA14DB251DA70DC418760
              APIs
                • Part of subcall function 00257D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00257DB6
              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 002561C6
              • WSAGetLastError.WSOCK32(00000000), ref: 002561D5
              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0025620E
              • connect.WSOCK32(00000000,?,00000010), ref: 00256217
              • WSAGetLastError.WSOCK32 ref: 00256221
              • closesocket.WSOCK32(00000000), ref: 0025624A
              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00256263
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
              • String ID:
              • API String ID: 910771015-0
              • Opcode ID: c6dce5af2107c0839e38d117c5719e45470084d25c533e03960b883dcd292875
              • Instruction ID: d420645256f02f5a5aeb8e17181084cc3fcbdf92c28402de87fdc78332cc930b
              • Opcode Fuzzy Hash: c6dce5af2107c0839e38d117c5719e45470084d25c533e03960b883dcd292875
              • Instruction Fuzzy Hash: 0B31A471610108AFDF10AF64DC89FBD77ADEB45711F448069FD05E7291CBB0AC188BA5
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __wcsnicmp
              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
              • API String ID: 1038674560-2734436370
              • Opcode ID: ed8592fd525d01dace3dc77d070203347de6f992f319cdba8c510a2b02b3dbca
              • Instruction ID: 31a7da8e0ff72436b57f327c4def78a7263c8a1c78b0681376dad1245c750136
              • Opcode Fuzzy Hash: ed8592fd525d01dace3dc77d070203347de6f992f319cdba8c510a2b02b3dbca
              • Instruction Fuzzy Hash: 5A213AF253461266D320EA34BD03FABB39CDF55350F50403AF445860A2EB915D66CA95
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0023DC09
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0023DC2F
              • SysAllocString.OLEAUT32(00000000), ref: 0023DC32
              • SysAllocString.OLEAUT32 ref: 0023DC53
              • SysFreeString.OLEAUT32 ref: 0023DC5C
              • StringFromGUID2.OLE32(?,?,00000028), ref: 0023DC76
              • SysAllocString.OLEAUT32(?), ref: 0023DC84
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: 93df4dbffa6b3e10d11cee47cc40d7a6e057c77562b18cdf588365d01c543239
              • Instruction ID: 0e2b8f05d5b7c28fa5e07fc1c22cc731c29af5157e51eb69c35e69493182a204
              • Opcode Fuzzy Hash: 93df4dbffa6b3e10d11cee47cc40d7a6e057c77562b18cdf588365d01c543239
              • Instruction Fuzzy Hash: 2F213175624205AF9F109FB8FD88DAA77ECEB09360B108526F914CB2A1DAB0DC51CB64
              APIs
                • Part of subcall function 001E1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 001E1D73
                • Part of subcall function 001E1D35: GetStockObject.GDI32(00000011), ref: 001E1D87
                • Part of subcall function 001E1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 001E1D91
              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00267632
              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0026763F
              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0026764A
              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00267659
              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00267665
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$CreateObjectStockWindow
              • String ID: Msctls_Progress32
              • API String ID: 1025951953-3636473452
              • Opcode ID: e6ac3477528bb3a4393262c0ae8820a75117126f13de743755482023bf305a43
              • Instruction ID: c09c9f37b047d4114160b8b79eb9903e41c8f33dcc052d3b9bde436a11c5235d
              • Opcode Fuzzy Hash: e6ac3477528bb3a4393262c0ae8820a75117126f13de743755482023bf305a43
              • Instruction Fuzzy Hash: 3911B2B2110219BFEF118F64DC85EEB7F6DEF08798F014114BA04A20A0CB729C61DBA4
              APIs
              • _memset.LIBCMT ref: 0026B644
              • _memset.LIBCMT ref: 0026B653
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,002A6F20,002A6F64), ref: 0026B682
              • CloseHandle.KERNEL32 ref: 0026B694
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memset$CloseCreateHandleProcess
              • String ID: o*$do*
              • API String ID: 3277943733-2035452387
              • Opcode ID: e8b42d6e5d461cbc2201dcfce51132eb52d1c7e668d611cfcd5c834455ff9185
              • Instruction ID: f3d0644e7e3b432d1f3ff760d960c8e7c97d2ba64fabbd702fb958944f49719c
              • Opcode Fuzzy Hash: e8b42d6e5d461cbc2201dcfce51132eb52d1c7e668d611cfcd5c834455ff9185
              • Instruction Fuzzy Hash: 16F054B1550340BFE7102761BC0DF7B7A5CEB0A355F044061FA09D5592EBB14C208BA8
              APIs
              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00203F85), ref: 00204085
              • GetProcAddress.KERNEL32(00000000), ref: 0020408C
              • EncodePointer.KERNEL32(00000000), ref: 00204097
              • DecodePointer.KERNEL32(00203F85), ref: 002040B2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
              • String ID: RoUninitialize$combase.dll
              • API String ID: 3489934621-2819208100
              • Opcode ID: 2acc3b89d7dcceac1366377f420c0a0eace4c236bfcd7ad425e889fcf0b1a06c
              • Instruction ID: 962b6ff4c632eb5006ca7855456a38ccf5cf64d0ece159e84a0470e1683ffa56
              • Opcode Fuzzy Hash: 2acc3b89d7dcceac1366377f420c0a0eace4c236bfcd7ad425e889fcf0b1a06c
              • Instruction Fuzzy Hash: B8E092B0691301EFEB60EF61FE0DB157AE5B706742F208065F619E11A0CFF646248E14
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memmove$__itow__swprintf
              • String ID:
              • API String ID: 3253778849-0
              • Opcode ID: ef50ae5c25668af8b02fce2141f51b72681a68da295338dd53ce24912e083d37
              • Instruction ID: a12a61fc8b784516333dd9a867a177f2e897c1d2d0f6aa394e434755f384411c
              • Opcode Fuzzy Hash: ef50ae5c25668af8b02fce2141f51b72681a68da295338dd53ce24912e083d37
              • Instruction Fuzzy Hash: 1461DF3052069A9BDF09EF60CC86EFE37A9AF19308F054428FD556B1A2DB74DC25CB51
              APIs
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
                • Part of subcall function 00260E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0025FDAD,?,?), ref: 00260E31
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002602BD
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 002602FD
              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00260320
              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00260349
              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0026038C
              • RegCloseKey.ADVAPI32(00000000), ref: 00260399
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
              • String ID:
              • API String ID: 4046560759-0
              • Opcode ID: a403a6db25d9ae2b7cb261ffbbc9b4ca5c9b4494d9085c4eaff59b2b3b2519c8
              • Instruction ID: 86b00f1a8fce20fe56c556d2a80ee915664590165b19ce3240b72ed07a32cb0d
              • Opcode Fuzzy Hash: a403a6db25d9ae2b7cb261ffbbc9b4ca5c9b4494d9085c4eaff59b2b3b2519c8
              • Instruction Fuzzy Hash: EF517A31118241AFDB00EF64D885E6FBBE9FF88314F04492DF8458B2A2DB71E964DB52
              APIs
              • GetMenu.USER32(?), ref: 002657FB
              • GetMenuItemCount.USER32(00000000), ref: 00265832
              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0026585A
              • GetMenuItemID.USER32(?,?), ref: 002658C9
              • GetSubMenu.USER32(?,?), ref: 002658D7
              • PostMessageW.USER32(?,00000111,?,00000000), ref: 00265928
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Menu$Item$CountMessagePostString
              • String ID:
              • API String ID: 650687236-0
              • Opcode ID: 577bd18917f1aae8e4709f8e0a07f728c5bf62dbf595574680b25978558a3474
              • Instruction ID: c73fe5879eb2d73b53d7ec2ead52699c39a1d8b8ea30c60d18a726bb480ac0bd
              • Opcode Fuzzy Hash: 577bd18917f1aae8e4709f8e0a07f728c5bf62dbf595574680b25978558a3474
              • Instruction Fuzzy Hash: 85517F31E11A26EFCF15DF64D845AAEB7B4EF48320F104069E852BB351CB70AE91CB90
              APIs
              • VariantInit.OLEAUT32(?), ref: 0023EF06
              • VariantClear.OLEAUT32(00000013), ref: 0023EF78
              • VariantClear.OLEAUT32(00000000), ref: 0023EFD3
              • _memmove.LIBCMT ref: 0023EFFD
              • VariantClear.OLEAUT32(?), ref: 0023F04A
              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0023F078
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Variant$Clear$ChangeInitType_memmove
              • String ID:
              • API String ID: 1101466143-0
              • Opcode ID: 77294221ee60a880085bbfbde715c16ecaf62b465f24ab64a90a692aab20e783
              • Instruction ID: 69c24cdfa562eebb595f4107c64dc8d3185881e720b60a9260c8f0b7669ce71c
              • Opcode Fuzzy Hash: 77294221ee60a880085bbfbde715c16ecaf62b465f24ab64a90a692aab20e783
              • Instruction Fuzzy Hash: B95189B5A10209EFDB14CF58D884AAAB7B8FF4C310F158569EA49DB305E730E911CFA0
              APIs
              • _memset.LIBCMT ref: 00242258
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 002422A3
              • IsMenu.USER32(00000000), ref: 002422C3
              • CreatePopupMenu.USER32 ref: 002422F7
              • GetMenuItemCount.USER32(000000FF), ref: 00242355
              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00242386
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
              • String ID:
              • API String ID: 3311875123-0
              • Opcode ID: 7dab2ea10374de8d85fffa6719e08f3247be7b79677c48daacfede7191932e29
              • Instruction ID: 5e28a909aa9bc83527a8cb999ad9a87c5c867c0713fff974e06d3cd116b64612
              • Opcode Fuzzy Hash: 7dab2ea10374de8d85fffa6719e08f3247be7b79677c48daacfede7191932e29
              • Instruction Fuzzy Hash: D151D27061020ADBCF29CF65D988BAEBFF4FF45314F5081A9F811A7290D3B49968CB11
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
              • BeginPaint.USER32(?,?,?,?,?,?), ref: 001E179A
              • GetWindowRect.USER32(?,?), ref: 001E17FE
              • ScreenToClient.USER32(?,?), ref: 001E181B
              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 001E182C
              • EndPaint.USER32(?,?), ref: 001E1876
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: PaintWindow$BeginClientLongRectScreenViewport
              • String ID:
              • API String ID: 1827037458-0
              • Opcode ID: 03755c8f8dfc08976712d8ebab1227c75750d355521271800bcf544938925512
              • Instruction ID: 29577a4074afa6ecdb43d802d9cb79b66aadf418f23645cb7c0555517a1e2b35
              • Opcode Fuzzy Hash: 03755c8f8dfc08976712d8ebab1227c75750d355521271800bcf544938925512
              • Instruction Fuzzy Hash: 3041B031100B41AFDB11DF25EC88FBB7BF8FB5A720F144628F9A4861A1C7709885DB61
              APIs
              • ShowWindow.USER32(002A57B0,00000000,00ED4D78,?,?,002A57B0,?,0026B5A8,?,?), ref: 0026B712
              • EnableWindow.USER32(00000000,00000000), ref: 0026B736
              • ShowWindow.USER32(002A57B0,00000000,00ED4D78,?,?,002A57B0,?,0026B5A8,?,?), ref: 0026B796
              • ShowWindow.USER32(00000000,00000004,?,0026B5A8,?,?), ref: 0026B7A8
              • EnableWindow.USER32(00000000,00000001), ref: 0026B7CC
              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0026B7EF
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$Show$Enable$MessageSend
              • String ID:
              • API String ID: 642888154-0
              • Opcode ID: 2d245e1292248896fe6d88ca65eaaa61399186090a7b46d1d653d7144250b7a6
              • Instruction ID: 360320ce8b8a46511a2bc6aa5ed6c47e3d1dcad38efa43aba4fcc562935160c6
              • Opcode Fuzzy Hash: 2d245e1292248896fe6d88ca65eaaa61399186090a7b46d1d653d7144250b7a6
              • Instruction Fuzzy Hash: 65419F35610241AFDB23CF24D599B94BBE0FF45311F1881B9E948CF6A2C771A8E6CB50
              APIs
              • GetForegroundWindow.USER32(?,?,?,?,?,?,00254E41,?,?,00000000,00000001), ref: 002570AC
                • Part of subcall function 002539A0: GetWindowRect.USER32(?,?), ref: 002539B3
              • GetDesktopWindow.USER32 ref: 002570D6
              • GetWindowRect.USER32(00000000), ref: 002570DD
              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0025710F
                • Part of subcall function 00245244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 002452BC
              • GetCursorPos.USER32(?), ref: 0025713B
              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00257199
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
              • String ID:
              • API String ID: 4137160315-0
              • Opcode ID: 7e7c06055c6c682fb0e5ba19334aa1c72f147413bac36c999ed77f7333aabd19
              • Instruction ID: 0f223f790843a6c86a5c1abf6d4ccc024f85fb060af843d189b234a9b68d97f8
              • Opcode Fuzzy Hash: 7e7c06055c6c682fb0e5ba19334aa1c72f147413bac36c999ed77f7333aabd19
              • Instruction Fuzzy Hash: EE310472118306ABCB20DF14E849F9BB7E9FF88304F004919F88997191C7B0EA18CB96
              APIs
                • Part of subcall function 002380A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 002380C0
                • Part of subcall function 002380A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 002380CA
                • Part of subcall function 002380A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 002380D9
                • Part of subcall function 002380A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 002380E0
                • Part of subcall function 002380A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 002380F6
              • GetLengthSid.ADVAPI32(?,00000000,0023842F), ref: 002388CA
              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 002388D6
              • HeapAlloc.KERNEL32(00000000), ref: 002388DD
              • CopySid.ADVAPI32(00000000,00000000,?), ref: 002388F6
              • GetProcessHeap.KERNEL32(00000000,00000000,0023842F), ref: 0023890A
              • HeapFree.KERNEL32(00000000), ref: 00238911
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
              • String ID:
              • API String ID: 3008561057-0
              • Opcode ID: d4916d4baf9b6359a1c8e1ca2b04e2205538d8e4e5ba2ca8448c0cec2eafa04f
              • Instruction ID: 8feb3b65ce15b6b8bdaa78711ca095225c6b2d1544feae8ffacd403b69f58c69
              • Opcode Fuzzy Hash: d4916d4baf9b6359a1c8e1ca2b04e2205538d8e4e5ba2ca8448c0cec2eafa04f
              • Instruction Fuzzy Hash: E811AFB1521209FFDF109FA4ED09BBE7768FB45355F108068F8859B210CB729924DB60
              APIs
              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 002385E2
              • OpenProcessToken.ADVAPI32(00000000), ref: 002385E9
              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 002385F8
              • CloseHandle.KERNEL32(00000004), ref: 00238603
              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00238632
              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00238646
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
              • String ID:
              • API String ID: 1413079979-0
              • Opcode ID: faf5ddea19b5a2fde3bc0427398b82694f1863aadf071bf67eeece8bcdca2f3d
              • Instruction ID: 6eda45b1f53c3463e655c63d83966a528ca37fdd062a3b73f37fab472be7366e
              • Opcode Fuzzy Hash: faf5ddea19b5a2fde3bc0427398b82694f1863aadf071bf67eeece8bcdca2f3d
              • Instruction Fuzzy Hash: 27116DB250024EABDF018FA4ED49FDE7BA9EF08304F048065FE04A6160C7B18D65DB60
              APIs
              • GetDC.USER32(00000000), ref: 0023B7B5
              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0023B7C6
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0023B7CD
              • ReleaseDC.USER32(00000000,00000000), ref: 0023B7D5
              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0023B7EC
              • MulDiv.KERNEL32(000009EC,?,?), ref: 0023B7FE
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CapsDevice$Release
              • String ID:
              • API String ID: 1035833867-0
              • Opcode ID: 92b6f7e8f3f9e374acf2e0d64d567273a561788f36827ee06ac5a9ec38dff311
              • Instruction ID: fb22bf125f217733eab5b764f90b4818a5101dfe7d03d3d9eb2739237c143281
              • Opcode Fuzzy Hash: 92b6f7e8f3f9e374acf2e0d64d567273a561788f36827ee06ac5a9ec38dff311
              • Instruction Fuzzy Hash: 650144B5E00219BBEF109FA6ED49A5EBFB8EB49751F008075FA08A7291D6719C10CF91
              APIs
              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00200193
              • MapVirtualKeyW.USER32(00000010,00000000), ref: 0020019B
              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 002001A6
              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 002001B1
              • MapVirtualKeyW.USER32(00000011,00000000), ref: 002001B9
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 002001C1
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Virtual
              • String ID:
              • API String ID: 4278518827-0
              • Opcode ID: d6ab67d606de516982bf57f9b5c0b28da5ed582e51e84e84602b3b6f105f1fe7
              • Instruction ID: be6caf2823fe032308650a12380469076daa4f2627483aa7d2c3f8245e8acac2
              • Opcode Fuzzy Hash: d6ab67d606de516982bf57f9b5c0b28da5ed582e51e84e84602b3b6f105f1fe7
              • Instruction Fuzzy Hash: E80148B09017597DE3008F5A8C85A52FEA8FF19354F00411BA15847941C7F5A864CBE5
              APIs
              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 002453F9
              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0024540F
              • GetWindowThreadProcessId.USER32(?,?), ref: 0024541E
              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0024542D
              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00245437
              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0024543E
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
              • String ID:
              • API String ID: 839392675-0
              • Opcode ID: e40f60676b0a4a2590787437f745882763243997c682703fdd3dfbedf9e02ca2
              • Instruction ID: 8b861a87c7283648abc6e926b5ceff61a3cf5b76ef06f4bdb247a0240acd82d0
              • Opcode Fuzzy Hash: e40f60676b0a4a2590787437f745882763243997c682703fdd3dfbedf9e02ca2
              • Instruction Fuzzy Hash: 09F06D32240158BBEB205BA2FD0DEAB7A7CEBC7B11F0041A9FA14D105196E01A0186B5
              APIs
              • InterlockedExchange.KERNEL32(?,?), ref: 00247243
              • EnterCriticalSection.KERNEL32(?,?,001F0EE4,?,?), ref: 00247254
              • TerminateThread.KERNEL32(00000000,000001F6,?,001F0EE4,?,?), ref: 00247261
              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,001F0EE4,?,?), ref: 0024726E
                • Part of subcall function 00246C35: CloseHandle.KERNEL32(00000000,?,0024727B,?,001F0EE4,?,?), ref: 00246C3F
              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00247281
              • LeaveCriticalSection.KERNEL32(?,?,001F0EE4,?,?), ref: 00247288
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
              • String ID:
              • API String ID: 3495660284-0
              • Opcode ID: 9c5ead9a671bbefead1c372322499c3ac65ffb083856ad6ca627022decc94eae
              • Instruction ID: ed1094c1198ceec4c086128333387fb1400ea95c7162db1a377260a42570322e
              • Opcode Fuzzy Hash: 9c5ead9a671bbefead1c372322499c3ac65ffb083856ad6ca627022decc94eae
              • Instruction Fuzzy Hash: 57F05E36544612EBDB951F64FE9C9DA7729FF45702B114632F903910A0CBF65851CF50
              APIs
              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0023899D
              • UnloadUserProfile.USERENV(?,?), ref: 002389A9
              • CloseHandle.KERNEL32(?), ref: 002389B2
              • CloseHandle.KERNEL32(?), ref: 002389BA
              • GetProcessHeap.KERNEL32(00000000,?), ref: 002389C3
              • HeapFree.KERNEL32(00000000), ref: 002389CA
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
              • String ID:
              • API String ID: 146765662-0
              • Opcode ID: 7448bc6714cf53f17ebe39cd557be1602fa974c97cfb24ec7fafc4d9adade3b5
              • Instruction ID: 0c6105e968e67fbbea1f99a0714bf6903cd79add2322e7e5a15308f3c0716c29
              • Opcode Fuzzy Hash: 7448bc6714cf53f17ebe39cd557be1602fa974c97cfb24ec7fafc4d9adade3b5
              • Instruction Fuzzy Hash: 65E0C236004001FBDE411FE1FE0C90ABB69FB8A362B108270F21981170CBB29430DB50
              APIs
              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00272C7C,?), ref: 002376EA
              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00272C7C,?), ref: 00237702
              • CLSIDFromProgID.OLE32(?,?,00000000,0026FB80,000000FF,?,00000000,00000800,00000000,?,00272C7C,?), ref: 00237727
              • _memcmp.LIBCMT ref: 00237748
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FromProg$FreeTask_memcmp
              • String ID: ,,'
              • API String ID: 314563124-1378728019
              • Opcode ID: cebc5d36b5cfa5ae6d1ccc6d5bf9147fa9d4a53e5ba9a2269600ec33dd4f0d4a
              • Instruction ID: 44e1e35dc9a2651469a7b71f3548d00b3a50dfef492ae2f25a0ffa5ea0891fdd
              • Opcode Fuzzy Hash: cebc5d36b5cfa5ae6d1ccc6d5bf9147fa9d4a53e5ba9a2269600ec33dd4f0d4a
              • Instruction Fuzzy Hash: 93812CB1A1010AEFDF14DFA4C984EEEB7B9FF89315F204558E505AB250DB71AE06CB60
              APIs
              • VariantInit.OLEAUT32(?), ref: 00258613
              • CharUpperBuffW.USER32(?,?), ref: 00258722
              • VariantClear.OLEAUT32(?), ref: 0025889A
                • Part of subcall function 00247562: VariantInit.OLEAUT32(00000000), ref: 002475A2
                • Part of subcall function 00247562: VariantCopy.OLEAUT32(00000000,?), ref: 002475AB
                • Part of subcall function 00247562: VariantClear.OLEAUT32(00000000), ref: 002475B7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Variant$ClearInit$BuffCharCopyUpper
              • String ID: AUTOIT.ERROR$Incorrect Parameter format
              • API String ID: 4237274167-1221869570
              • Opcode ID: 8f33c3bedeb552809190b5f8828e57c4215614167ca756146af713f413bbeed9
              • Instruction ID: 1e5371a25a17c1106ec65d5f7a1b8e316fdf4f0870c08a76bba9494278224d63
              • Opcode Fuzzy Hash: 8f33c3bedeb552809190b5f8828e57c4215614167ca756146af713f413bbeed9
              • Instruction Fuzzy Hash: 4391BD70614745DFCB00DF25C48495AB7E4EF89714F04892EF88A9B362DB70ED09CB92
              APIs
              • GetWindowRect.USER32(00EDE900,?), ref: 00269863
              • ScreenToClient.USER32(00000002,00000002), ref: 00269896
              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00269903
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$ClientMoveRectScreen
              • String ID: xM
              • API String ID: 3880355969-315438632
              • Opcode ID: 9d79bf8a894cc8e715981097266590d00cc65e527370ac932b015bb120bb83ac
              • Instruction ID: d26c51e4518ef01bdad0a3f91b4569d9d3615ad152b76f56266a5256ac0268c7
              • Opcode Fuzzy Hash: 9d79bf8a894cc8e715981097266590d00cc65e527370ac932b015bb120bb83ac
              • Instruction Fuzzy Hash: 98515034A11209EFCF10CF54D984AAE7BB9FF45360F108159F8659B2A0DB31ADD1CB90
              APIs
              • _memset.LIBCMT ref: 002427C0
              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 002427DC
              • DeleteMenu.USER32(?,00000007,00000000), ref: 00242822
              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,002A5890,00000000), ref: 0024286B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Menu$Delete$InfoItem_memset
              • String ID: 0
              • API String ID: 1173514356-4108050209
              • Opcode ID: 33dcd3a039269cea58d1c80cca448ae5dea8ee9957e855af0ffba4b520df65b3
              • Instruction ID: 690b0011a3491835d62e85011cd3bf50bf7700776d6b8f6e92707cbab8f60cd2
              • Opcode Fuzzy Hash: 33dcd3a039269cea58d1c80cca448ae5dea8ee9957e855af0ffba4b520df65b3
              • Instruction Fuzzy Hash: 0941A070214342DFDB28DF26D844B1ABBE8EF85314F44496DF866972D2DB70A819CB62
              APIs
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 002688DE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: InvalidateRect
              • String ID: xM
              • API String ID: 634782764-315438632
              • Opcode ID: 66942a7fe4a52261d061d1bdb8f9cd6e271d920ece5bf6d0413c9f5a8e3d05b6
              • Instruction ID: 6707279d7d535d9ca965910d63838d666c90d0675eeb5375ff4f7a2f158077cf
              • Opcode Fuzzy Hash: 66942a7fe4a52261d061d1bdb8f9cd6e271d920ece5bf6d0413c9f5a8e3d05b6
              • Instruction Fuzzy Hash: F731D434632109AFEF209E68DC49BBD77A5EB06310F544612FA51E72A1CE70DDE09B53
              APIs
              • ClientToScreen.USER32(?,?), ref: 0026AB60
              • GetWindowRect.USER32(?,?), ref: 0026ABD6
              • PtInRect.USER32(?,?,0026C014), ref: 0026ABE6
              • MessageBeep.USER32(00000000), ref: 0026AC57
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Rect$BeepClientMessageScreenWindow
              • String ID: xM
              • API String ID: 1352109105-315438632
              • Opcode ID: 1ec554c8c3ee53ea6a8b22fb5fc52401fea03489a297046b249227139b86985e
              • Instruction ID: a0621f21f3633491b00bedd787973cfb8e566317f43b96575adb0ae590aec1e1
              • Opcode Fuzzy Hash: 1ec554c8c3ee53ea6a8b22fb5fc52401fea03489a297046b249227139b86985e
              • Instruction Fuzzy Hash: 07417F30620119DFCB11DF58E888B697BF5FF49710F1480AAE815AB261D770E891CF92
              APIs
              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00240B27
              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00240B43
              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00240BA9
              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00240BFB
              Strings
              • lldfrplldfrplld9rplld5rplld1rplld0rplldfrplldfrplldfrplldfrplldfrplldfrplld8rplld9rplld4rplld5rplldfrplld4rplld8rplld3rplld7rplldd, xrefs: 00240B5D
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID: lldfrplldfrplld9rplld5rplld1rplld0rplldfrplldfrplldfrplldfrplldfrplldfrplld8rplld9rplld4rplld5rplldfrplld4rplld8rplld3rplld7rplldd
              • API String ID: 432972143-141170929
              • Opcode ID: fb85e224102c761e7a3914372e4ee6360dc60c51cac1c73b9d0b23b9830e3792
              • Instruction ID: b5116ab900617abb64f040f0becb7f72a84e00946b9c31acee707058ec392b7a
              • Opcode Fuzzy Hash: fb85e224102c761e7a3914372e4ee6360dc60c51cac1c73b9d0b23b9830e3792
              • Instruction Fuzzy Hash: 8E317C70D60209AEFF388F25DC89BFABBA5EB4531CF04425AE681521D1C3B48DE19B59
              APIs
              • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00240C66
              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00240C82
              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00240CE1
              • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00240D33
              Strings
              • lldfrplldfrplld9rplld5rplld1rplld0rplldfrplldfrplldfrplldfrplldfrplldfrplld8rplld9rplld4rplld5rplldfrplld4rplld8rplld3rplld7rplldd, xrefs: 00240C9F
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID: lldfrplldfrplld9rplld5rplld1rplld0rplldfrplldfrplldfrplldfrplldfrplldfrplld8rplld9rplld4rplld5rplldfrplld4rplld8rplld3rplld7rplldd
              • API String ID: 432972143-141170929
              • Opcode ID: 0a8505fbd940ce85b8518bad63f6365a520df99f3892418ebcc899db03c1dab0
              • Instruction ID: 3ffc2daa05102113e89c31f8112415a2a5a7cf3a311053c08d959cde79aa3f64
              • Opcode Fuzzy Hash: 0a8505fbd940ce85b8518bad63f6365a520df99f3892418ebcc899db03c1dab0
              • Instruction Fuzzy Hash: 90312630D60219EEFF288F65D888BBEBB65EB45310F04831BE681521D1C3B599E58B91
              APIs
              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0025D7C5
                • Part of subcall function 001E784B: _memmove.LIBCMT ref: 001E7899
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: BuffCharLower_memmove
              • String ID: cdecl$none$stdcall$winapi
              • API String ID: 3425801089-567219261
              • Opcode ID: 9a009f1671ec5a4836b4b124a98f299f2446f6319c4812b78e4396529f0d5e0b
              • Instruction ID: 70edb71385a368b53621a9135a35cede9fb1f6709dfabb17d4097c9db3f49594
              • Opcode Fuzzy Hash: 9a009f1671ec5a4836b4b124a98f299f2446f6319c4812b78e4396529f0d5e0b
              • Instruction Fuzzy Hash: F5310470A24606AFDF10EF58CC859EEB3B5FF14320F008629E865972C1DB71AD1ACB80
              APIs
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
                • Part of subcall function 0023AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0023AABC
              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00238F14
              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00238F27
              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00238F57
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$_memmove$ClassName
              • String ID: ComboBox$ListBox
              • API String ID: 365058703-1403004172
              • Opcode ID: f1012d94dee1dd66866636197e5b921e80f5cbcb45e1b5ec6e9465cf499f53cf
              • Instruction ID: f29bda7bcc6e79c53ebba1c2ddaf56ed363598c2b0a8fc8131861bed700964cb
              • Opcode Fuzzy Hash: f1012d94dee1dd66866636197e5b921e80f5cbcb45e1b5ec6e9465cf499f53cf
              • Instruction Fuzzy Hash: EF2134B1A14208BEEF14ABB0DC89DFFB779EF15320F144529F4219B1E1DF7409199A20
              APIs
              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00267C4A
              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00267C58
              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00267C5F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$DestroyWindow
              • String ID: msctls_updown32$xM
              • API String ID: 4014797782-3939976129
              • Opcode ID: a3023ac9b94f7c3eb3983d8a46165503b5a7fcf82990b39e88a9da6a226a645f
              • Instruction ID: 31572bf741424c3dabe3e2f2c51c07aea2c592a53be6015d27134efda59ed2b7
              • Opcode Fuzzy Hash: a3023ac9b94f7c3eb3983d8a46165503b5a7fcf82990b39e88a9da6a226a645f
              • Instruction Fuzzy Hash: 4F2192B1214219AFEB10DF14ECC5CAB77ECEF5A358B140059F9119B3A1CB71ECA18B60
              APIs
              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0025184C
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00251872
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 002518A2
              • InternetCloseHandle.WININET(00000000), ref: 002518E9
                • Part of subcall function 00252483: GetLastError.KERNEL32(?,?,00251817,00000000,00000000,00000001), ref: 00252498
                • Part of subcall function 00252483: SetEvent.KERNEL32(?,?,00251817,00000000,00000000,00000001), ref: 002524AD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
              • String ID:
              • API String ID: 3113390036-3916222277
              • Opcode ID: 883295cff3570935668fc8122b016e3b2434a87948e59d91521966a300f2e520
              • Instruction ID: 2cd02e20030e6962ccbba256fab7b3f0063bfda787529757823cd58b43ae6ac1
              • Opcode Fuzzy Hash: 883295cff3570935668fc8122b016e3b2434a87948e59d91521966a300f2e520
              • Instruction Fuzzy Hash: C421B0B5520308BFEB219F60DC89FBB77EDEB49746F10412AFC0596240DA709D285BA4
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
              • GetCursorPos.USER32(?), ref: 0026C4D2
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0021B9AB,?,?,?,?,?), ref: 0026C4E7
              • GetCursorPos.USER32(?), ref: 0026C534
              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0021B9AB,?,?,?), ref: 0026C56E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Cursor$LongMenuPopupProcTrackWindow
              • String ID: xM
              • API String ID: 2864067406-315438632
              • Opcode ID: 0706d2dee2cc2f67ede2e1126f211221d8891abb9bd265ba94513907a6119f90
              • Instruction ID: f83836a7a3b208710816d41faa067492ba6cf029bbdb6e652cb589fe3ebbf6d8
              • Opcode Fuzzy Hash: 0706d2dee2cc2f67ede2e1126f211221d8891abb9bd265ba94513907a6119f90
              • Instruction Fuzzy Hash: CD31F535510158AFCF11DF58DC58EFB7BB9EB09310F904065F9469B261CB31ADA0DBA0
              APIs
                • Part of subcall function 001E1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 001E1D73
                • Part of subcall function 001E1D35: GetStockObject.GDI32(00000011), ref: 001E1D87
                • Part of subcall function 001E1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 001E1D91
              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00266461
              • LoadLibraryW.KERNEL32(?), ref: 00266468
              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0026647D
              • DestroyWindow.USER32(?), ref: 00266485
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
              • String ID: SysAnimate32
              • API String ID: 4146253029-1011021900
              • Opcode ID: 94112c3f36b9d3c22e7009d696c7ec773cea676f74709c657bd4d5f37660396a
              • Instruction ID: 91a341cb73b1638aea8e08d2e5792ebe71e8edcc89a5a4e257c96d301c507e88
              • Opcode Fuzzy Hash: 94112c3f36b9d3c22e7009d696c7ec773cea676f74709c657bd4d5f37660396a
              • Instruction Fuzzy Hash: 81218171120246BFEF204F64EC98EBB77ADEF59764F108629FA2093190DB71DCA19760
              APIs
              • GetStdHandle.KERNEL32(0000000C), ref: 00246DBC
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00246DEF
              • GetStdHandle.KERNEL32(0000000C), ref: 00246E01
              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00246E3B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CreateHandle$FilePipe
              • String ID: nul
              • API String ID: 4209266947-2873401336
              • Opcode ID: 09a71ebfc3bdc64a2be65f9788c76a2e13dc47a26c3e77711ae7d8cf4fc5ee9b
              • Instruction ID: fd2acd4839a35af99b0a640b7fbf1a36a967a678932f93fae7beac085ad97445
              • Opcode Fuzzy Hash: 09a71ebfc3bdc64a2be65f9788c76a2e13dc47a26c3e77711ae7d8cf4fc5ee9b
              • Instruction Fuzzy Hash: 35219575A1020AEBDF249F29EC4CA9977F4EF46720F204629FCA1D72D0D77099608B52
              APIs
              • GetStdHandle.KERNEL32(000000F6), ref: 00246E89
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00246EBB
              • GetStdHandle.KERNEL32(000000F6), ref: 00246ECC
              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00246F06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CreateHandle$FilePipe
              • String ID: nul
              • API String ID: 4209266947-2873401336
              • Opcode ID: 48f38c475e7a76587de50e1753414c3fcbba958a503327d73712e7261c8bdeed
              • Instruction ID: 772f897cddd9d3cf3c58126544b8a7a5ec2f110d907a19c71c38d70c5ae21a72
              • Opcode Fuzzy Hash: 48f38c475e7a76587de50e1753414c3fcbba958a503327d73712e7261c8bdeed
              • Instruction Fuzzy Hash: DC21C4796103069BDF249F69DC4CE9A77E8EF46720F204A1AFCA0D32D0D7B09864CB12
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 0024AC54
              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0024ACA8
              • __swprintf.LIBCMT ref: 0024ACC1
              • SetErrorMode.KERNEL32(00000000,00000001,00000000,0026F910), ref: 0024ACFF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorMode$InformationVolume__swprintf
              • String ID: %lu
              • API String ID: 3164766367-685833217
              • Opcode ID: 8ac640e45b935adba8dea3a11ffd640f4dc8bd0ff1903c01200788df57362585
              • Instruction ID: 7adf75c95a9b0fc6a520c533bb0321b5316c738957d4651d9c4659163f7f3689
              • Opcode Fuzzy Hash: 8ac640e45b935adba8dea3a11ffd640f4dc8bd0ff1903c01200788df57362585
              • Instruction Fuzzy Hash: 7B217174A00209AFCB10DF65D985DEE7BB8FF89314B0440A9F909DB252DB71EA51CB61
              APIs
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0023FCED,?,00240D40,?,00008000), ref: 0024115F
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0023FCED,?,00240D40,?,00008000), ref: 00241184
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0023FCED,?,00240D40,?,00008000), ref: 0024118E
              • Sleep.KERNEL32(?,?,?,?,?,?,?,0023FCED,?,00240D40,?,00008000), ref: 002411C1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CounterPerformanceQuerySleep
              • String ID: @$
              • API String ID: 2875609808-108449358
              • Opcode ID: d02fcb03948e948b1d3614ac1261a4b86f9d1b10dba8f0e4d164e0e2fc518352
              • Instruction ID: 8b9c8a2995199e65317194f70cdf6719fd5b7a9018d7bb7f122c53e7c0a305a6
              • Opcode Fuzzy Hash: d02fcb03948e948b1d3614ac1261a4b86f9d1b10dba8f0e4d164e0e2fc518352
              • Instruction Fuzzy Hash: 1C113C31D1061DD7CF049FA5E988AEEBB78FF0A751F004096EA4DB2240DBB095B0DB95
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 00241B19
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID: APPEND$EXISTS$KEYS$REMOVE
              • API String ID: 3964851224-769500911
              • Opcode ID: ffb44e8501bae572d60538dc1d5144f57ae1cd193df29de6a82e70c476212ce9
              • Instruction ID: 464e009654ef645005d6f2fbbb658903f29d23789b64683df7e2879bd09cb94f
              • Opcode Fuzzy Hash: ffb44e8501bae572d60538dc1d5144f57ae1cd193df29de6a82e70c476212ce9
              • Instruction Fuzzy Hash: 941184309202498FCF04EF64D891AFEB7B4FF26708F558465D855A7292EB325D2ACF50
              APIs
              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0025EC07
              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0025EC37
              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0025ED6A
              • CloseHandle.KERNEL32(?), ref: 0025EDEB
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Process$CloseCountersHandleInfoMemoryOpen
              • String ID:
              • API String ID: 2364364464-0
              • Opcode ID: e98e55cacf554137ddec073f9c78487dc74fb9f226ccc35bc3a8b09f653c6406
              • Instruction ID: 95eaeca1d1028e7ca32e03a1592e50b811fc60d6781751e161fbdad79246348d
              • Opcode Fuzzy Hash: e98e55cacf554137ddec073f9c78487dc74fb9f226ccc35bc3a8b09f653c6406
              • Instruction Fuzzy Hash: EA81B0B16007419FDB24EF29C886F2EB7E5AF54710F04881DF999DB292DBB0AD44CB46
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
              • String ID:
              • API String ID: 1559183368-0
              • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
              • Instruction ID: 72c671b74bdd030e42c4ec2f76302432a820f67daadfa3071e6760ef4f4d9446
              • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
              • Instruction Fuzzy Hash: B451BB70A20B16DBDF249F65DC805AF7BB6AF40321F548729F825962D2D7709DB08F41
              APIs
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
                • Part of subcall function 00260E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0025FDAD,?,?), ref: 00260E31
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 002600FD
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0026013C
              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00260183
              • RegCloseKey.ADVAPI32(?,?), ref: 002601AF
              • RegCloseKey.ADVAPI32(00000000), ref: 002601BC
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
              • String ID:
              • API String ID: 3440857362-0
              • Opcode ID: d6710f1bb4d54e64c69028a3fd1f677d28b6c547f92eaa76cb7634b1eab6ceb8
              • Instruction ID: 6a3cb31a06af8008365b071dccb42fcf1cedced662ae672fefeb50d1e48362e2
              • Opcode Fuzzy Hash: d6710f1bb4d54e64c69028a3fd1f677d28b6c547f92eaa76cb7634b1eab6ceb8
              • Instruction Fuzzy Hash: 3B518B71228244AFD704EF58D881E6FB7E9FF84304F40886DF48A872A2DB71E954DB52
              APIs
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0025D927
              • GetProcAddress.KERNEL32(00000000,?), ref: 0025D9AA
              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0025D9C6
              • GetProcAddress.KERNEL32(00000000,?), ref: 0025DA07
              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0025DA21
                • Part of subcall function 001E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00247896,?,?,00000000), ref: 001E5A2C
                • Part of subcall function 001E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00247896,?,?,00000000,?,?), ref: 001E5A50
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
              • String ID:
              • API String ID: 327935632-0
              • Opcode ID: d6ec96cf408c34aeda027bd94716213972c425c77edf748ce079a151469c5576
              • Instruction ID: bd457a08ebe75c02ebeb7582f337ad4aaeae1c5f971e4c590429640dd3fc57f1
              • Opcode Fuzzy Hash: d6ec96cf408c34aeda027bd94716213972c425c77edf748ce079a151469c5576
              • Instruction Fuzzy Hash: BE515635A1064ADFCB10EFA8C4849ADB7F5FF19324B0480A5EC19AB322D770AD55CF90
              APIs
              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0024E61F
              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0024E648
              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0024E687
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0024E6AC
              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0024E6B4
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
              • String ID:
              • API String ID: 1389676194-0
              • Opcode ID: d3f991eeb4bb65fd12be379337230ecc0dd0f1cb708bcc28ae4fbe4cc2af66a2
              • Instruction ID: 496c775bd90879261f5b455be26552c7cbb09018423584a39b63032f2b721886
              • Opcode Fuzzy Hash: d3f991eeb4bb65fd12be379337230ecc0dd0f1cb708bcc28ae4fbe4cc2af66a2
              • Instruction Fuzzy Hash: 94511535A006499FDB04EF65C985AAEBBF5EF19314F1480A9E849AB362CB31ED10CF50
              APIs
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 002363E7
              • TranslateAcceleratorW.USER32(?,?,?), ref: 00236433
              • TranslateMessage.USER32(?), ref: 0023645C
              • DispatchMessageW.USER32(?), ref: 00236466
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00236475
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Message$PeekTranslate$AcceleratorDispatch
              • String ID:
              • API String ID: 2108273632-0
              • Opcode ID: 8dffef7cd66808459855a207d35885a398caa0bdfb7e660b9c464fa380d68915
              • Instruction ID: 7d55626400846ca6a67b3f0ea9928732f8befb46a7c42d933c74f77366dc5d98
              • Opcode Fuzzy Hash: 8dffef7cd66808459855a207d35885a398caa0bdfb7e660b9c464fa380d68915
              • Instruction Fuzzy Hash: EA31C6B1920657BFDB748F70EC4CBB7BBACAB02300F148165E521C31A1EB6594A5DB60
              APIs
              • GetWindowRect.USER32(?,?), ref: 00238A30
              • PostMessageW.USER32(?,00000201,00000001), ref: 00238ADA
              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00238AE2
              • PostMessageW.USER32(?,00000202,00000000), ref: 00238AF0
              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00238AF8
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessagePostSleep$RectWindow
              • String ID:
              • API String ID: 3382505437-0
              • Opcode ID: dba5a44ca1eb44175017a8439bc3f438bc1f5482818b75a1d841189ae73a6291
              • Instruction ID: b2ce645858388b3e4b6f20cabdf435a41425a41cb377ef6a4594a422b8b7f2ed
              • Opcode Fuzzy Hash: dba5a44ca1eb44175017a8439bc3f438bc1f5482818b75a1d841189ae73a6291
              • Instruction Fuzzy Hash: 3D31A2B150021AEBDF14CF68E94DA9E7BB5FB05315F10822AF925EB2D1C7B09924DB90
              APIs
              • IsWindowVisible.USER32(?), ref: 0023B204
              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0023B221
              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0023B259
              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0023B27F
              • _wcsstr.LIBCMT ref: 0023B289
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
              • String ID:
              • API String ID: 3902887630-0
              • Opcode ID: 2b7e9b516c09655812230186a946cbe4ea419862f2bd2e39435e855d94ed0b51
              • Instruction ID: 29a1db178bc5a17b084f9aecc4f080bec29b5853eff616651ecc3f5367ebea83
              • Opcode Fuzzy Hash: 2b7e9b516c09655812230186a946cbe4ea419862f2bd2e39435e855d94ed0b51
              • Instruction Fuzzy Hash: 042128712142017AEB169F75EC49E7F7B9CDF49710F108229FD04DA1A1EFA1CC609660
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
              • GetWindowLongW.USER32(?,000000F0), ref: 0026B192
              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0026B1B7
              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0026B1CF
              • GetSystemMetrics.USER32(00000004), ref: 0026B1F8
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00250E90,00000000), ref: 0026B216
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$Long$MetricsSystem
              • String ID:
              • API String ID: 2294984445-0
              • Opcode ID: 367ed33f345714cfee1a1ab4c17c5a16f044323c496e1057ac2977c9b24de0b0
              • Instruction ID: 3b200b2ee187f0820a8eb37851fb598b33c701f8038daa8d7299eb3b819be098
              • Opcode Fuzzy Hash: 367ed33f345714cfee1a1ab4c17c5a16f044323c496e1057ac2977c9b24de0b0
              • Instruction Fuzzy Hash: E0218071930662AFCB119F38AC18A6A37A4FB06361F114738FD36D71E0E73098E08B90
              APIs
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00239320
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00239352
              • __itow.LIBCMT ref: 0023936A
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00239392
              • __itow.LIBCMT ref: 002393A3
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$__itow$_memmove
              • String ID:
              • API String ID: 2983881199-0
              • Opcode ID: 1e80b3611dc434dfe7071957fd4c2262c02bbcf0d68c251562bc5a68b5ecab00
              • Instruction ID: 5abeca9f5b49446b8f05e8c89e98b90f0c806e643acdba270541dbb81447f1e5
              • Opcode Fuzzy Hash: 1e80b3611dc434dfe7071957fd4c2262c02bbcf0d68c251562bc5a68b5ecab00
              • Instruction Fuzzy Hash: 042107B1724209ABDB10AF659C89EAE3BACEF5A710F044065F905DB1D1D6F08DA18BA1
              APIs
              • IsWindow.USER32(00000000), ref: 00255A6E
              • GetForegroundWindow.USER32 ref: 00255A85
              • GetDC.USER32(00000000), ref: 00255AC1
              • GetPixel.GDI32(00000000,?,00000003), ref: 00255ACD
              • ReleaseDC.USER32(00000000,00000003), ref: 00255B08
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$ForegroundPixelRelease
              • String ID:
              • API String ID: 4156661090-0
              • Opcode ID: e8915578067769beea86dbab2d2883419c3158fa40ab55ec9f9a4985fa153744
              • Instruction ID: 9dbb2b65d0d06f5faa4c38c765d17001aeab16c86b7a5e258e1a4e72315a0a8d
              • Opcode Fuzzy Hash: e8915578067769beea86dbab2d2883419c3158fa40ab55ec9f9a4985fa153744
              • Instruction Fuzzy Hash: 2B219F75A10504AFDB04EF65E998A9EBBE9EF48351F14C079F80997362CBB0AC04CB90
              APIs
              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 001E134D
              • SelectObject.GDI32(?,00000000), ref: 001E135C
              • BeginPath.GDI32(?), ref: 001E1373
              • SelectObject.GDI32(?,00000000), ref: 001E139C
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ObjectSelect$BeginCreatePath
              • String ID:
              • API String ID: 3225163088-0
              • Opcode ID: 9d27472e9116f208b87f7cd5877938a3ecf6b0d5f3d047bc7949d324f813caf2
              • Instruction ID: 6f3e2fdc00882b78e5383de7f5bf11f7f799c9752b3a9a532e5240ea8d91253b
              • Opcode Fuzzy Hash: 9d27472e9116f208b87f7cd5877938a3ecf6b0d5f3d047bc7949d324f813caf2
              • Instruction Fuzzy Hash: 09215931800A58EFDB118F26FD487AE7BE8FB11721F148226E810965B0DBB598D1DF90
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 00244ABA
              • __beginthreadex.LIBCMT ref: 00244AD8
              • MessageBoxW.USER32(?,?,?,?), ref: 00244AED
              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00244B03
              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00244B0A
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
              • String ID:
              • API String ID: 3824534824-0
              • Opcode ID: d8f9b0d61329cf6d21e073a8a63c6cbd112f26df32b88f93957ca04cfb26a688
              • Instruction ID: 481d6e6cf67c9680e6b69c4e06f6c5dc039935a2104a5a2d555ea429b8d501f2
              • Opcode Fuzzy Hash: d8f9b0d61329cf6d21e073a8a63c6cbd112f26df32b88f93957ca04cfb26a688
              • Instruction Fuzzy Hash: D1110876915A15BBCB059FB8FC0CB9B7FACEB46320F154265FD24D3250DAB1C91487A0
              APIs
              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0023821E
              • GetLastError.KERNEL32(?,00237CE2,?,?,?), ref: 00238228
              • GetProcessHeap.KERNEL32(00000008,?,?,00237CE2,?,?,?), ref: 00238237
              • HeapAlloc.KERNEL32(00000000,?,00237CE2,?,?,?), ref: 0023823E
              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00238255
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
              • String ID:
              • API String ID: 842720411-0
              • Opcode ID: 1bf1532ab20a03c61bc3f331f2563d03b2ef9cf704d9c80ba7173d800caa7642
              • Instruction ID: 3e3cb17134baa88d2c1f24876437f8e2edc65c5f914ad76bedfaa7e904779997
              • Opcode Fuzzy Hash: 1bf1532ab20a03c61bc3f331f2563d03b2ef9cf704d9c80ba7173d800caa7642
              • Instruction Fuzzy Hash: 1B016DB1210245BFDF204FA5FD4CD6B7BACFF8A754B504469FC09C6220DAB18C20CA60
              APIs
              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00237044,80070057,?,?,?,00237455), ref: 00237127
              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00237044,80070057,?,?), ref: 00237142
              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00237044,80070057,?,?), ref: 00237150
              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00237044,80070057,?), ref: 00237160
              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00237044,80070057,?,?), ref: 0023716C
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: From$Prog$FreeStringTasklstrcmpi
              • String ID:
              • API String ID: 3897988419-0
              • Opcode ID: dbf2a7e0c416556e17b9f6ffdcbcdb4941f982f0172dc698ab6c08a6d14c8276
              • Instruction ID: 244b4ef7bf5e60746fa0fa86ba74e4f28fd5e9ac2a9e3c24ce7207ca1da5f603
              • Opcode Fuzzy Hash: dbf2a7e0c416556e17b9f6ffdcbcdb4941f982f0172dc698ab6c08a6d14c8276
              • Instruction Fuzzy Hash: 1B017CF3625205ABDF214F64ED48AAA7BADEB447A1F1440A4FD88D3220D7B1DD50DBA0
              APIs
              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00245260
              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0024526E
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00245276
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00245280
              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 002452BC
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: PerformanceQuery$CounterSleep$Frequency
              • String ID:
              • API String ID: 2833360925-0
              • Opcode ID: e7b4a431c07138a0347325ef7bf0cbd2341a8702a5373ab1152da8905d8f2a51
              • Instruction ID: 3beb90c0b2bf3c92a4ecd995b78516a9acfc47d7ce78a824875c89ded541254d
              • Opcode Fuzzy Hash: e7b4a431c07138a0347325ef7bf0cbd2341a8702a5373ab1152da8905d8f2a51
              • Instruction Fuzzy Hash: 95011731D11A2DDBCF04EFE4ED4DAEDBB78BB09711F404196E985B2141CBB055608BA5
              APIs
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00238121
              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0023812B
              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0023813A
              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00238141
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00238157
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: bff5884a1134cbd9923e9f3b527c5bdd1524b69aaa5525a050cb3bae53b0f31a
              • Instruction ID: dbfea5587887c7c934c36d2480936d87bd2c50cbdaf634de01c8a6e64d43830f
              • Opcode Fuzzy Hash: bff5884a1134cbd9923e9f3b527c5bdd1524b69aaa5525a050cb3bae53b0f31a
              • Instruction Fuzzy Hash: 52F062B1210315AFEB510FA5FC8CE673BACFF4A754F104025F989C6150CBA19D51DA60
              APIs
              • GetDlgItem.USER32(?,000003E9), ref: 0023C1F7
              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0023C20E
              • MessageBeep.USER32(00000000), ref: 0023C226
              • KillTimer.USER32(?,0000040A), ref: 0023C242
              • EndDialog.USER32(?,00000001), ref: 0023C25C
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: BeepDialogItemKillMessageTextTimerWindow
              • String ID:
              • API String ID: 3741023627-0
              • Opcode ID: c2f4eb1f95d769ce3f4c942c6cc9d9f0997615caaf3e7eb3c101b74cbf0f1623
              • Instruction ID: 342c6b98a0b3a80a9eed58786106fa5022f5cd6a5d6f5147788f7863ad4f6721
              • Opcode Fuzzy Hash: c2f4eb1f95d769ce3f4c942c6cc9d9f0997615caaf3e7eb3c101b74cbf0f1623
              • Instruction Fuzzy Hash: 1301A270524704ABEF60AF64FE4EB9777BCBB00B06F104269E952A14E0DBF469648B90
              APIs
              • EndPath.GDI32(?), ref: 001E13BF
              • StrokeAndFillPath.GDI32(?,?,0021B888,00000000,?), ref: 001E13DB
              • SelectObject.GDI32(?,00000000), ref: 001E13EE
              • DeleteObject.GDI32 ref: 001E1401
              • StrokePath.GDI32(?), ref: 001E141C
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Path$ObjectStroke$DeleteFillSelect
              • String ID:
              • API String ID: 2625713937-0
              • Opcode ID: 9a84a1011d8b65a17747fe11df72d3a55b6401049df9d1e91428ea1646d4b443
              • Instruction ID: d6153d35b9092e18dd145e89f94147bd3b4f68ee87a572d5b5d4941ec6078bd4
              • Opcode Fuzzy Hash: 9a84a1011d8b65a17747fe11df72d3a55b6401049df9d1e91428ea1646d4b443
              • Instruction Fuzzy Hash: CBF0F230104B48EFDB115F26FD4C7593BE4AB02326F08C224E42A889F2CB798995DF50
              APIs
              • CoInitialize.OLE32(00000000), ref: 0024C432
              • CoCreateInstance.OLE32(00272D6C,00000000,00000001,00272BDC,?), ref: 0024C44A
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
              • CoUninitialize.OLE32 ref: 0024C6B7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CreateInitializeInstanceUninitialize_memmove
              • String ID: .lnk
              • API String ID: 2683427295-24824748
              • Opcode ID: c1ed6044c15f5724238eaeaabcf9834c1f2ed92325759daec74875c1a0be8e85
              • Instruction ID: 31263af241451d167db7d9ea94e588543bd0ae58fb337ce88c7c2d80fffefb34
              • Opcode Fuzzy Hash: c1ed6044c15f5724238eaeaabcf9834c1f2ed92325759daec74875c1a0be8e85
              • Instruction Fuzzy Hash: 6DA138B1104645AFD704EF55C881EAFB7A8FF99358F00492CF1598B1A2EB71AA09CB52
              APIs
                • Part of subcall function 00200DB6: std::exception::exception.LIBCMT ref: 00200DEC
                • Part of subcall function 00200DB6: __CxxThrowException@8.LIBCMT ref: 00200E01
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
                • Part of subcall function 001E7A51: _memmove.LIBCMT ref: 001E7AAB
              • __swprintf.LIBCMT ref: 001F2ECD
              Strings
              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 001F2D66
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
              • API String ID: 1943609520-557222456
              • Opcode ID: 17ef8826b6ba73b44bcba19da201ecf340fb095bfd2f4c4f0f81fa7585ef56d2
              • Instruction ID: 8087d45f95189d32dcbab4af644cd671e4b44b7e16ee7fac9daf888e5497bea1
              • Opcode Fuzzy Hash: 17ef8826b6ba73b44bcba19da201ecf340fb095bfd2f4c4f0f81fa7585ef56d2
              • Instruction Fuzzy Hash: D891BC32118715AFD714EF28D889C7EB7A9EF95314F10081DF981AB2A2EB30ED44CB52
              APIs
                • Part of subcall function 001E4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,001E4743,?,?,001E37AE,?), ref: 001E4770
              • CoInitialize.OLE32(00000000), ref: 0024B9BB
              • CoCreateInstance.OLE32(00272D6C,00000000,00000001,00272BDC,?), ref: 0024B9D4
              • CoUninitialize.OLE32 ref: 0024B9F1
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
              • String ID: .lnk
              • API String ID: 2126378814-24824748
              • Opcode ID: 234bb26ead94a1903e33bb93b7e7804bb4e84464c6e0dffe02306cab9e077ea0
              • Instruction ID: ee98858bcbfd58200ba49c9faf864bdd21e5f53df185ead72a33805a9eeaff99
              • Opcode Fuzzy Hash: 234bb26ead94a1903e33bb93b7e7804bb4e84464c6e0dffe02306cab9e077ea0
              • Instruction Fuzzy Hash: 36A143756042469FCB04DF15C884D6EBBE5FF89318F148998F89A9B3A2CB31EC45CB91
              APIs
              • OleSetContainedObject.OLE32(?,00000001), ref: 0023B4BE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ContainedObject
              • String ID: AutoIt3GUI$Container$%'
              • API String ID: 3565006973-1466662205
              • Opcode ID: 1a809a76a34af1af462fabff3723121e5337d200b06500d8e766cbfc20237424
              • Instruction ID: a2865015fdfbde814f7aa9374bb7e767b6f85805b7c5de8a6d7cce3517147e5c
              • Opcode Fuzzy Hash: 1a809a76a34af1af462fabff3723121e5337d200b06500d8e766cbfc20237424
              • Instruction Fuzzy Hash: 349139B0620601EFDB15DF64C894B6AB7F5FF49710F10856EEA4ACB291DBB0E851CB50
              APIs
              • __startOneArgErrorHandling.LIBCMT ref: 002050AD
                • Part of subcall function 002100F0: __87except.LIBCMT ref: 0021012B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorHandling__87except__start
              • String ID: pow
              • API String ID: 2905807303-2276729525
              • Opcode ID: 49cfb23c9483abc8b0de2c09fc3c9f0cd476fa19de4fac5b8f80c4c339d32b32
              • Instruction ID: 69f2ed4a31551a48129639fe83c72c08db38cfbcd19698f49ae135cec4ace974
              • Opcode Fuzzy Hash: 49cfb23c9483abc8b0de2c09fc3c9f0cd476fa19de4fac5b8f80c4c339d32b32
              • Instruction Fuzzy Hash: 28515B3093870396DB12AF14D8853AF2BD59B64700F208959E4D9862DADEB889F49E86
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _memset$_memmove
              • String ID: ERCP
              • API String ID: 2532777613-1384759551
              • Opcode ID: 89591d5ac0b8dcecc3d6758dc5127cbc72b15fee6261cf93852b1d5239e7703f
              • Instruction ID: d0810175096aa7a0f3b25173bb17931ec84a2327f1d22337b113626722bd760f
              • Opcode Fuzzy Hash: 89591d5ac0b8dcecc3d6758dc5127cbc72b15fee6261cf93852b1d5239e7703f
              • Instruction Fuzzy Hash: DD51A071A10309DBDB24DF69C885BAAB7F4FF04714F20456EE94ACB281E770EA54CB50
              APIs
                • Part of subcall function 002414BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00239296,?,?,00000034,00000800,?,00000034), ref: 002414E6
              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0023983F
                • Part of subcall function 00241487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,002392C5,?,?,00000800,?,00001073,00000000,?,?), ref: 002414B1
                • Part of subcall function 002413DE: GetWindowThreadProcessId.USER32(?,?), ref: 00241409
                • Part of subcall function 002413DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0023925A,00000034,?,?,00001004,00000000,00000000), ref: 00241419
                • Part of subcall function 002413DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0023925A,00000034,?,?,00001004,00000000,00000000), ref: 0024142F
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 002398AC
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 002398F9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
              • String ID: @
              • API String ID: 4150878124-2766056989
              • Opcode ID: f7c8226bd0e90f7ac27c1cb3265251e9ada8bb6aa14410e38217c9da07407355
              • Instruction ID: 88a44cbe3791e3b249200f2e8b79c7b1510f39e78b555954c3c6c89c98b84fe9
              • Opcode Fuzzy Hash: f7c8226bd0e90f7ac27c1cb3265251e9ada8bb6aa14410e38217c9da07407355
              • Instruction Fuzzy Hash: D2415C7690021DAFCB14DFA4CD85ADEBBB8EB4A300F004099FA55B7191DA716E95CFA0
              APIs
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0026F910,00000000,?,?,?,?), ref: 002679DF
              • GetWindowLongW.USER32 ref: 002679FC
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00267A0C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$Long
              • String ID: SysTreeView32
              • API String ID: 847901565-1698111956
              • Opcode ID: 353856120f4b920c65da5531d1ccffb51c5b025163fe43fcfa5f3f6db4565708
              • Instruction ID: 4f20d2a33532b78d43f123e840ed01fd65eed6781560db04b57621424fadc056
              • Opcode Fuzzy Hash: 353856120f4b920c65da5531d1ccffb51c5b025163fe43fcfa5f3f6db4565708
              • Instruction Fuzzy Hash: 1331D231215606ABDF118E78EC45BEA77A9FB05328F244725F975A22E0D730EDA08B50
              APIs
              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00267B61
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00267B76
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: '$xM
              • API String ID: 3850602802-3752091257
              • Opcode ID: 91bead11aa22d881108d662946dfb795d98364b33418f8e2236b844200ae5445
              • Instruction ID: 7fbf742eac1795d4a5eb7dbb4cd6429f05502a27d42ef2fd449a9f17057c9923
              • Opcode Fuzzy Hash: 91bead11aa22d881108d662946dfb795d98364b33418f8e2236b844200ae5445
              • Instruction Fuzzy Hash: 65410A74A1520A9FDB14CFA4D981BDABBB5FB09304F10016AE904AB391D770A991CF90
              APIs
              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00267461
              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00267475
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00267499
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$Window
              • String ID: SysMonthCal32
              • API String ID: 2326795674-1439706946
              • Opcode ID: 8149c619001d3d73604981f1447615e4432b4157731cc7fc8f4d096386768c1b
              • Instruction ID: 34db7f2e566a52eed87f460fa17ebb19285a4e1f14bc869194a56224ed5eadd1
              • Opcode Fuzzy Hash: 8149c619001d3d73604981f1447615e4432b4157731cc7fc8f4d096386768c1b
              • Instruction Fuzzy Hash: 4721A032510219BBDF118F54DC4AFEA3B79EB48724F110114FA156B190DAB5A8A0CBA0
              APIs
              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00266D3B
              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00266D4B
              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00266D70
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$MoveWindow
              • String ID: Listbox
              • API String ID: 3315199576-2633736733
              • Opcode ID: 87adbf5ab19afa9045a542f50b8d268f5d942a2dc05ac5b6fb97b35995fbdd8a
              • Instruction ID: f42e7726ea1803412feba96797facf15ed2d133b674fd8801c71be829b7c1c0a
              • Opcode Fuzzy Hash: 87adbf5ab19afa9045a542f50b8d268f5d942a2dc05ac5b6fb97b35995fbdd8a
              • Instruction Fuzzy Hash: 5F219532620119BFDF118F54DC49EAB3B7AEF89750F118125F9559B1A0CA719CA1CBA0
              APIs
              • __snwprintf.LIBCMT ref: 00253A66
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __snwprintf_memmove
              • String ID: , $$AUTOITCALLVARIABLE%d$%'
              • API String ID: 3506404897-1973242307
              • Opcode ID: 52108caba54e3a713ccd8fbca33a6bd6519cbf608afd6a4acbcf325e09c0935c
              • Instruction ID: df1e5155d3d83ea2dc75d315e01797d0934235233b3fdcb33de9b56195d3b163
              • Opcode Fuzzy Hash: 52108caba54e3a713ccd8fbca33a6bd6519cbf608afd6a4acbcf325e09c0935c
              • Instruction Fuzzy Hash: DE21D030620219AFCF10EF64CC82EAE77B9FF55340F100454F949AB282DB30EA65CB65
              APIs
              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00267772
              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00267787
              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00267794
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: msctls_trackbar32
              • API String ID: 3850602802-1010561917
              • Opcode ID: 5a4ac5e9eeba6aa1b92c2a8724cf2c957f952fbb770b1db6e00e8a83c3f70fc0
              • Instruction ID: 4228d8e1572d869279738c1fc1d9de4020a0a50ccc0a1d89da8251220e869ab0
              • Opcode Fuzzy Hash: 5a4ac5e9eeba6aa1b92c2a8724cf2c957f952fbb770b1db6e00e8a83c3f70fc0
              • Instruction Fuzzy Hash: 69113A72214209BFEF115F65DC05FDB776CEF89B68F114118F641A2090C672E8A1CB20
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __calloc_crt
              • String ID: )$@B*
              • API String ID: 3494438863-3297673903
              • Opcode ID: cf483ad34bef0acab853d330209692ea67653af00dd4d9f0c00652d697c827ca
              • Instruction ID: 14d7fda150d1d6954b742439ff5b2758617a5b326954a01e4f93346add2a9fd5
              • Opcode Fuzzy Hash: cf483ad34bef0acab853d330209692ea67653af00dd4d9f0c00652d697c827ca
              • Instruction Fuzzy Hash: 45F0C8B52247228BFB24DF58BC59BA377A5E701334B100016E500EE1D2EF70887186C4
              APIs
              • GetForegroundWindow.USER32(?,002A57B0,0026D809,000000FC,?,00000000,00000000,?,?,?,0021B969,?,?,?,?,?), ref: 0026ACD1
              • GetFocus.USER32 ref: 0026ACD9
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
                • Part of subcall function 001E25DB: GetWindowLongW.USER32(?,000000EB), ref: 001E25EC
              • SendMessageW.USER32(00EDE900,000000B0,000001BC,000001C0), ref: 0026AD4B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$Long$FocusForegroundMessageSend
              • String ID: xM
              • API String ID: 3601265619-315438632
              • Opcode ID: d6605b7952bbf7a83aa6263f63056367ed0e50e96877d1454296decfbc286fcd
              • Instruction ID: e2485e3ed97cc4b5d4a6b9142844f562ab17da31b507daa6c282a8905fd172fd
              • Opcode Fuzzy Hash: d6605b7952bbf7a83aa6263f63056367ed0e50e96877d1454296decfbc286fcd
              • Instruction Fuzzy Hash: CB0196312005108FC7149F28E898A6677E9FF8A321F184279F425972B1CB31AC96CF51
              APIs
              • GetSystemDirectoryW.KERNEL32(?), ref: 00221775
                • Part of subcall function 0025BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0022195E,?), ref: 0025BFFE
                • Part of subcall function 0025BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0025C010
              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0022196D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Library$AddressDirectoryFreeLoadProcSystem
              • String ID: WIN_XPe$r
              • API String ID: 582185067-2007470913
              • Opcode ID: 2583f582f47e9d3890a027267d38bbf79d925ad7339f11d2bf57676bfa950655
              • Instruction ID: 9cf91314180c56597c0d1f5c1e1b258e874ffbc4df6ca7563d2d018033a26fc6
              • Opcode Fuzzy Hash: 2583f582f47e9d3890a027267d38bbf79d925ad7339f11d2bf57676bfa950655
              • Instruction Fuzzy Hash: 32F0C970824159EFDB25DFA5EA88EECBBF8AF58301F540095E102A2190D7B14FA5DF60
              APIs
              • __lock.LIBCMT ref: 00209B94
                • Part of subcall function 00209C0B: __mtinitlocknum.LIBCMT ref: 00209C1D
                • Part of subcall function 00209C0B: EnterCriticalSection.KERNEL32(00000000,?,00209A7C,0000000D), ref: 00209C36
              • __updatetlocinfoEx_nolock.LIBCMT ref: 00209BA4
                • Part of subcall function 00209100: ___addlocaleref.LIBCMT ref: 0020911C
                • Part of subcall function 00209100: ___removelocaleref.LIBCMT ref: 00209127
                • Part of subcall function 00209100: ___freetlocinfo.LIBCMT ref: 0020913B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
              • String ID: 8)$8)
              • API String ID: 547918592-3781683585
              • Opcode ID: df8d5af35bdf188feeca885cdc2eaa8959d2efb858a1cbd05078ecb533ae7a54
              • Instruction ID: 2c839a1e80ff3a5b7efbce7c9174f20ab2024f8f232026e6cace2aa4706daeac
              • Opcode Fuzzy Hash: df8d5af35bdf188feeca885cdc2eaa8959d2efb858a1cbd05078ecb533ae7a54
              • Instruction Fuzzy Hash: 2AE08C71963305AAEF10FBA46917B097660AB41B39F21215BF09A651C3CDB008A08E57
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,001E4BD0,?,001E4DEF,?,002A52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 001E4C11
              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 001E4C23
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
              • API String ID: 2574300362-3689287502
              • Opcode ID: df3660e564cf1ef891dda20637763bd4673d131dbb34e1b0201401537c46c378
              • Instruction ID: 633d6fc8bb14e54528ffceef88a51e3576769ee76815866bef4da88890da9aae
              • Opcode Fuzzy Hash: df3660e564cf1ef891dda20637763bd4673d131dbb34e1b0201401537c46c378
              • Instruction Fuzzy Hash: 64D01230511B13CFDB209F71EA0860AB6D5EF0A795B11CC79E489D7150E7B0D480C750
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,001E4B83,?), ref: 001E4C44
              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 001E4C56
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
              • API String ID: 2574300362-1355242751
              • Opcode ID: 6a16e5b8919c336fb409e6bcc7aba4bf7b7526953702204ec2463553ca9b9e4f
              • Instruction ID: afabad6a32db31f642bac3d519c1d9908aa798a0c6211254bcb8a3026b99d20d
              • Opcode Fuzzy Hash: 6a16e5b8919c336fb409e6bcc7aba4bf7b7526953702204ec2463553ca9b9e4f
              • Instruction Fuzzy Hash: 53D01230510B13CFDB209F32EA0861A76D4AF0A395B21C879D499D7160E7B4D480C650
              APIs
              • LoadLibraryA.KERNEL32(advapi32.dll,?,00261039), ref: 00260DF5
              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00260E07
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: RegDeleteKeyExW$advapi32.dll
              • API String ID: 2574300362-4033151799
              • Opcode ID: 95f53ff41484df31ab12a0f5adf2eaeafe13795d18a64a93925887d1c2fed3ac
              • Instruction ID: de6784d70b489de2df8f8e106ed93fafebf84e01fc4774971aaf4596afac4133
              • Opcode Fuzzy Hash: 95f53ff41484df31ab12a0f5adf2eaeafe13795d18a64a93925887d1c2fed3ac
              • Instruction Fuzzy Hash: 1AD01270520723CFDB205F75E94864776D5AF06391F51CC7DD485D2150D6B1D8F0C650
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00258CF4,?,0026F910), ref: 002590EE
              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00259100
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: GetModuleHandleExW$kernel32.dll
              • API String ID: 2574300362-199464113
              • Opcode ID: c5e2324896bec82fb940740aa145ae86fb03f08b5cad6125f4a17405dac65ef9
              • Instruction ID: 67842f0ead2a0d47e58b7193dc788cdeadfd16b4cacbfb43fb12f63b21d6244c
              • Opcode Fuzzy Hash: c5e2324896bec82fb940740aa145ae86fb03f08b5cad6125f4a17405dac65ef9
              • Instruction Fuzzy Hash: 3ED01234520723CFDF209F31E91C51676D4AF06396B15C879D88AD6550E7B0C4D0C650
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: LocalTime__swprintf
              • String ID: %.3d$WIN_XPe
              • API String ID: 2070861257-2409531811
              • Opcode ID: 184820abac9ed23a1ba70e8a4f9a67ac3b97c8ff722c8418c379afb2d401ad3c
              • Instruction ID: c0ac98734c9a6c9850a88758a88156dbeaad06eb6e8e266912a14cc71a0f0253
              • Opcode Fuzzy Hash: 184820abac9ed23a1ba70e8a4f9a67ac3b97c8ff722c8418c379afb2d401ad3c
              • Instruction Fuzzy Hash: BDD01271834128FACB1497D0BC99CFDB37CAB69311F500462F406A2040E3A187B5EA25
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d8b780ac40e86903273324d7acc57d64097215a74aa19d0ced47169040427a10
              • Instruction ID: 4d26bfb291c48a6b6e07bfb6dda4b4e0434937d870891eed1e2f2ac3731be1a0
              • Opcode Fuzzy Hash: d8b780ac40e86903273324d7acc57d64097215a74aa19d0ced47169040427a10
              • Instruction Fuzzy Hash: 56C16BB4A14216EFCF24CFA4C884AAEBBB5FF48704F148598E905EB251D730ED91DB90
              APIs
              • CharLowerBuffW.USER32(?,?), ref: 0025E0BE
              • CharLowerBuffW.USER32(?,?), ref: 0025E101
                • Part of subcall function 0025D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0025D7C5
              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0025E301
              • _memmove.LIBCMT ref: 0025E314
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: BuffCharLower$AllocVirtual_memmove
              • String ID:
              • API String ID: 3659485706-0
              • Opcode ID: cf4d02aad53ea8a3d8c54d911406255d8e937869152bb12e8dc3b8dfaecee5ea
              • Instruction ID: 55495bb383c393253d20abb8d1f13792dc2dcf076771a0a33378aaf43ceb3e3e
              • Opcode Fuzzy Hash: cf4d02aad53ea8a3d8c54d911406255d8e937869152bb12e8dc3b8dfaecee5ea
              • Instruction Fuzzy Hash: E3C169716187419FCB08DF28C480A6ABBE4FF89314F05896EF899DB351D730EA49CB85
              APIs
              • CoInitialize.OLE32(00000000), ref: 002580C3
              • CoUninitialize.OLE32 ref: 002580CE
                • Part of subcall function 0023D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0023D5D4
              • VariantInit.OLEAUT32(?), ref: 002580D9
              • VariantClear.OLEAUT32(?), ref: 002583AA
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
              • String ID:
              • API String ID: 780911581-0
              • Opcode ID: c3624006e03272c6ef30f71194d2ab06f431c64dc8aa9ac8507fd42bf820a5ac
              • Instruction ID: e69f25cb309bb551b4dc9e8e34f2eb95db9a76b1dca37efc626fb7cdb2a0c4cc
              • Opcode Fuzzy Hash: c3624006e03272c6ef30f71194d2ab06f431c64dc8aa9ac8507fd42bf820a5ac
              • Instruction Fuzzy Hash: F7A15975214B419FDB00DF15C481A2EB7E4BF99724F148458FD9AAB3A2CBB0ED14CB86
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Variant$AllocClearCopyInitString
              • String ID:
              • API String ID: 2808897238-0
              • Opcode ID: 9b914341571557d0928ac21c6309d31c6abee59d8750c74a95cdcce7d1d35e38
              • Instruction ID: 9d64dd17fd4b11909069dfae1dcb316ec6919de6eb759d84377db90f04df26db
              • Opcode Fuzzy Hash: 9b914341571557d0928ac21c6309d31c6abee59d8750c74a95cdcce7d1d35e38
              • Instruction Fuzzy Hash: 6151A4B4630702AADB24AF65D49DA2EF3EDAF44310F20C81FE596DB291DB70D8608B11
              APIs
              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00239AD2
              • __itow.LIBCMT ref: 00239B03
                • Part of subcall function 00239D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00239DBE
              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00239B6C
              • __itow.LIBCMT ref: 00239BC3
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend$__itow
              • String ID:
              • API String ID: 3379773720-0
              • Opcode ID: c0012d2cf0a28d11bc3fb156352741928a93b51dc4c70a7d0273943881f43300
              • Instruction ID: 17a947e1ce9bc5466db0bf4b3a97d26257d85e96fa51c4bb54edc9ea67832611
              • Opcode Fuzzy Hash: c0012d2cf0a28d11bc3fb156352741928a93b51dc4c70a7d0273943881f43300
              • Instruction Fuzzy Hash: F841E5B0A10349ABDF11EF55D845BFEBBBAEF45714F000019F905A7291DBB09D94CB61
              APIs
              • socket.WSOCK32(00000002,00000002,00000011), ref: 002569D1
              • WSAGetLastError.WSOCK32(00000000), ref: 002569E1
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00256A45
              • WSAGetLastError.WSOCK32(00000000), ref: 00256A51
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ErrorLast$__itow__swprintfsocket
              • String ID:
              • API String ID: 2214342067-0
              • Opcode ID: 89b35a299db55499cb8894f4421c73adc403749048fb05f3e4c71d1969bf5611
              • Instruction ID: 65c2951b3379af0f0acafbbed03b27178f48df0f89a5a652f05975d714c926aa
              • Opcode Fuzzy Hash: 89b35a299db55499cb8894f4421c73adc403749048fb05f3e4c71d1969bf5611
              • Instruction Fuzzy Hash: 7C41C3757006046FEB60AF65DC8AF6D77A4AF54B10F44C028FA599F2D2DBB09D008751
              APIs
              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0026F910), ref: 002564A7
              • _strlen.LIBCMT ref: 002564D9
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _strlen
              • String ID:
              • API String ID: 4218353326-0
              • Opcode ID: 09da7327c312091057d6da554272e9ac38058e32e1eea42d925ffa21811ec13c
              • Instruction ID: b81ef0b5453e5d07fe5029072c68b0f8c2352c06e57e245ecd5ebc1da2bc5979
              • Opcode Fuzzy Hash: 09da7327c312091057d6da554272e9ac38058e32e1eea42d925ffa21811ec13c
              • Instruction Fuzzy Hash: 2541E631A10104AFCB14EBA5EC89FAEB7B9AF14310F948165FD1597292EB70AD14CB54
              APIs
              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0024B89E
              • GetLastError.KERNEL32(?,00000000), ref: 0024B8C4
              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0024B8E9
              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0024B915
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CreateHardLink$DeleteErrorFileLast
              • String ID:
              • API String ID: 3321077145-0
              • Opcode ID: e1d10de68479116615f42a857dcbd5f3a89c6cb26c363a082f2c84025c18bb06
              • Instruction ID: 195027a610584fe80059e11da15d47c49261cd142baa4f457a5713f1b25963e7
              • Opcode Fuzzy Hash: e1d10de68479116615f42a857dcbd5f3a89c6cb26c363a082f2c84025c18bb06
              • Instruction Fuzzy Hash: 80411839600A55DFCB15EF15C584A5DBBE1AF9A310F098098ED4A9B372CB70FD01CB91
              APIs
              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 002161FB
              • __isleadbyte_l.LIBCMT ref: 00216229
              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00216257
              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0021628D
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
              • String ID:
              • API String ID: 3058430110-0
              • Opcode ID: 214a183e2b9121d0dec579ad46415a725a270b72841be1a3a2e7d697bfdda75f
              • Instruction ID: f67140b2ab0bd94aee1a008cb4683a467438406a511ccadcd44f47988b67d18b
              • Opcode Fuzzy Hash: 214a183e2b9121d0dec579ad46415a725a270b72841be1a3a2e7d697bfdda75f
              • Instruction Fuzzy Hash: 7831CE30610246AFEF228F64CC48BFE7BE9BF52310F154029E864871A1E771E9A0DB90
              APIs
              • GetForegroundWindow.USER32 ref: 00264F02
                • Part of subcall function 00243641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0024365B
                • Part of subcall function 00243641: GetCurrentThreadId.KERNEL32 ref: 00243662
                • Part of subcall function 00243641: AttachThreadInput.USER32(00000000,?,00245005), ref: 00243669
              • GetCaretPos.USER32(?), ref: 00264F13
              • ClientToScreen.USER32(00000000,?), ref: 00264F4E
              • GetForegroundWindow.USER32 ref: 00264F54
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
              • String ID:
              • API String ID: 2759813231-0
              • Opcode ID: fc3c3fd6a5757e2c0fc34e67275571000207f790eae822dfcb38b474e1bfb5ad
              • Instruction ID: faa7bdff2feb9783b3e3cf693955bf80376126a65d3bea3f8cce3ccc62f90fa0
              • Opcode Fuzzy Hash: fc3c3fd6a5757e2c0fc34e67275571000207f790eae822dfcb38b474e1bfb5ad
              • Instruction Fuzzy Hash: DB312CB1D10148AFCB04EFA6D9859EFB7FDEF98300F10406AE415E7251DA719E458BA1
              APIs
                • Part of subcall function 0023810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00238121
                • Part of subcall function 0023810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0023812B
                • Part of subcall function 0023810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0023813A
                • Part of subcall function 0023810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00238141
                • Part of subcall function 0023810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00238157
              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 002386A3
              • _memcmp.LIBCMT ref: 002386C6
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002386FC
              • HeapFree.KERNEL32(00000000), ref: 00238703
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
              • String ID:
              • API String ID: 1592001646-0
              • Opcode ID: 211b511acbec9d0dc7da1b66cd4d43003f8c2a0e5b52749dde3c1bf830606f26
              • Instruction ID: 0bdbe817dbba3f5082bf686470443f95eff8a2a36e8370ac2c190ebb8f426829
              • Opcode Fuzzy Hash: 211b511acbec9d0dc7da1b66cd4d43003f8c2a0e5b52749dde3c1bf830606f26
              • Instruction Fuzzy Hash: D4218EB1E10209EFDB10DFA4DA59BEEB7B8EF45304F158059E444AB241DB70AE15CF50
              APIs
              • __setmode.LIBCMT ref: 002009AE
                • Part of subcall function 001E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00247896,?,?,00000000), ref: 001E5A2C
                • Part of subcall function 001E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00247896,?,?,00000000,?,?), ref: 001E5A50
              • _fprintf.LIBCMT ref: 002009E5
              • OutputDebugStringW.KERNEL32(?), ref: 00235DBB
                • Part of subcall function 00204AAA: _flsall.LIBCMT ref: 00204AC3
              • __setmode.LIBCMT ref: 00200A1A
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
              • String ID:
              • API String ID: 521402451-0
              • Opcode ID: b6f11946e4f3fa850065e0c600011512d4f730dfd085134b4d320d40af3b248c
              • Instruction ID: 0b8fbe6445012c0896471965d28bb781612a877a06884293f41024dae593d0b5
              • Opcode Fuzzy Hash: b6f11946e4f3fa850065e0c600011512d4f730dfd085134b4d320d40af3b248c
              • Instruction Fuzzy Hash: 8D1127B1A247486FDB04B6B5AC869BE77A99F55320F208015F205571D3EF6048629BA1
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 002517A3
                • Part of subcall function 0025182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0025184C
                • Part of subcall function 0025182D: InternetCloseHandle.WININET(00000000), ref: 002518E9
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Internet$CloseConnectHandleOpen
              • String ID:
              • API String ID: 1463438336-0
              • Opcode ID: e854caa33cf05ab89ed2eb51dae059ea7cecc72b616b0d104dfec5119bc5278c
              • Instruction ID: 887cf25374664fc8321618f18841ae85ab1e84293e2a33b806503e35b1907644
              • Opcode Fuzzy Hash: e854caa33cf05ab89ed2eb51dae059ea7cecc72b616b0d104dfec5119bc5278c
              • Instruction Fuzzy Hash: 5C21F935210601BFEB265F60DC04F7AB7E9FF48712F104029FD1196550D771D8389B94
              APIs
              • GetFileAttributesW.KERNEL32(?,0026FAC0), ref: 00243A64
              • GetLastError.KERNEL32 ref: 00243A73
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00243A82
              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0026FAC0), ref: 00243ADF
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CreateDirectory$AttributesErrorFileLast
              • String ID:
              • API String ID: 2267087916-0
              • Opcode ID: 665425e25e02eb98be3252c66bbf997ff02849b32724693abd3a0ba9de9b0119
              • Instruction ID: 65512137b16783ac34b822a3b55fe2e2ebe062a4b289a7835e2f009dc90b8366
              • Opcode Fuzzy Hash: 665425e25e02eb98be3252c66bbf997ff02849b32724693abd3a0ba9de9b0119
              • Instruction Fuzzy Hash: 3F21F3701582028F8704DF28D8858AE77E8FE15328F104A2DF4D9C72E1D730DE55CB82
              APIs
              • _free.LIBCMT ref: 00215101
                • Part of subcall function 0020571C: __FF_MSGBANNER.LIBCMT ref: 00205733
                • Part of subcall function 0020571C: __NMSG_WRITE.LIBCMT ref: 0020573A
                • Part of subcall function 0020571C: RtlAllocateHeap.NTDLL(00EC0000,00000000,00000001,00000000,?,?,?,00200DD3,?), ref: 0020575F
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: AllocateHeap_free
              • String ID:
              • API String ID: 614378929-0
              • Opcode ID: 89ab504231f7c225cc47cdd800868a5d70cff3e72cb781d5599ee66fb79ba7a5
              • Instruction ID: 71a57912fca2da69bb5aa7cd43712cda1d6433e8c5ccb256624a2bcbdeb810a6
              • Opcode Fuzzy Hash: 89ab504231f7c225cc47cdd800868a5d70cff3e72cb781d5599ee66fb79ba7a5
              • Instruction Fuzzy Hash: F811E771530B22FFCF222F74BC4979E37D86F65361B1045A9F948D6292DE708CB08A90
              APIs
                • Part of subcall function 001E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00247896,?,?,00000000), ref: 001E5A2C
                • Part of subcall function 001E5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00247896,?,?,00000000,?,?), ref: 001E5A50
              • gethostbyname.WSOCK32(?,?,?), ref: 00256399
              • WSAGetLastError.WSOCK32(00000000), ref: 002563A4
              • _memmove.LIBCMT ref: 002563D1
              • inet_ntoa.WSOCK32(?), ref: 002563DC
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
              • String ID:
              • API String ID: 1504782959-0
              • Opcode ID: b12e14740a44eabc36c00a80eb5811c2b982e2f2ad335e2bfed55131bca11f60
              • Instruction ID: e10958e80d28e37506cfb67d2cca12d30c8edb27988daad2a37adb27c24144fa
              • Opcode Fuzzy Hash: b12e14740a44eabc36c00a80eb5811c2b982e2f2ad335e2bfed55131bca11f60
              • Instruction Fuzzy Hash: E511B231510509AFCF00FFA5EE8ACEEB7B9AF58314B444075F906A7162DB30AE14CB61
              APIs
              • SendMessageW.USER32(?,000000B0,?,?), ref: 00238B61
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00238B73
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00238B89
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00238BA4
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: e0fa544f84f987a806a279efb659b27e9b5f4ca706bf99eb04a31c44bc6ac033
              • Instruction ID: c66467b6b934bb72408f14116d99d7689a817150b53726edd31904f6f1401a69
              • Opcode Fuzzy Hash: e0fa544f84f987a806a279efb659b27e9b5f4ca706bf99eb04a31c44bc6ac033
              • Instruction Fuzzy Hash: 4C113AB9900219BFDB11DF95C884E9DFB79EB48310F204095EA00BB250DA716E11DB94
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
              • DefDlgProcW.USER32(?,00000020,?), ref: 001E12D8
              • GetClientRect.USER32(?,?), ref: 0021B5FB
              • GetCursorPos.USER32(?), ref: 0021B605
              • ScreenToClient.USER32(?,?), ref: 0021B610
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Client$CursorLongProcRectScreenWindow
              • String ID:
              • API String ID: 4127811313-0
              • Opcode ID: 6769049f15347c296852a5d948e7998d8fd91158cbd74e049a51505bd609b80d
              • Instruction ID: d8bb4752c9c9a7b225809f75317a4f60dd2784dad171098bf9d294b3d402ed4a
              • Opcode Fuzzy Hash: 6769049f15347c296852a5d948e7998d8fd91158cbd74e049a51505bd609b80d
              • Instruction Fuzzy Hash: 5E11283590085ABFCF04DFA9ED899EE77B8FB05300F604455FA12E7140C770AA518BA5
              APIs
              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0023D84D
              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0023D864
              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0023D879
              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0023D897
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Type$Register$FileLoadModuleNameUser
              • String ID:
              • API String ID: 1352324309-0
              • Opcode ID: 774c2c458a0f97b11d42e9e344a1b78ab4c012ef17f32183a8aa6f0b8db7e23e
              • Instruction ID: 97220e366ac1ad75dd6f8d60410f4bff2682117f7f225f2db3b5c5da8b8466cb
              • Opcode Fuzzy Hash: 774c2c458a0f97b11d42e9e344a1b78ab4c012ef17f32183a8aa6f0b8db7e23e
              • Instruction Fuzzy Hash: A3113CB5A16304DBE7208F51FD48F92BBA8EB00B00F108969A616D7450D7F0F55A9BA1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
              • String ID:
              • API String ID: 3016257755-0
              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
              • Instruction ID: a8240d36ddcbc143c28cd159fe444649e8eabc9e0bb76679df1090ff278b2869
              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
              • Instruction Fuzzy Hash: CC014B7646824ABFCF165E84CC05CEE3FB6BB6C390F598415FE1858031D236CAB1AB81
              APIs
              • GetWindowRect.USER32(?,?), ref: 0026B2E4
              • ScreenToClient.USER32(?,?), ref: 0026B2FC
              • ScreenToClient.USER32(?,?), ref: 0026B320
              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0026B33B
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ClientRectScreen$InvalidateWindow
              • String ID:
              • API String ID: 357397906-0
              • Opcode ID: a1a68e273ea85df54cb787cc01166e7c8d8b78c8b0795a518cabd6ca0f380103
              • Instruction ID: bb99a398531fffc2210d596b17cd3b5634d293219e97b1fde2e5b9b7300b33c9
              • Opcode Fuzzy Hash: a1a68e273ea85df54cb787cc01166e7c8d8b78c8b0795a518cabd6ca0f380103
              • Instruction Fuzzy Hash: 58114675D0020AEFDB41CF99D5449EEBBB9FB08310F108166E924E3220D775AA658F50
              APIs
              • EnterCriticalSection.KERNEL32(?), ref: 00246BE6
                • Part of subcall function 002476C4: _memset.LIBCMT ref: 002476F9
              • _memmove.LIBCMT ref: 00246C09
              • _memset.LIBCMT ref: 00246C16
              • LeaveCriticalSection.KERNEL32(?), ref: 00246C26
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CriticalSection_memset$EnterLeave_memmove
              • String ID:
              • API String ID: 48991266-0
              • Opcode ID: e144e398c3176b3e646db10a7adbd56902d121db334943ff58250b8b3fe53bdd
              • Instruction ID: e1d81e586c51d60ac7960d4f5ccfb56318062cf9dd42ac1a6a1015889f4a728c
              • Opcode Fuzzy Hash: e144e398c3176b3e646db10a7adbd56902d121db334943ff58250b8b3fe53bdd
              • Instruction Fuzzy Hash: 1CF0543A100200ABCF456F55EC89A4ABB29EF45320F14C061FE085E267C771E821CFB4
              APIs
              • GetSysColor.USER32(00000008), ref: 001E2231
              • SetTextColor.GDI32(?,000000FF), ref: 001E223B
              • SetBkMode.GDI32(?,00000001), ref: 001E2250
              • GetStockObject.GDI32(00000005), ref: 001E2258
              • GetWindowDC.USER32(?,00000000), ref: 0021BE83
              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0021BE90
              • GetPixel.GDI32(00000000,?,00000000), ref: 0021BEA9
              • GetPixel.GDI32(00000000,00000000,?), ref: 0021BEC2
              • GetPixel.GDI32(00000000,?,?), ref: 0021BEE2
              • ReleaseDC.USER32(?,00000000), ref: 0021BEED
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
              • String ID:
              • API String ID: 1946975507-0
              • Opcode ID: 47eb7908ba5392bbe1540974c7e35bf519b3b621a1080250db3f9341a54b4c33
              • Instruction ID: 02dd10e14e4cd6d438c6de2f5e6e28ad61538d61c2fa57fe59c05bbb7cfa92a6
              • Opcode Fuzzy Hash: 47eb7908ba5392bbe1540974c7e35bf519b3b621a1080250db3f9341a54b4c33
              • Instruction Fuzzy Hash: 8BE03932504245AADF615F64FD4D7D83B21EB16336F00C3A6FA69880E187B14990DB12
              APIs
              • GetCurrentThread.KERNEL32 ref: 0023871B
              • OpenThreadToken.ADVAPI32(00000000,?,?,?,002382E6), ref: 00238722
              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,002382E6), ref: 0023872F
              • OpenProcessToken.ADVAPI32(00000000,?,?,?,002382E6), ref: 00238736
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CurrentOpenProcessThreadToken
              • String ID:
              • API String ID: 3974789173-0
              • Opcode ID: d5a53852a203e3e416d143685d7f7d49c8ac9340391ed72e1b571e9e429d7a05
              • Instruction ID: fe55d9c10d272e1668b49388e29843712d26ccbf34288d031b894cf524f9bf07
              • Opcode Fuzzy Hash: d5a53852a203e3e416d143685d7f7d49c8ac9340391ed72e1b571e9e429d7a05
              • Instruction Fuzzy Hash: C4E08677B29312ABDBA05FB07E0CB567BACEF50791F14C828F645CA040DA748451CB50
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID: %'
              • API String ID: 0-2848518416
              • Opcode ID: c4c043ee26872f7163a0c987a5f5bc4d4dfa5931b50db0b0b1cdb6d6ea96436d
              • Instruction ID: e0922479eb238144e90f47eeb848006eb64f3b61fb7cb3e171fbd355fb785318
              • Opcode Fuzzy Hash: c4c043ee26872f7163a0c987a5f5bc4d4dfa5931b50db0b0b1cdb6d6ea96436d
              • Instruction Fuzzy Hash: F1B1A071C0098ADBCF14EF96C8859FEBBB5FF64390F944026E916A7191DB309E81CB91
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __itow_s
              • String ID: xb*$xb*
              • API String ID: 3653519197-1969494452
              • Opcode ID: 05ba425578c71256fc09de4dd1cb46896873a3c563d23ca8e359cb9ea39d26c8
              • Instruction ID: a1677dffae188ee67823cc378af17e00a71b2e1b6a4accd1d568d9970445961b
              • Opcode Fuzzy Hash: 05ba425578c71256fc09de4dd1cb46896873a3c563d23ca8e359cb9ea39d26c8
              • Instruction Fuzzy Hash: 9AB1CD70A1020AEFCB14DF54C895EAEBBB9FF59301F148059FD099B291EB70D994CBA4
              APIs
                • Part of subcall function 001FFC86: _wcscpy.LIBCMT ref: 001FFCA9
                • Part of subcall function 001E9837: __itow.LIBCMT ref: 001E9862
                • Part of subcall function 001E9837: __swprintf.LIBCMT ref: 001E98AC
              • __wcsnicmp.LIBCMT ref: 0024B02D
              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0024B0F6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
              • String ID: LPT
              • API String ID: 3222508074-1350329615
              • Opcode ID: d08b01ce6f13455262c29fa43d85339939b8886146e96de99d615eb7edfacf9f
              • Instruction ID: 643d384eb6a0f1ca2c064613e8543110b4fbf1a6ff71cc10de6e2d72684bd42f
              • Opcode Fuzzy Hash: d08b01ce6f13455262c29fa43d85339939b8886146e96de99d615eb7edfacf9f
              • Instruction Fuzzy Hash: 8F61B075A20219AFCB19DF94C891EAEB7B4EF18710F104069F95AAB3A1D770EE50CB50
              APIs
              • Sleep.KERNEL32(00000000), ref: 001F2968
              • GlobalMemoryStatusEx.KERNEL32(?), ref: 001F2981
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: GlobalMemorySleepStatus
              • String ID: @
              • API String ID: 2783356886-2766056989
              • Opcode ID: dab0a166cce53ad373f4c59e07c9a54638600a8d37f5c5c82927232b05728e24
              • Instruction ID: 7bbbbd54e9aa60bebb1cb595e251b986f3fda943a6fab5587479489223a667f9
              • Opcode Fuzzy Hash: dab0a166cce53ad373f4c59e07c9a54638600a8d37f5c5c82927232b05728e24
              • Instruction Fuzzy Hash: 94514971408B889BD320EF11D886BAFBBE8FF95344F42885DF2D8410A1DB708529CB56
              APIs
                • Part of subcall function 001E4F0B: __fread_nolock.LIBCMT ref: 001E4F29
              • _wcscmp.LIBCMT ref: 00249824
              • _wcscmp.LIBCMT ref: 00249837
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: _wcscmp$__fread_nolock
              • String ID: FILE
              • API String ID: 4029003684-3121273764
              • Opcode ID: edb1a74c7fbcc3a6ae1f81a8ccf1a13ccfad098379a6f9ae5b4568f5ca48953b
              • Instruction ID: 0e6b47f38deef047fd2e8464afdd0f14ec2ecfa11f1ee3df8b64ce52a9956208
              • Opcode Fuzzy Hash: edb1a74c7fbcc3a6ae1f81a8ccf1a13ccfad098379a6f9ae5b4568f5ca48953b
              • Instruction Fuzzy Hash: 0041A271A1021ABBDF249EA5CC45FEFBBBDEF86710F000469F904B7181DB71AA548B61
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ClearVariant
              • String ID: Dd*$Dd*
              • API String ID: 1473721057-3084226301
              • Opcode ID: 586781717a3f27afdabbf039ff5ca9d2c4d5522e83c1febceeb1094c4d6dd6d6
              • Instruction ID: a4cf325617683d25a7d948243ef3123df400e0b2e4d06e7e7125b2400469d6be
              • Opcode Fuzzy Hash: 586781717a3f27afdabbf039ff5ca9d2c4d5522e83c1febceeb1094c4d6dd6d6
              • Instruction Fuzzy Hash: 115103786147829FD754CF1AD488A1ABBF1BF99340F94881CE9858B361D731EC81CF82
              APIs
              • _memset.LIBCMT ref: 0025259E
              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 002525D4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CrackInternet_memset
              • String ID: |
              • API String ID: 1413715105-2343686810
              • Opcode ID: f5e91088d5ba817a02754ea61b18b0773328e9fb77be9de9cb051a5e66fb5fbd
              • Instruction ID: 97b7dac78d653e164839ff7bf5999d7496b133cea1373b5045fc19065da2ced3
              • Opcode Fuzzy Hash: f5e91088d5ba817a02754ea61b18b0773328e9fb77be9de9cb051a5e66fb5fbd
              • Instruction Fuzzy Hash: AF310771810159EBDF01AFA1CC89EEEBFB9FF18310F100059ED14A61A2EB315959DB60
              APIs
              • DestroyWindow.USER32(?,?,?,?), ref: 00266B17
              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00266B53
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$DestroyMove
              • String ID: static
              • API String ID: 2139405536-2160076837
              • Opcode ID: b25bf04419935cdd0b9c0e2f18080ae0d456b3c1d97cdf3688bcecb3a975e5e8
              • Instruction ID: 3f0610b90cc3a6cc9d5357adb88f72e39ff671a95a52b4429d0e0bf6a59e7a42
              • Opcode Fuzzy Hash: b25bf04419935cdd0b9c0e2f18080ae0d456b3c1d97cdf3688bcecb3a975e5e8
              • Instruction Fuzzy Hash: 3331CF71220604AEDB109F65DC84BFB73ACFF48724F108619F9A5E3190DB30ACA1CB60
              APIs
              • _memset.LIBCMT ref: 00242911
              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0024294C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: InfoItemMenu_memset
              • String ID: 0
              • API String ID: 2223754486-4108050209
              • Opcode ID: 7f9a8ebac278f06ac18c1d3c34302b56aacab184778c1628f82c629e6e7b001b
              • Instruction ID: d8378bf5b37cf8e235431d7f46927b23d22309065527e4cbaafcd88b8852dacb
              • Opcode Fuzzy Hash: 7f9a8ebac278f06ac18c1d3c34302b56aacab184778c1628f82c629e6e7b001b
              • Instruction Fuzzy Hash: 19310631620306DFEF2CCF4AC885BAEBBF8EF45350F640019F881A61A1D7709968CB11
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
                • Part of subcall function 001E25DB: GetWindowLongW.USER32(?,000000EB), ref: 001E25EC
              • GetParent.USER32(?), ref: 0021B7BA
              • DefDlgProcW.USER32(?,00000133,?,?,?,?,?,?,?,?,001E19B3,?,?,?,00000006,?), ref: 0021B834
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: LongWindow$ParentProc
              • String ID: xM
              • API String ID: 2181805148-315438632
              • Opcode ID: 54f9ba8adc123f7c74adfe6cae724168f92eb1c115818742c67298af4cbd4ef7
              • Instruction ID: 38eeddbc493cc88848854d16694e9b15d5caaf7d21f48fb4f748b9c858bba290
              • Opcode Fuzzy Hash: 54f9ba8adc123f7c74adfe6cae724168f92eb1c115818742c67298af4cbd4ef7
              • Instruction Fuzzy Hash: 1E21F234600994BFCB218F29DC89DEE3BE6AF1A720F544250F5265B2F1CB309D62DB50
              APIs
              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00266761
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0026676C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: Combobox
              • API String ID: 3850602802-2096851135
              • Opcode ID: 65ef6f8673327690fc48bd7a6645b11cabcd15aee095c6ef27a8fb05d9dec10e
              • Instruction ID: f46d34e7d974fc164eb2d45983eca55602bb0a6482690831b78b741685c5db04
              • Opcode Fuzzy Hash: 65ef6f8673327690fc48bd7a6645b11cabcd15aee095c6ef27a8fb05d9dec10e
              • Instruction Fuzzy Hash: B511B271220209BFEF128F54DC88EBBB76EEB48368F104129F91497290D675DCA18BA0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID: xM
              • API String ID: 0-315438632
              • Opcode ID: 2360b20f20f0433be0876ccabf44572c03ecb17db97150bfa0b97036a66cd7fb
              • Instruction ID: 6d197c2c7c9d161a99d4797ee4faddb456b8d1051d2f5478c96f8cccd83b5abb
              • Opcode Fuzzy Hash: 2360b20f20f0433be0876ccabf44572c03ecb17db97150bfa0b97036a66cd7fb
              • Instruction Fuzzy Hash: 5721A2B1134119BFDB128F54CC45FBAB7ACEB09310F404155FA12DA1E0CAB1E9E0DB60
              APIs
                • Part of subcall function 001E1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 001E1D73
                • Part of subcall function 001E1D35: GetStockObject.GDI32(00000011), ref: 001E1D87
                • Part of subcall function 001E1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 001E1D91
              • GetWindowRect.USER32(00000000,?), ref: 00266C71
              • GetSysColor.USER32(00000012), ref: 00266C8B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Window$ColorCreateMessageObjectRectSendStock
              • String ID: static
              • API String ID: 1983116058-2160076837
              • Opcode ID: 9eab076e3ebe46923ddea3fab6f97882351d58632b2d83ae2842dc62d8995db5
              • Instruction ID: d4328c5679bf65aba58846e05aca3f777f372da158eebf1b35c7d7167e001618
              • Opcode Fuzzy Hash: 9eab076e3ebe46923ddea3fab6f97882351d58632b2d83ae2842dc62d8995db5
              • Instruction Fuzzy Hash: A521297252060AAFDF04DFA8DD49AEA7BA8FB08314F004629FD95D2250D775E8A0DB60
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CreateMenuPopup
              • String ID: xM
              • API String ID: 3826294624-315438632
              • Opcode ID: 827fdf879aeef0a31fde759a3e2ade06be79c1e1e23fb8d35e47b21c51e67f56
              • Instruction ID: bca13f190558d2adc65aacfaa59965f1deb7a55b8fff4d0380d3b5b2785568dc
              • Opcode Fuzzy Hash: 827fdf879aeef0a31fde759a3e2ade06be79c1e1e23fb8d35e47b21c51e67f56
              • Instruction Fuzzy Hash: 8121907851060ADFDB11CF28D448BD6B7E2FB0A325F088169E8598B391C731ACA6CF51
              APIs
              • GetWindowTextLengthW.USER32(00000000), ref: 002669A2
              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 002669B1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: LengthMessageSendTextWindow
              • String ID: edit
              • API String ID: 2978978980-2167791130
              • Opcode ID: ab90623e7aa6e86263791b8ccb09c7faa6bb78b9de5e4f36745bfad7a458e725
              • Instruction ID: ec2d71b751748e4f80c9cdd41ecea9f87bf42155d85764fde9e69ce15f46759d
              • Opcode Fuzzy Hash: ab90623e7aa6e86263791b8ccb09c7faa6bb78b9de5e4f36745bfad7a458e725
              • Instruction Fuzzy Hash: 14114F71521105ABEF108E74EC49AEB3769EB05374F504724FDA5A71E0C771DCA19B60
              APIs
              • _memset.LIBCMT ref: 00242A22
              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00242A41
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: InfoItemMenu_memset
              • String ID: 0
              • API String ID: 2223754486-4108050209
              • Opcode ID: f01cfd0a64e1af9863305280fb606fb62fcdef561e1e6671f6e492d792a7bcfd
              • Instruction ID: 818fddaf28950931772c3ce7f018a275df6c7ddbff0ec0c9944d5ac19e620044
              • Opcode Fuzzy Hash: f01cfd0a64e1af9863305280fb606fb62fcdef561e1e6671f6e492d792a7bcfd
              • Instruction Fuzzy Hash: F611B132921135EBCB38DE99D848B9AB3BCAB46304F944021FC55E7290D770AD5ECB91
              APIs
              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0025222C
              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00252255
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Internet$OpenOption
              • String ID: <local>
              • API String ID: 942729171-4266983199
              • Opcode ID: 33bfeb3953337e9e7d66ece2c6ed5256c4dac540f30f59647c573fba1aa61f4b
              • Instruction ID: 855520a46ef3007bb220142960910bf63b6e55fe7939201c85b81de9d0295ebc
              • Opcode Fuzzy Hash: 33bfeb3953337e9e7d66ece2c6ed5256c4dac540f30f59647c573fba1aa61f4b
              • Instruction Fuzzy Hash: 2411C174521226FADB258F119C88EB7FBACFB17352F10822AFD1486080D2B0586CD6F4
              APIs
              • SendMessageW.USER32(?,?,?,?), ref: 00268530
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: xM
              • API String ID: 3850602802-315438632
              • Opcode ID: f054cb4668d30fa84c8805fa3cc0894909d5465dd036412f823b789db9ac8771
              • Instruction ID: 2cc0f25f4997f275588f52bd9a7a7a4ae3ddf644fd6cca91d052a5df2e2b096a
              • Opcode Fuzzy Hash: f054cb4668d30fa84c8805fa3cc0894909d5465dd036412f823b789db9ac8771
              • Instruction Fuzzy Hash: 1A21067561020AEFCB15CF94D8408AA7BB9FB4D340B414254FD12A7360DA31ADA1DBA0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID:
              • String ID: xM
              • API String ID: 0-315438632
              • Opcode ID: 335824fdc19228a31616b3baab0d3d7c6e17f83486231db80834e0c742d1d599
              • Instruction ID: 8557958e688558f422cb2c73d4350a9662b2935729439d7259ce54ea7ff10720
              • Opcode Fuzzy Hash: 335824fdc19228a31616b3baab0d3d7c6e17f83486231db80834e0c742d1d599
              • Instruction Fuzzy Hash: D3115834610605AFCB21DF29D844EA9BBF6BB59320F148219F9298B7A0C771ED91CF90
              APIs
              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,001E3C14,002A52F8,?,?,?), ref: 001F096E
                • Part of subcall function 001E7BCC: _memmove.LIBCMT ref: 001E7C06
              • _wcscat.LIBCMT ref: 00224CB7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FullNamePath_memmove_wcscat
              • String ID: i
              • API String ID: 257928180-1498560215
              • Opcode ID: 1796d9b021eac5e417876a21cb6dc930d1bfedeb9daa6ee7593c839f3333c745
              • Instruction ID: de517500b053a7d6797b8f0160ab78f2e88f8b552f498a470478d2631ac273ff
              • Opcode Fuzzy Hash: 1796d9b021eac5e417876a21cb6dc930d1bfedeb9daa6ee7593c839f3333c745
              • Instruction Fuzzy Hash: D711A93191561DAB9F45FBA4DD05EDE73E8BF18340B0044A6FA48D3182EFF096944B10
              APIs
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
                • Part of subcall function 0023AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0023AABC
              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00238E73
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ClassMessageNameSend_memmove
              • String ID: ComboBox$ListBox
              • API String ID: 372448540-1403004172
              • Opcode ID: 263af0ef5ccedda3ef1883ed778c32d401a83e724e266b961ba53242311cb611
              • Instruction ID: bdfbd651f78e0ddc509d0ef4faa4c0d09c598f796f261602e5fed67fa559f1ca
              • Opcode Fuzzy Hash: 263af0ef5ccedda3ef1883ed778c32d401a83e724e266b961ba53242311cb611
              • Instruction Fuzzy Hash: B101F1B1A25219AB9F14EBA0CC458FE7369FF12320F000A19F8715B2E2DF315828D660
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __fread_nolock_memmove
              • String ID: EA06
              • API String ID: 1988441806-3962188686
              • Opcode ID: 5edf21a50e43938a5cb7466d787be385206b2ab884336459fdd106c249737ea5
              • Instruction ID: 5b63546168db998fbaa4f63efae50c2006b1b4e4f07b53eb230c2efc435708b2
              • Opcode Fuzzy Hash: 5edf21a50e43938a5cb7466d787be385206b2ab884336459fdd106c249737ea5
              • Instruction Fuzzy Hash: 9401B971D142187EDB18CAA8CC56EEE7BFCDB15311F00459AF552D21C1E975A6148B60
              APIs
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
                • Part of subcall function 0023AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0023AABC
              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00238D6B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ClassMessageNameSend_memmove
              • String ID: ComboBox$ListBox
              • API String ID: 372448540-1403004172
              • Opcode ID: ab47cba51dea0495c38736bf369d7c326b476c700747f30cd84cd2c21b14adbe
              • Instruction ID: 5677ed5a8e748ff19160e2a2c4404db467ae3906927a0cf78b0f8b67589dd541
              • Opcode Fuzzy Hash: ab47cba51dea0495c38736bf369d7c326b476c700747f30cd84cd2c21b14adbe
              • Instruction Fuzzy Hash: AB0124B1A2020DABDF14EBE0C942AFE73B8EF21300F100029B801672E2DF104E18D671
              APIs
                • Part of subcall function 001E7DE1: _memmove.LIBCMT ref: 001E7E22
                • Part of subcall function 0023AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0023AABC
              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00238DEE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ClassMessageNameSend_memmove
              • String ID: ComboBox$ListBox
              • API String ID: 372448540-1403004172
              • Opcode ID: 8f353f510e4e03e66de7169a2919a79123a8bb74f524809d9eb9e865d1e5e14b
              • Instruction ID: 69208b785c651e0e00aa898ef94b6c2ac3abe67a43f583a809e0f5d2fe1a2ac5
              • Opcode Fuzzy Hash: 8f353f510e4e03e66de7169a2919a79123a8bb74f524809d9eb9e865d1e5e14b
              • Instruction Fuzzy Hash: 0F01F7B1A6520DA7DF11EAA4C942AFE77ACEF21300F100025B805672D2DF114E28D671
              APIs
                • Part of subcall function 002099AC: __getptd_noexit.LIBCMT ref: 002099AD
              • __lock.LIBCMT ref: 00209443
              • _free.LIBCMT ref: 00209470
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: __getptd_noexit__lock_free
              • String ID: `
              • API String ID: 1533244847-4168407445
              • Opcode ID: 63d4da09e552c68ff036cf1ba9d2090046d0ca057d3637ddbe4cb1399c716218
              • Instruction ID: de466e122c58aa7e9cfc6a881f2398a33f050e5cbd9fad1a1b788e1594887c68
              • Opcode Fuzzy Hash: 63d4da09e552c68ff036cf1ba9d2090046d0ca057d3637ddbe4cb1399c716218
              • Instruction Fuzzy Hash: F0118432D217269BCB21EF68940575DB3B0BB45B20B16411AE896A72D3CB705DE3CFC6
              APIs
              • VariantInit.OLEAUT32(?), ref: 0023C534
                • Part of subcall function 0023C816: _memmove.LIBCMT ref: 0023C860
                • Part of subcall function 0023C816: VariantInit.OLEAUT32(00000000), ref: 0023C882
                • Part of subcall function 0023C816: VariantCopy.OLEAUT32(00000000,?), ref: 0023C88C
              • VariantClear.OLEAUT32(?), ref: 0023C556
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: Variant$Init$ClearCopy_memmove
              • String ID: d})
              • API String ID: 2932060187-1757160761
              • Opcode ID: 821e9d07ef37ef00d49ae89a1a116d441f59ad29c072da1340bf2c9aba315b7f
              • Instruction ID: e95afd9f2ab28b2aad0cd911f06f2028aac82395895ce9505aafdc9376836421
              • Opcode Fuzzy Hash: 821e9d07ef37ef00d49ae89a1a116d441f59ad29c072da1340bf2c9aba315b7f
              • Instruction Fuzzy Hash: 84111EB19007089FCB10DFAAD88489AF7F8FF18314B50862EE58AD7611E771AA45CF90
              APIs
                • Part of subcall function 001E2612: GetWindowLongW.USER32(?,000000EB), ref: 001E2623
              • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,0021B93A,?,?,?), ref: 0026C5F1
                • Part of subcall function 001E25DB: GetWindowLongW.USER32(?,000000EB), ref: 001E25EC
              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 0026C5D7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: LongWindow$MessageProcSend
              • String ID: xM
              • API String ID: 982171247-315438632
              • Opcode ID: 5d7a10270c9d3f64765713071b811aed489453cde908c9378d5d277121a18037
              • Instruction ID: 9a654270484a3da6b12e834f8b2bf2547e883a74242d9272327711f564772dd9
              • Opcode Fuzzy Hash: 5d7a10270c9d3f64765713071b811aed489453cde908c9378d5d277121a18037
              • Instruction Fuzzy Hash: 9601B531210614ABCB216F14DC58E7B7BA6FF89360F644124F9662B2E0CB71ACA1DF91
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: ClassName_wcscmp
              • String ID: #32770
              • API String ID: 2292705959-463685578
              • Opcode ID: a0c00a6351a450ca9ab49e4161c4d4bffbd15c3afdd86b79f2591449275462d8
              • Instruction ID: 55809864073197668c4dc337d4cdd8ba3b6b093be9af106656b562fa6da8cbae
              • Opcode Fuzzy Hash: a0c00a6351a450ca9ab49e4161c4d4bffbd15c3afdd86b79f2591449275462d8
              • Instruction Fuzzy Hash: D0E0D13291432927D710EB55BC4DFA7F7ACDB45B70F410057FD04D3051D9609A5587D0
              APIs
                • Part of subcall function 0021B314: _memset.LIBCMT ref: 0021B321
                • Part of subcall function 00200940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0021B2F0,?,?,?,001E100A), ref: 00200945
              • IsDebuggerPresent.KERNEL32(?,?,?,001E100A), ref: 0021B2F4
              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,001E100A), ref: 0021B303
              Strings
              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0021B2FE
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
              • API String ID: 3158253471-631824599
              • Opcode ID: 03a9603693b672e190aa2f1b534b1fd795a9a45e447c2050572c1d4d7f7511e2
              • Instruction ID: a3d5f6c4224ccb7caf400f491b60731deb64e793396e60fee528db76e22a2b20
              • Opcode Fuzzy Hash: 03a9603693b672e190aa2f1b534b1fd795a9a45e447c2050572c1d4d7f7511e2
              • Instruction Fuzzy Hash: 2DE06D74220751CBE761EF28E5087867AE4EF14704F0089ACE856C7681EBB4E4A8CFA1
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0026596E
              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00265981
                • Part of subcall function 00245244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 002452BC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: dd4634927e1524dd76ba47c7b2f17c6edfebb4e8e9f31295699f851801f91387
              • Instruction ID: b541f2b3ceee40f415589b72c08103f355bd5d394bc9204e51aa3237af1f4f2e
              • Opcode Fuzzy Hash: dd4634927e1524dd76ba47c7b2f17c6edfebb4e8e9f31295699f851801f91387
              • Instruction Fuzzy Hash: C8D0A931390311B7EAA8AB30BC0FFA22A14AB02B00F010826B64AAA0D0C8E09800CA90
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 002659AE
              • PostMessageW.USER32(00000000), ref: 002659B5
                • Part of subcall function 00245244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 002452BC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2246549404.00000000001E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001E0000, based on PE: true
              • Associated: 00000000.00000002.2246531073.00000000001E0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246597083.0000000000294000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246673436.000000000029E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2246691233.00000000002A7000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1e0000_lExtvSjBgq.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: 5ce8f4b2f7670314e13d523c6dc29ce8849b77828621407995dd3e4c049cf8b7
              • Instruction ID: b248b4e2c3a173cf93724ae36d8ea75666f56a6ad3ceddd8ef6c883f9e05e6c6
              • Opcode Fuzzy Hash: 5ce8f4b2f7670314e13d523c6dc29ce8849b77828621407995dd3e4c049cf8b7
              • Instruction Fuzzy Hash: 58D0A9313803117BEAA8AB30BC0FF922614AB02B00F010826B646AA0D0C8E0A800CA94