Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ql8KpEHT7y.exe

Overview

General Information

Sample name:ql8KpEHT7y.exe
renamed because original name is a hash value
Original sample name:ff114595667cf12d185e3e147290d41d4f91b8c2a065812741e540e99c2f0db0.exe
Analysis ID:1587685
MD5:43743091973b08e4265bb937d78d0522
SHA1:142851ffb4aa49a41edb2bfb83d8459138582b27
SHA256:ff114595667cf12d185e3e147290d41d4f91b8c2a065812741e540e99c2f0db0
Tags:exeuser-adrian__luca
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Writes to foreign memory regions
Yara detected Generic Downloader
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ql8KpEHT7y.exe (PID: 7556 cmdline: "C:\Users\user\Desktop\ql8KpEHT7y.exe" MD5: 43743091973B08E4265BB937D78D0522)
    • RegSvcs.exe (PID: 7704 cmdline: "C:\Users\user\Desktop\ql8KpEHT7y.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
      • cmd.exe (PID: 7864 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 7924 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8124248958:AAHHSH6MqAJrQq3xcmINDov2O7_xgCmxgPE/sendMessage?chat_id=5808310347", "Token": "8124248958:AAHHSH6MqAJrQq3xcmINDov2O7_xgCmxgPE", "Chat_id": "5808310347", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x14a3e:$a1: get_encryptedPassword
        • 0x14d2a:$a2: get_encryptedUsername
        • 0x1484a:$a3: get_timePasswordChanged
        • 0x14945:$a4: get_passwordField
        • 0x14a54:$a5: set_encryptedPassword
        • 0x16115:$a7: get_logins
        • 0x16078:$a10: KeyLoggerEventArgs
        • 0x15ce3:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1c3f6:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1b628:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1ba5b:$a4: \Orbitum\User Data\Default\Login Data
        • 0x1ca9a:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x14a3e:$a1: get_encryptedPassword
              • 0x14d2a:$a2: get_encryptedUsername
              • 0x1484a:$a3: get_timePasswordChanged
              • 0x14945:$a4: get_passwordField
              • 0x14a54:$a5: set_encryptedPassword
              • 0x16115:$a7: get_logins
              • 0x16078:$a10: KeyLoggerEventArgs
              • 0x15ce3:$a11: KeyLoggerEventArgsEventHandler
              0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x1c3f6:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x1b628:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x1ba5b:$a4: \Orbitum\User Data\Default\Login Data
              • 0x1ca9a:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 15 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-10T16:54:41.572056+010028033053Unknown Traffic192.168.2.749707104.21.96.1443TCP
              2025-01-10T16:54:42.845450+010028033053Unknown Traffic192.168.2.749718104.21.96.1443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-10T16:54:39.875479+010028032742Potentially Bad Traffic192.168.2.749699193.122.6.16880TCP
              2025-01-10T16:54:40.984881+010028032742Potentially Bad Traffic192.168.2.749699193.122.6.16880TCP
              2025-01-10T16:54:42.282079+010028032742Potentially Bad Traffic192.168.2.749713193.122.6.16880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000003.00000002.1442240916.00000000026A1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot8124248958:AAHHSH6MqAJrQq3xcmINDov2O7_xgCmxgPE/sendMessage?chat_id=5808310347", "Token": "8124248958:AAHHSH6MqAJrQq3xcmINDov2O7_xgCmxgPE", "Chat_id": "5808310347", "Version": "5.1"}
              Source: ql8KpEHT7y.exeVirustotal: Detection: 69%Perma Link
              Source: ql8KpEHT7y.exeReversingLabs: Detection: 73%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: ql8KpEHT7y.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: ql8KpEHT7y.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.7:49701 version: TLS 1.0
              Source: Binary string: wntdll.pdbUGP source: ql8KpEHT7y.exe, 00000000.00000003.1330996815.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, ql8KpEHT7y.exe, 00000000.00000003.1330310187.0000000003F10000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: ql8KpEHT7y.exe, 00000000.00000003.1330996815.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, ql8KpEHT7y.exe, 00000000.00000003.1330310187.0000000003F10000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0079445A
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079C6D1 FindFirstFileW,FindClose,0_2_0079C6D1
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0079C75C
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0079EF95
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0079F0F2
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0079F3F3
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007937EF
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00793B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00793B12
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0079BCBC

              Networking

              barindex
              Source: Yara matchFile source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: global trafficTCP traffic: 192.168.2.7:61846 -> 162.159.36.2:53
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
              Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49713 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49699 -> 193.122.6.168:80
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49707 -> 104.21.96.1:443
              Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49718 -> 104.21.96.1:443
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.7:49701 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007A22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007A22EE
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RegSvcs.exe, 00000003.00000002.1442240916.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000280E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000276D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002800000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002829000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000003.00000002.1442240916.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000275E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000280E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000276D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.00000000027B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002800000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002837000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002829000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000003.00000002.1442240916.00000000026A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: ql8KpEHT7y.exe, 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000003.00000002.1442240916.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002785000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000280E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002800000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002829000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000003.00000002.1442240916.00000000026A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000003.00000002.1442240916.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000280E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000276D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.00000000027B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002800000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002829000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: ql8KpEHT7y.exe, 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000276D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
              Source: RegSvcs.exe, 00000003.00000002.1442240916.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000280E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.00000000027B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002800000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002829000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
              Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007A4164
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007A4164
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007A3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007A3F66
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0079001C
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007BCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_007BCABC

              System Summary

              barindex
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: ql8KpEHT7y.exe PID: 7556, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: ql8KpEHT7y.exe PID: 7556, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: RegSvcs.exe PID: 7704, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 7704, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: This is a third-party compiled AutoIt script.0_2_00733B3A
              Source: ql8KpEHT7y.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: ql8KpEHT7y.exe, 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6e8f7663-3
              Source: ql8KpEHT7y.exe, 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_17c69977-2
              Source: ql8KpEHT7y.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8dc5017c-9
              Source: ql8KpEHT7y.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_00c50f54-5
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0079A1EF
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00788310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00788310
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007951BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007951BD
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0073E6A00_2_0073E6A0
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0075D9750_2_0075D975
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0073FCE00_2_0073FCE0
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007521C50_2_007521C5
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007662D20_2_007662D2
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007B03DA0_2_007B03DA
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0076242E0_2_0076242E
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007525FA0_2_007525FA
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0078E6160_2_0078E616
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007466E10_2_007466E1
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0076878F0_2_0076878F
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007B08570_2_007B0857
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007668440_2_00766844
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007488080_2_00748808
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007988890_2_00798889
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0075CB210_2_0075CB21
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00766DB60_2_00766DB6
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00746F9E0_2_00746F9E
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007430300_2_00743030
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0075F1D90_2_0075F1D9
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007531870_2_00753187
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007312870_2_00731287
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007514840_2_00751484
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007455200_2_00745520
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007576960_2_00757696
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007457600_2_00745760
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007519780_2_00751978
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00769AB50_2_00769AB5
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007B7DDB0_2_007B7DDB
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0075BDA60_2_0075BDA6
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00751D900_2_00751D90
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0073DF000_2_0073DF00
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00743FE00_2_00743FE0
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_015393380_2_01539338
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0093C1923_2_0093C192
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_009361083_2_00936108
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0093B3283_2_0093B328
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0093C4703_2_0093C470
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_009367303_2_00936730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0093C7513_2_0093C751
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_009398583_2_00939858
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00934AD93_2_00934AD9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0093CA313_2_0093CA31
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0093BBD23_2_0093BBD2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0093BEB23_2_0093BEB2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0093B4F23_2_0093B4F2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_009335703_2_00933570
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: String function: 00750AE3 appears 70 times
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: String function: 00737DE1 appears 36 times
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: String function: 00758900 appears 42 times
              Source: ql8KpEHT7y.exe, 00000000.00000003.1329909695.000000000403D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ql8KpEHT7y.exe
              Source: ql8KpEHT7y.exe, 00000000.00000003.1330584786.0000000003EC3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ql8KpEHT7y.exe
              Source: ql8KpEHT7y.exe, 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs ql8KpEHT7y.exe
              Source: ql8KpEHT7y.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: ql8KpEHT7y.exe PID: 7556, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: ql8KpEHT7y.exe PID: 7556, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: RegSvcs.exe PID: 7704, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 7704, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: classification engineClassification label: mal100.troj.evad.winEXE@8/3@2/2
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079A06A GetLastError,FormatMessageW,0_2_0079A06A
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007881CB AdjustTokenPrivileges,CloseHandle,0_2_007881CB
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007887E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007887E1
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0079B333
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007AEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_007AEE0D
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007A83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_007A83BB
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00734E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00734E89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.logJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7876:120:WilError_03
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeFile created: C:\Users\user~1\AppData\Local\Temp\aut2938.tmpJump to behavior
              Source: ql8KpEHT7y.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: ql8KpEHT7y.exeVirustotal: Detection: 69%
              Source: ql8KpEHT7y.exeReversingLabs: Detection: 73%
              Source: unknownProcess created: C:\Users\user\Desktop\ql8KpEHT7y.exe "C:\Users\user\Desktop\ql8KpEHT7y.exe"
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ql8KpEHT7y.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ql8KpEHT7y.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
              Source: ql8KpEHT7y.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: ql8KpEHT7y.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: ql8KpEHT7y.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: ql8KpEHT7y.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: ql8KpEHT7y.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: ql8KpEHT7y.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: ql8KpEHT7y.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: ql8KpEHT7y.exe, 00000000.00000003.1330996815.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, ql8KpEHT7y.exe, 00000000.00000003.1330310187.0000000003F10000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: ql8KpEHT7y.exe, 00000000.00000003.1330996815.0000000003DA0000.00000004.00001000.00020000.00000000.sdmp, ql8KpEHT7y.exe, 00000000.00000003.1330310187.0000000003F10000.00000004.00001000.00020000.00000000.sdmp
              Source: ql8KpEHT7y.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: ql8KpEHT7y.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: ql8KpEHT7y.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: ql8KpEHT7y.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: ql8KpEHT7y.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00734B37 LoadLibraryA,GetProcAddress,0_2_00734B37
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0073C4C7 push A30073BAh; retn 0073h0_2_0073C50D
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00758945 push ecx; ret 0_2_00758958
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007348D7
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007B5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_007B5376
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00753187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00753187
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeAPI/Special instruction interceptor: Address: 1538F5C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599670Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599124Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598577Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598312Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598187Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598072Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597968Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597638Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597531Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597421Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597312Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597200Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597093Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596984Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596874Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596655Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595999Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595124Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7858Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1991Jump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-103474
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeAPI coverage: 4.6 %
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0079445A
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079C6D1 FindFirstFileW,FindClose,0_2_0079C6D1
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0079C75C
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0079EF95
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0079F0F2
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0079F3F3
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007937EF
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00793B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00793B12
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0079BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0079BCBC
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007349A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599670Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599124Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598577Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598312Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598187Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598072Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597968Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597638Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597531Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597421Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597312Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597200Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597093Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596984Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596874Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596765Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596655Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596546Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596437Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596218Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596109Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595999Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595124Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594687Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594578Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594359Jump to behavior
              Source: RegSvcs.exe, 00000003.00000002.1441810434.0000000000999000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
              Source: RegSvcs.exe, 00000003.00000002.1443622746.0000000005C00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
              Source: RegSvcs.exe, 00000003.00000002.1443622746.0000000005C57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeAPI call chain: ExitProcess graph end nodegraph_0-101281
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007A3F09 BlockInput,0_2_007A3F09
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00733B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00733B3A
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00765A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00765A7C
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00734B37 LoadLibraryA,GetProcAddress,0_2_00734B37
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_015391C8 mov eax, dword ptr fs:[00000030h]0_2_015391C8
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_01539228 mov eax, dword ptr fs:[00000030h]0_2_01539228
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_01537BB8 mov eax, dword ptr fs:[00000030h]0_2_01537BB8
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007880A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_007880A9
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0075A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0075A155
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0075A124 SetUnhandledExceptionFilter,0_2_0075A124
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 596008Jump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007887B1 LogonUserW,0_2_007887B1
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00733B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00733B3A
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007348D7
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00794C7F mouse_event,0_2_00794C7F
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ql8KpEHT7y.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00787CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00787CAF
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0078874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0078874B
              Source: ql8KpEHT7y.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: ql8KpEHT7y.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_0075862B cpuid 0_2_0075862B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00764E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00764E87
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00771E06 GetUserNameW,0_2_00771E06
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_00763F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00763F3A
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007349A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.1442240916.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: ql8KpEHT7y.exe PID: 7556, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7704, type: MEMORYSTR
              Source: ql8KpEHT7y.exeBinary or memory string: WIN_81
              Source: ql8KpEHT7y.exeBinary or memory string: WIN_XP
              Source: ql8KpEHT7y.exeBinary or memory string: WIN_XPe
              Source: ql8KpEHT7y.exeBinary or memory string: WIN_VISTA
              Source: ql8KpEHT7y.exeBinary or memory string: WIN_7
              Source: ql8KpEHT7y.exeBinary or memory string: WIN_8
              Source: ql8KpEHT7y.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
              Source: Yara matchFile source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: ql8KpEHT7y.exe PID: 7556, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7704, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.ql8KpEHT7y.exe.3d40000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.ql8KpEHT7y.exe.3d40000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.RegSvcs.exe.380000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.1442240916.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: ql8KpEHT7y.exe PID: 7556, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7704, type: MEMORYSTR
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007A6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_007A6283
              Source: C:\Users\user\Desktop\ql8KpEHT7y.exeCode function: 0_2_007A6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_007A6747
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              2
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              21
              Input Capture
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol21
              Input Capture
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              2
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS126
              System Information Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              Masquerading
              LSA Secrets131
              Security Software Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Valid Accounts
              Cached Domain Credentials11
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              ql8KpEHT7y.exe69%VirustotalBrowse
              ql8KpEHT7y.exe74%ReversingLabsWin32.Ransomware.SnakeKeylogger
              ql8KpEHT7y.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              104.21.96.1
              truefalse
                high
                checkip.dyndns.com
                193.122.6.168
                truefalse
                  high
                  checkip.dyndns.org
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                      high
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.orgRegSvcs.exe, 00000003.00000002.1442240916.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000280E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000276D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.00000000027B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002800000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002829000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.orgRegSvcs.exe, 00000003.00000002.1442240916.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000275E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000280E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000276D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.00000000027B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002800000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002837000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002829000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comRegSvcs.exe, 00000003.00000002.1442240916.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000280E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000276D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002800000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002829000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000003.00000002.1442240916.00000000026A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.org/qql8KpEHT7y.exe, 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.189$RegSvcs.exe, 00000003.00000002.1442240916.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000280E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.00000000027B0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002800000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002829000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000003.00000002.1442240916.0000000002857000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002785000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000280E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002800000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002829000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.0000000002866000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://reallyfreegeoip.org/xml/ql8KpEHT7y.exe, 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1442240916.000000000276D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        193.122.6.168
                                        checkip.dyndns.comUnited States
                                        31898ORACLE-BMC-31898USfalse
                                        104.21.96.1
                                        reallyfreegeoip.orgUnited States
                                        13335CLOUDFLARENETUSfalse
                                        Joe Sandbox version:42.0.0 Malachite
                                        Analysis ID:1587685
                                        Start date and time:2025-01-10 16:53:36 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 6m 16s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:11
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:ql8KpEHT7y.exe
                                        renamed because original name is a hash value
                                        Original Sample Name:ff114595667cf12d185e3e147290d41d4f91b8c2a065812741e540e99c2f0db0.exe
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@8/3@2/2
                                        EGA Information:
                                        • Successful, ratio: 50%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 56
                                        • Number of non-executed functions: 272
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target RegSvcs.exe, PID 7704 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                        TimeTypeDescription
                                        10:54:40API Interceptor80x Sleep call for process: RegSvcs.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        193.122.6.1688kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                        • checkip.dyndns.org/
                                        Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • checkip.dyndns.org/
                                        December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                        • checkip.dyndns.org/
                                        PO.exeGet hashmaliciousMassLogger RATBrowse
                                        • checkip.dyndns.org/
                                        New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • checkip.dyndns.org/
                                        104.21.96.1zE1VxVoZ3W.exeGet hashmaliciousFormBookBrowse
                                        • www.aonline.top/fqlg/
                                        QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                        • www.mzkd6gp5.top/3u0p/
                                        SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                        • pelisplus.so/administrator/index.php
                                        Recibos.exeGet hashmaliciousFormBookBrowse
                                        • www.mffnow.info/1a34/
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        reallyfreegeoip.org8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.16.1
                                        2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.16.1
                                        tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.32.1
                                        New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 104.21.64.1
                                        4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.96.1
                                        ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 104.21.112.1
                                        B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.48.1
                                        B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 104.21.32.1
                                        VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.80.1
                                        bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.80.1
                                        checkip.dyndns.com8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                        • 158.101.44.242
                                        tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                        • 158.101.44.242
                                        New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 132.226.247.73
                                        4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 193.122.6.168
                                        B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.247.73
                                        VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                        • 193.122.130.0
                                        bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ORACLE-BMC-31898US8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                        • 158.101.44.242
                                        tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                        • 158.101.44.242
                                        4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.6.168
                                        ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 193.122.6.168
                                        B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                        • 193.122.130.0
                                        bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 193.122.130.0
                                        Salary Payment Information Discrepancy_pdf.pif.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 193.122.130.0
                                        PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 158.101.44.242
                                        CLOUDFLARENETUS8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.16.1
                                        2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.16.1
                                        NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                        • 188.114.97.3
                                        https://cjerichmond.jimdosite.com/Get hashmaliciousUnknownBrowse
                                        • 162.159.128.70
                                        zE1VxVoZ3W.exeGet hashmaliciousFormBookBrowse
                                        • 188.114.96.3
                                        tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.32.1
                                        https://zfrmz.com/3GiGYUP4BArW2NBgkPU3Get hashmaliciousUnknownBrowse
                                        • 104.18.94.41
                                        Play_VM-NowTingrammAudiowav011.htmlGet hashmaliciousUnknownBrowse
                                        • 104.17.25.14
                                        https://theleadking2435063.emlnk.com/lt.php?x=3DZy~GDHJaLL5a37-gxLhhGf13JRv_MkkPo2jHPMKXOh5XR.-Uy.xuO-2I2imNfGet hashmaliciousUnknownBrowse
                                        • 104.17.203.31
                                        New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 104.21.64.1
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        54328bd36c14bd82ddaa0c04b25ed9ad8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.96.1
                                        2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.96.1
                                        tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.96.1
                                        New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 104.21.96.1
                                        4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.96.1
                                        ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 104.21.96.1
                                        B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.96.1
                                        B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 104.21.96.1
                                        VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                        • 104.21.96.1
                                        bd9Gvqt6AK.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 104.21.96.1
                                        No context
                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1039
                                        Entropy (8bit):5.353332853270839
                                        Encrypted:false
                                        SSDEEP:24:ML9E4KiE4Ko84qXKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKiHKoviYHKh3oPtHo6hAHKzeR
                                        MD5:A4AF0F36EC4E0C69DC0F860C891E8BBE
                                        SHA1:28DD81A1EDDF71CBCBF86DA986E047279EF097CD
                                        SHA-256:B038D4342E4DD96217BD90CFE32581FCCB381C5C2E6FF257CD32854F840D1FDE
                                        SHA-512:A675D3E9DB5BDD325A22E82C6BCDBD5409D7A34453DAAEB0E37206BE982C388547E1BDF22DC70393C69D0CE55635E2364502572C3AD2E6753A56A5C3893F6D69
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e
                                        Process:C:\Users\user\Desktop\ql8KpEHT7y.exe
                                        File Type:data
                                        Category:modified
                                        Size (bytes):133632
                                        Entropy (8bit):6.932608312016454
                                        Encrypted:false
                                        SSDEEP:3072:edRnGACS/oVNptADg49nXOmvdL5p30DmJIE3+Ss:IJGyQP/xsnXt1Lz30D0IE3+/
                                        MD5:A615D2B638633BC0225DA1D26A7F424E
                                        SHA1:7DAE41E6E60A5C0B145286EF2D4D0864114CBEBD
                                        SHA-256:A4A7EC11F0BA2362E72266A3E701D8BBC55387050BD3F6D40F607106DD162B77
                                        SHA-512:D2CADDBD6E550475FE7490EB2A171C10F8E38A96094B22B716EFEF94E25DB8A5F4E72C824BB4D1E030989A417DC81A79D58FCD07A1F42704BC81195C5428CF74
                                        Malicious:false
                                        Reputation:low
                                        Preview:...FRLD3<67F..VU.GFFQLD3x67FJSVUXGFFQLD3867FJSVUXGFFQLD3867F.SVUVX.HQ.M...6..r.=14f6###AY[.%+=8:,g$#q>1]._Yf...u5("#.AI9.67FJSVU..FF.MG3... JSVUXGFF.LF237gFJ.WUXSFFQLD3.$5FJsVUXgDFQL.38.7FJQVU\GFFQLD3<67FJSVUX'DFQND3867FHS..XGVFQ\D386'FJCVUXGFFALD3867FJSVU.UDF.LD38.5F.CVUXGFFQLD3867FJSVUX.DF]LD3867FJSVUXGFFQLD3867FJSVUXGFFQLD3867FJSVUXGFFQLD38.7FBSVUXGFFQLD30.7F.SVUXGFFQLD3.BR>>SVU\.GFQlD38.6FJQVUXGFFQLD3867FjSV5v5542LD3.&7FJsTUXUFFQ.E3867FJSVUXGFF.LDs.DR*%0VUTGFFQ.F3847FJ[TUXGFFQLD3867F.SV.XGFFQLD3867FJSVU.UDFQLD3p67FHSSU.fGFa.D3;67F.SVS.gGF.LD3867FJSVUXGFFQLD3867FJSVUXGFFQLD3867FJSVU.:.I...ZK..FJSVUXFDEUJL;867FJSVU&GFF.LD3x67F}SVU}GFF<LD3.67F4SVU&GFF5LD3J67F+SVU.GFF>LD3V67F4SVUFEnfQLN..65nkSV_Xm.5sLD9.77FN uUXM.DQL@@.67L.PVU\4cFQF.78635lSV_.BFFUf.3;.!@JSM:aGFLQO.&>67]`uVWp}FF[Ln.85.SLSVNreFD.ED3<.a5WSVSp.FF[8M384.LJSR.FEn.QLN..H'FJW}Ure8WQL@.8..8XSVQsGld/_D3<.7lh-BUXCmF{RF.,67B`q(@XGBmQffM.67BaS|w&PFFUgD.&4.QJSR.^m$F#uX3H5X.JSP}.GFLy,D3>6.|J-vUXCD).LD9..iFH{UTXMFDR1r3825B7dVU\m.FS7}3
                                        Process:C:\Users\user\Desktop\ql8KpEHT7y.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):86370
                                        Entropy (8bit):7.7919151046487425
                                        Encrypted:false
                                        SSDEEP:1536:j+IrG5me35T5cvaAG9S+er3udIPv2EucI4UtY58VSKax2c8GeCpFC1NLuiJIoooO:j+Iq5jFSCAhFudMNuz058VS2c+Cpu4iQ
                                        MD5:ECC6E205FBAB5071B4B953492B5EDA3B
                                        SHA1:148221ED6C648D91CAB679620077D240A713A084
                                        SHA-256:6983644925E866341C4ED520A84B69D4D8F0C5841E6DB40A3E2D6F125C344737
                                        SHA-512:937ACF682D0A3167B995C8B847C72CB64BFC8FB94BBD6F1C7DB5FB957172575AC70A18A3A0817E3017A932C3647D18323EAA35129DD5737863C844D785DF5A5A
                                        Malicious:false
                                        Reputation:low
                                        Preview:EA06......z.j.2.3.M..m...U.Q..j...x..)U:.V..!........*..".....8.+.r.Of3K4.G#..k5...W=.N..y$..>..c.......f.....A..c....@..h.6.3.......li.i..og.R..z.b...4.kF.\...=..@.L..`...V...$3<.......Pb.S.t+.z...\..d.jU........*.J4h.A.Mh.Z......Q.. .P....@P..;0.. @...P.S....\.Q...`....h@...T..[..k4....y0..s.Uk.P..uE.p."4.%.-D.J....V....(.9........>.UN....... ...p.0.u^..F..h.9.....y.=.......s..'...V.y.@..(.J-V.L...jL.`E..3}../.....@..f..........V. G......V. ...n.Ti...zm5.Z.uj.b....I..o7.S..Z.b..Ti.....L.T.X....Q.q&..kl.0;.*5..f.L.|....S..4z52.O.I..i.v.u.U...5..L.Eg.^MN.S.S.VZ5..E.`#...\.@.A....4....)U:...@..H1.@..W..nVY.\...N#.Y.b.V.....$....Gf..D..U.P.k.J...M..+..Q@.Q.V...M........&..P.z$fM4..@....IF..k.:D..T......y.Q&s.v.J....$.l..G...5".U.V).j%Jcr..&SZ.....[b.j.... G.....o...4`..?|.T.....F..........5t.&..N.....".+..P...2.......VQ8..k.*..q<.I.(..:u$.Ti.&..i;..x.+...).p#..P..6.0/v.$.wK.....jy..0-.8.RkE...(...U.. .....0.....kTI.4.@....P..~.[l... ...J;`*..Q..]...y.U.|...F.
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):6.908430804014602
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:ql8KpEHT7y.exe
                                        File size:999'424 bytes
                                        MD5:43743091973b08e4265bb937d78d0522
                                        SHA1:142851ffb4aa49a41edb2bfb83d8459138582b27
                                        SHA256:ff114595667cf12d185e3e147290d41d4f91b8c2a065812741e540e99c2f0db0
                                        SHA512:9745ba5fdf5bb77c8ce1350a8e18e4e6fce73d8084a3b1f1db26cbdbf8b63a6cabe16de80227f93496c4eb13bac6795b2daf9af696f5da3f63983bf3dfb8c275
                                        SSDEEP:24576:1u6J33O0c+JY5UZ+XC0kGso6FaPX+8n5QU2PvhfWY:Xu0c++OCvkGs9FaPTuTEY
                                        TLSH:3B25BE2273DDC360CB669173BF6AB7016EBF7C614630B85B2F980D7DA950162162C7A3
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                        Icon Hash:aaf3e3e3938382a0
                                        Entrypoint:0x427dcd
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x675AC730 [Thu Dec 12 11:21:20 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:1
                                        File Version Major:5
                                        File Version Minor:1
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:1
                                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                                        Instruction
                                        call 00007FAE3C83D13Ah
                                        jmp 00007FAE3C82FF04h
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        int3
                                        push edi
                                        push esi
                                        mov esi, dword ptr [esp+10h]
                                        mov ecx, dword ptr [esp+14h]
                                        mov edi, dword ptr [esp+0Ch]
                                        mov eax, ecx
                                        mov edx, ecx
                                        add eax, esi
                                        cmp edi, esi
                                        jbe 00007FAE3C83008Ah
                                        cmp edi, eax
                                        jc 00007FAE3C8303EEh
                                        bt dword ptr [004C31FCh], 01h
                                        jnc 00007FAE3C830089h
                                        rep movsb
                                        jmp 00007FAE3C83039Ch
                                        cmp ecx, 00000080h
                                        jc 00007FAE3C830254h
                                        mov eax, edi
                                        xor eax, esi
                                        test eax, 0000000Fh
                                        jne 00007FAE3C830090h
                                        bt dword ptr [004BE324h], 01h
                                        jc 00007FAE3C830560h
                                        bt dword ptr [004C31FCh], 00000000h
                                        jnc 00007FAE3C83022Dh
                                        test edi, 00000003h
                                        jne 00007FAE3C83023Eh
                                        test esi, 00000003h
                                        jne 00007FAE3C83021Dh
                                        bt edi, 02h
                                        jnc 00007FAE3C83008Fh
                                        mov eax, dword ptr [esi]
                                        sub ecx, 04h
                                        lea esi, dword ptr [esi+04h]
                                        mov dword ptr [edi], eax
                                        lea edi, dword ptr [edi+04h]
                                        bt edi, 03h
                                        jnc 00007FAE3C830093h
                                        movq xmm1, qword ptr [esi]
                                        sub ecx, 08h
                                        lea esi, dword ptr [esi+08h]
                                        movq qword ptr [edi], xmm1
                                        lea edi, dword ptr [edi+08h]
                                        test esi, 00000007h
                                        je 00007FAE3C8300E5h
                                        bt esi, 03h
                                        jnc 00007FAE3C830138h
                                        Programming Language:
                                        • [ASM] VS2013 build 21005
                                        • [ C ] VS2013 build 21005
                                        • [C++] VS2013 build 21005
                                        • [ C ] VS2008 SP1 build 30729
                                        • [IMP] VS2008 SP1 build 30729
                                        • [ASM] VS2013 UPD4 build 31101
                                        • [RES] VS2013 build 21005
                                        • [LNK] VS2013 UPD4 build 31101
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x2b7f0.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xf30000x711c.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0xc70000x2b7f00x2b80021ab27ad2b88db00e9a3fbc047624a1dFalse0.8489302711925287data7.685139369037866IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xf30000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                        RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                        RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                        RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                        RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                        RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                        RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                        RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                        RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                        RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                        RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                        RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                        RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                        RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                        RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                        RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                        RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                        RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                        RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                        RT_RCDATA0xcf7b80x22ab5data1.0003591422837224
                                        RT_GROUP_ICON0xf22700x76dataEnglishGreat Britain0.6610169491525424
                                        RT_GROUP_ICON0xf22e80x14dataEnglishGreat Britain1.25
                                        RT_GROUP_ICON0xf22fc0x14dataEnglishGreat Britain1.15
                                        RT_GROUP_ICON0xf23100x14dataEnglishGreat Britain1.25
                                        RT_VERSION0xf23240xdcdataEnglishGreat Britain0.6181818181818182
                                        RT_MANIFEST0xf24000x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                        DLLImport
                                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                        PSAPI.DLLGetProcessMemoryInfo
                                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                        UxTheme.dllIsThemeActive
                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishGreat Britain
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2025-01-10T16:54:39.875479+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749699193.122.6.16880TCP
                                        2025-01-10T16:54:40.984881+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749699193.122.6.16880TCP
                                        2025-01-10T16:54:41.572056+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749707104.21.96.1443TCP
                                        2025-01-10T16:54:42.282079+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749713193.122.6.16880TCP
                                        2025-01-10T16:54:42.845450+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749718104.21.96.1443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 10, 2025 16:54:38.968405962 CET4969980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:38.973287106 CET8049699193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:38.973367929 CET4969980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:38.973555088 CET4969980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:38.978328943 CET8049699193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:39.605377913 CET8049699193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:39.645133972 CET4969980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:39.650083065 CET8049699193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:39.832747936 CET8049699193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:39.875478983 CET4969980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:40.084707975 CET49701443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.084742069 CET44349701104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:40.084796906 CET49701443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.093441963 CET49701443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.093475103 CET44349701104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:40.550818920 CET44349701104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:40.550894022 CET49701443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.555757046 CET49701443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.555772066 CET44349701104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:40.556034088 CET44349701104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:40.609581947 CET49701443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.655334949 CET44349701104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:40.745663881 CET44349701104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:40.745727062 CET44349701104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:40.745768070 CET49701443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.752484083 CET49701443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.756073952 CET4969980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:40.760996103 CET8049699193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:40.941092968 CET8049699193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:40.944344997 CET49707443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.944370985 CET44349707104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:40.944437981 CET49707443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.945137978 CET49707443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:40.945152044 CET44349707104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:40.984880924 CET4969980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:41.409259081 CET44349707104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:41.411478043 CET49707443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:41.411514044 CET44349707104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:41.572038889 CET44349707104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:41.572108984 CET44349707104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:41.572160006 CET49707443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:41.572683096 CET49707443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:41.575952053 CET4969980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:41.577116966 CET4971380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:41.580998898 CET8049699193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:41.581075907 CET4969980192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:41.581922054 CET8049713193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:41.582166910 CET4971380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:41.582261086 CET4971380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:41.587064981 CET8049713193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:42.232321978 CET8049713193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:42.233644962 CET49718443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:42.233699083 CET44349718104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:42.233874083 CET49718443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:42.234307051 CET49718443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:42.234321117 CET44349718104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:42.282078981 CET4971380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:42.689554930 CET44349718104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:42.734885931 CET49718443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:42.737840891 CET49718443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:42.737852097 CET44349718104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:42.845474005 CET44349718104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:42.845529079 CET44349718104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:42.845590115 CET49718443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:42.849787951 CET49718443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:42.893723965 CET4972380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:42.898667097 CET8049723193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:42.898752928 CET4972380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:42.898921013 CET4972380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:42.903697014 CET8049723193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:43.543253899 CET8049723193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:43.544478893 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:43.544502020 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:43.544553995 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:43.544773102 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:43.544784069 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:43.594279051 CET4972380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:44.022464991 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:44.024101973 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:44.024121046 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:44.177463055 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:44.177525043 CET44349726104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:44.177594900 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:44.177968025 CET49726443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:44.181224108 CET4972380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:44.182029963 CET4973180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:44.186250925 CET8049723193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:44.186304092 CET4972380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:44.186880112 CET8049731193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:44.186965942 CET4973180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:44.187041998 CET4973180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:44.191852093 CET8049731193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:44.853601933 CET8049731193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:44.854788065 CET49737443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:44.854826927 CET44349737104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:44.854909897 CET49737443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:44.855154037 CET49737443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:44.855160952 CET44349737104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:44.906996012 CET4973180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:45.376512051 CET44349737104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:45.378300905 CET49737443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:45.378324032 CET44349737104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:45.685159922 CET44349737104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:45.685311079 CET44349737104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:45.685375929 CET49737443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:45.685729027 CET49737443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:45.688908100 CET4973180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:45.689841986 CET4974380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:45.693943024 CET8049731193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:45.694004059 CET4973180192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:45.694642067 CET8049743193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:45.694704056 CET4974380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:45.694782972 CET4974380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:45.699557066 CET8049743193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:46.321038008 CET8049743193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:46.322819948 CET49749443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:46.322854042 CET44349749104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:46.322912931 CET49749443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:46.323189974 CET49749443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:46.323200941 CET44349749104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:46.375505924 CET4974380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:46.810283899 CET44349749104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:46.812155008 CET49749443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:46.812195063 CET44349749104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:46.962443113 CET44349749104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:46.962589025 CET44349749104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:46.962775946 CET49749443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:46.962958097 CET49749443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:46.966228962 CET4974380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:46.967571020 CET4975580192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:46.971657038 CET8049743193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:46.971860886 CET4974380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:46.972361088 CET8049755193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:46.972433090 CET4975580192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:46.972734928 CET4975580192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:46.977514029 CET8049755193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:47.598622084 CET8049755193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:47.599904060 CET49761443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:47.599929094 CET44349761104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:47.600116014 CET49761443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:47.600258112 CET49761443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:47.600277901 CET44349761104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:47.641160011 CET4975580192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:48.095913887 CET44349761104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:48.097446918 CET49761443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:48.097487926 CET44349761104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:48.273117065 CET44349761104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:48.273236036 CET44349761104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:48.273332119 CET49761443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:48.273955107 CET49761443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:48.277293921 CET4975580192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:48.278152943 CET4976280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:48.282300949 CET8049755193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:48.282346010 CET4975580192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:48.283015966 CET8049762193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:48.283077002 CET4976280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:48.283160925 CET4976280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:48.287913084 CET8049762193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:48.909302950 CET8049762193.122.6.168192.168.2.7
                                        Jan 10, 2025 16:54:48.910456896 CET49768443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:48.910502911 CET44349768104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:48.910676956 CET49768443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:48.910797119 CET49768443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:48.910804987 CET44349768104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:48.953803062 CET4976280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:49.411873102 CET44349768104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:49.413873911 CET49768443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:49.413903952 CET44349768104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:49.548676014 CET44349768104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:49.548762083 CET44349768104.21.96.1192.168.2.7
                                        Jan 10, 2025 16:54:49.548801899 CET49768443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:49.549215078 CET49768443192.168.2.7104.21.96.1
                                        Jan 10, 2025 16:54:49.710917950 CET4976280192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:54:49.711040974 CET4971380192.168.2.7193.122.6.168
                                        Jan 10, 2025 16:55:18.030302048 CET6184653192.168.2.7162.159.36.2
                                        Jan 10, 2025 16:55:18.035152912 CET5361846162.159.36.2192.168.2.7
                                        Jan 10, 2025 16:55:18.037659883 CET6184653192.168.2.7162.159.36.2
                                        Jan 10, 2025 16:55:18.042608976 CET5361846162.159.36.2192.168.2.7
                                        Jan 10, 2025 16:55:18.494337082 CET6184653192.168.2.7162.159.36.2
                                        Jan 10, 2025 16:55:18.499351025 CET5361846162.159.36.2192.168.2.7
                                        Jan 10, 2025 16:55:18.499414921 CET6184653192.168.2.7162.159.36.2
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 10, 2025 16:54:38.954471111 CET5105853192.168.2.71.1.1.1
                                        Jan 10, 2025 16:54:38.962177992 CET53510581.1.1.1192.168.2.7
                                        Jan 10, 2025 16:54:40.076847076 CET5118653192.168.2.71.1.1.1
                                        Jan 10, 2025 16:54:40.083899021 CET53511861.1.1.1192.168.2.7
                                        Jan 10, 2025 16:55:18.024480104 CET5364487162.159.36.2192.168.2.7
                                        Jan 10, 2025 16:55:18.524374008 CET53591711.1.1.1192.168.2.7
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jan 10, 2025 16:54:38.954471111 CET192.168.2.71.1.1.10x51dcStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:40.076847076 CET192.168.2.71.1.1.10x4a27Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 10, 2025 16:54:38.962177992 CET1.1.1.1192.168.2.70x51dcNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                        Jan 10, 2025 16:54:38.962177992 CET1.1.1.1192.168.2.70x51dcNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:38.962177992 CET1.1.1.1192.168.2.70x51dcNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:38.962177992 CET1.1.1.1192.168.2.70x51dcNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:38.962177992 CET1.1.1.1192.168.2.70x51dcNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:38.962177992 CET1.1.1.1192.168.2.70x51dcNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:40.083899021 CET1.1.1.1192.168.2.70x4a27No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:40.083899021 CET1.1.1.1192.168.2.70x4a27No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:40.083899021 CET1.1.1.1192.168.2.70x4a27No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:40.083899021 CET1.1.1.1192.168.2.70x4a27No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:40.083899021 CET1.1.1.1192.168.2.70x4a27No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:40.083899021 CET1.1.1.1192.168.2.70x4a27No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                        Jan 10, 2025 16:54:40.083899021 CET1.1.1.1192.168.2.70x4a27No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                        • reallyfreegeoip.org
                                        • checkip.dyndns.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.749699193.122.6.168807704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:54:38.973555088 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:54:39.605377913 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:39 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                        Jan 10, 2025 16:54:39.645133972 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Jan 10, 2025 16:54:39.832747936 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:39 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                        Jan 10, 2025 16:54:40.756073952 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Jan 10, 2025 16:54:40.941092968 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:40 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.749713193.122.6.168807704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:54:41.582261086 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Jan 10, 2025 16:54:42.232321978 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:42 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.749723193.122.6.168807704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:54:42.898921013 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:54:43.543253899 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:43 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.749731193.122.6.168807704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:54:44.187041998 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:54:44.853601933 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:44 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.749743193.122.6.168807704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:54:45.694782972 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:54:46.321038008 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:46 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.749755193.122.6.168807704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:54:46.972734928 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:54:47.598622084 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:47 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.749762193.122.6.168807704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        Jan 10, 2025 16:54:48.283160925 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Jan 10, 2025 16:54:48.909302950 CET273INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:48 GMT
                                        Content-Type: text/html
                                        Content-Length: 104
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.749701104.21.96.14437704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:54:40 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2025-01-10 15:54:40 UTC853INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:40 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1839269
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9zC7I8tYDdfBTkOFbY99T789KY7PkStKT6BcGwoXupeVJ0Pt7CBjW%2FYvMFCla8KOQ9%2FqOBue6JcCMEA3u9EvSmNnoZHJei26Po1fgWeCt64s4tUYcbN7va34tivKkcd3xtWv9DAa"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffdd8d428cb42c0-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1776&min_rtt=1774&rtt_var=667&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2846&recv_bytes=699&delivery_rate=1645997&cwnd=212&unsent_bytes=0&cid=252a1d9e24f690d0&ts=206&x=0"
                                        2025-01-10 15:54:40 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.749707104.21.96.14437704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:54:41 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2025-01-10 15:54:41 UTC861INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:41 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1839270
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wk6EiAaj9nlpOg%2Bh9WeZz6FOirPg6czVk8rI7XsNjTdCC%2BlI090bm9s1tESnUJtSpRwzz%2FEQ1BjRnZgH9d0V%2BCYzHJt6OttYJbs7I4%2Bj7QF4WvodLsWg0nysvP8c1O8f1bt%2FeuTy"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffdd8d96f6142c0-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1718&min_rtt=1716&rtt_var=647&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1685912&cwnd=212&unsent_bytes=0&cid=1e48dc6010352bd8&ts=169&x=0"
                                        2025-01-10 15:54:41 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.749718104.21.96.14437704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:54:42 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        2025-01-10 15:54:42 UTC861INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:42 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1839271
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=A3OVL%2FHVsc2buxZYzbHQ%2BlATVASsUi6a9%2FBVBK2oIUbpiMGIaNKDm1hKvrFie0tRSXa1IE4BJN8YHbsuF3G0NjlBqMaHXGNbKjEfIOMbqzHosq3D%2Fa2QMzszX7l%2Fhl%2BryL8DNNl9"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffdd8e178f0c32e-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1790&min_rtt=1669&rtt_var=712&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1749550&cwnd=178&unsent_bytes=0&cid=2ed2a8490ef9f6ca&ts=159&x=0"
                                        2025-01-10 15:54:42 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.749726104.21.96.14437704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:54:44 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2025-01-10 15:54:44 UTC861INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:44 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1839273
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=W0AvlItU4JgoXBceRkM8p5cc64Zf52HrSaOLJd%2BBIJs4QdcfU%2F2r%2BNNOdnkKdPlJihhLM2vzPxe1YPMShAq0QAV7O0dqagJ2DQuyO6hx7lonUZQo%2FOn%2FSbbq1OQS%2BcEbsQaipahs"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffdd8e9ad021a48-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=2015&min_rtt=1995&rtt_var=790&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1350601&cwnd=157&unsent_bytes=0&cid=73f4ba083810b821&ts=162&x=0"
                                        2025-01-10 15:54:44 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.749737104.21.96.14437704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:54:45 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2025-01-10 15:54:45 UTC859INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:45 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1839274
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jaj7gnwSlO6%2B2O6ZWZYuGHdQgD%2BvyjhOhRfxmH9G2OiqGq4qan7ZTtFPgLeg%2BkVSuoLPw1I5I%2Fckm7fffo6Wxkw7OnMWkWFF68Jv59i0y%2F3joP0YPBRa0DwBlAGMeB0aXus3fvmM"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffdd8f23876de9a-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=3218&min_rtt=3218&rtt_var=1609&sent=6&recv=7&lost=0&retrans=1&sent_bytes=4236&recv_bytes=699&delivery_rate=247877&cwnd=209&unsent_bytes=0&cid=19729e99ee33af6f&ts=165&x=0"
                                        2025-01-10 15:54:45 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        5192.168.2.749749104.21.96.14437704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:54:46 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2025-01-10 15:54:46 UTC861INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:46 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1839276
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YcA28ZO21p5jRPOIRITPgBnwQcFAg%2FtWGZm3zmmiEXduDmYPIl%2F%2FhKP7rK5GNXsIyGy%2FHK89NmOPNrWJvcKx1banzv%2FaW%2B3mTkdi06VQqSwPSZWWqP181SiN6SKVbphE7efhtzb8"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffdd8fb2974de9a-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1593&min_rtt=1584&rtt_var=601&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1843434&cwnd=209&unsent_bytes=0&cid=9dfdaf55d9f075c5&ts=159&x=0"
                                        2025-01-10 15:54:46 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        6192.168.2.749761104.21.96.14437704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:54:48 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2025-01-10 15:54:48 UTC857INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:48 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1839277
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HEW%2Fefktys9SgxwsAgQoNQMCQOcMN%2B7IxK5nIW4CdRGedAmvtFfAkB1l5QOv0twYl71necniP06rMz7sPUa%2FwuaTAOeUqt4DnCJ0Y%2BgzJRvRBjWIGtVkdt8Z076jTDueWoTRZXgA"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffdd90329ee1a48-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1978&min_rtt=1958&rtt_var=775&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1375412&cwnd=157&unsent_bytes=0&cid=4665c178e2387498&ts=165&x=0"
                                        2025-01-10 15:54:48 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        7192.168.2.749768104.21.96.14437704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-10 15:54:49 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2025-01-10 15:54:49 UTC861INHTTP/1.1 200 OK
                                        Date: Fri, 10 Jan 2025 15:54:49 GMT
                                        Content-Type: text/xml
                                        Content-Length: 362
                                        Connection: close
                                        Age: 1839278
                                        Cache-Control: max-age=31536000
                                        cf-cache-status: HIT
                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7BXhib2SLrQLPUsrcmLMTJJXOncVbcnzf%2FSVfJmnSfSneBXFUqFewnISW1H%2FD%2FTJnsrgHKZzjUZ6TrJKqf9%2FdKUsXwZD0eQ2UJYLf8T2KYI%2Bvc%2B8qvA4SfeQseYtkIBySvkF95d6"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8ffdd90b5fe8de9a-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1651&min_rtt=1639&rtt_var=638&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1682997&cwnd=209&unsent_bytes=0&cid=631bbb1bd1c86ddd&ts=143&x=0"
                                        2025-01-10 15:54:49 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:10:54:34
                                        Start date:10/01/2025
                                        Path:C:\Users\user\Desktop\ql8KpEHT7y.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\ql8KpEHT7y.exe"
                                        Imagebase:0x730000
                                        File size:999'424 bytes
                                        MD5 hash:43743091973B08E4265BB937D78D0522
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1334886066.0000000003D40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                        Reputation:low
                                        Has exited:true

                                        Target ID:3
                                        Start time:10:54:37
                                        Start date:10/01/2025
                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\ql8KpEHT7y.exe"
                                        Imagebase:0x2b0000
                                        File size:45'984 bytes
                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.1442240916.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.1441052209.0000000000382000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:10:54:49
                                        Start date:10/01/2025
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                        Imagebase:0x410000
                                        File size:236'544 bytes
                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:10:54:49
                                        Start date:10/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff75da10000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:10:54:49
                                        Start date:10/01/2025
                                        Path:C:\Windows\SysWOW64\choice.exe
                                        Wow64 process (32bit):true
                                        Commandline:choice /C Y /N /D Y /T 3
                                        Imagebase:0x2c0000
                                        File size:28'160 bytes
                                        MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:3.9%
                                          Dynamic/Decrypted Code Coverage:1.3%
                                          Signature Coverage:8.8%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:63
                                          execution_graph 101118 733633 101119 73366a 101118->101119 101120 7336e7 101119->101120 101121 733688 101119->101121 101159 7336e5 101119->101159 101123 76d0cc 101120->101123 101124 7336ed 101120->101124 101125 733695 101121->101125 101126 73374b PostQuitMessage 101121->101126 101122 7336ca DefWindowProcW 101149 7336d8 101122->101149 101173 741070 10 API calls Mailbox 101123->101173 101127 7336f2 101124->101127 101128 733715 SetTimer RegisterWindowMessageW 101124->101128 101130 76d154 101125->101130 101131 7336a0 101125->101131 101126->101149 101136 76d06f 101127->101136 101137 7336f9 KillTimer 101127->101137 101132 73373e CreatePopupMenu 101128->101132 101128->101149 101189 792527 71 API calls _memset 101130->101189 101133 733755 101131->101133 101134 7336a8 101131->101134 101132->101149 101163 7344a0 101133->101163 101140 7336b3 101134->101140 101141 76d139 101134->101141 101144 76d074 101136->101144 101145 76d0a8 MoveWindow 101136->101145 101170 73443a Shell_NotifyIconW _memset 101137->101170 101138 76d0f3 101174 741093 341 API calls Mailbox 101138->101174 101147 7336be 101140->101147 101148 76d124 101140->101148 101141->101122 101188 787c36 59 API calls Mailbox 101141->101188 101142 76d166 101142->101122 101142->101149 101150 76d097 SetFocus 101144->101150 101151 76d078 101144->101151 101145->101149 101147->101122 101175 73443a Shell_NotifyIconW _memset 101147->101175 101187 792d36 81 API calls _memset 101148->101187 101150->101149 101151->101147 101153 76d081 101151->101153 101152 73370c 101171 733114 DeleteObject DestroyWindow Mailbox 101152->101171 101172 741070 10 API calls Mailbox 101153->101172 101158 76d134 101158->101149 101159->101122 101161 76d118 101176 73434a 101161->101176 101164 7344b7 _memset 101163->101164 101165 734539 101163->101165 101190 73407c 101164->101190 101165->101149 101167 734522 KillTimer SetTimer 101167->101165 101168 7344de 101168->101167 101169 76d4ab Shell_NotifyIconW 101168->101169 101169->101167 101170->101152 101171->101149 101172->101149 101173->101138 101174->101147 101175->101161 101177 734375 _memset 101176->101177 101309 734182 101177->101309 101180 7343fa 101182 734430 Shell_NotifyIconW 101180->101182 101183 734414 Shell_NotifyIconW 101180->101183 101184 734422 101182->101184 101183->101184 101185 73407c 61 API calls 101184->101185 101186 734429 101185->101186 101186->101159 101187->101158 101188->101159 101189->101142 101191 734098 101190->101191 101192 73416f Mailbox 101190->101192 101212 737a16 101191->101212 101192->101168 101195 7340b3 101217 737bcc 101195->101217 101196 76d3c8 LoadStringW 101199 76d3e2 101196->101199 101198 7340c8 101198->101199 101200 7340d9 101198->101200 101201 737b2e 59 API calls 101199->101201 101202 7340e3 101200->101202 101203 734174 101200->101203 101206 76d3ec 101201->101206 101226 737b2e 101202->101226 101235 738047 101203->101235 101209 7340ed _memset _wcscpy 101206->101209 101239 737cab 101206->101239 101208 76d40e 101210 737cab 59 API calls 101208->101210 101211 734155 Shell_NotifyIconW 101209->101211 101210->101209 101211->101192 101246 750db6 101212->101246 101214 737a3b 101256 738029 101214->101256 101218 737c45 101217->101218 101219 737bd8 __NMSG_WRITE 101217->101219 101288 737d2c 101218->101288 101221 737c13 101219->101221 101222 737bee 101219->101222 101224 738029 59 API calls 101221->101224 101287 737f27 59 API calls Mailbox 101222->101287 101225 737bf6 _memmove 101224->101225 101225->101198 101227 737b40 101226->101227 101228 76ec6b 101226->101228 101296 737a51 101227->101296 101302 787bdb 59 API calls _memmove 101228->101302 101231 737b4c 101231->101209 101232 76ec75 101233 738047 59 API calls 101232->101233 101234 76ec7d Mailbox 101233->101234 101236 738052 101235->101236 101237 73805a 101235->101237 101303 737f77 59 API calls 2 library calls 101236->101303 101237->101209 101240 76ed4a 101239->101240 101241 737cbf 101239->101241 101243 738029 59 API calls 101240->101243 101304 737c50 101241->101304 101245 76ed55 __NMSG_WRITE _memmove 101243->101245 101244 737cca 101244->101208 101248 750dbe 101246->101248 101249 750dd8 101248->101249 101251 750ddc std::exception::exception 101248->101251 101259 75571c 101248->101259 101276 7533a1 DecodePointer 101248->101276 101249->101214 101277 75859b RaiseException 101251->101277 101253 750e06 101278 7584d1 58 API calls _free 101253->101278 101255 750e18 101255->101214 101257 750db6 Mailbox 59 API calls 101256->101257 101258 7340a6 101257->101258 101258->101195 101258->101196 101260 755797 101259->101260 101269 755728 101259->101269 101285 7533a1 DecodePointer 101260->101285 101262 755733 101262->101269 101279 75a16b 58 API calls __NMSG_WRITE 101262->101279 101280 75a1c8 58 API calls 5 library calls 101262->101280 101281 75309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101262->101281 101263 75579d 101286 758b28 58 API calls __getptd_noexit 101263->101286 101266 75575b RtlAllocateHeap 101267 75578f 101266->101267 101266->101269 101267->101248 101269->101262 101269->101266 101270 755783 101269->101270 101274 755781 101269->101274 101282 7533a1 DecodePointer 101269->101282 101283 758b28 58 API calls __getptd_noexit 101270->101283 101284 758b28 58 API calls __getptd_noexit 101274->101284 101276->101248 101277->101253 101278->101255 101279->101262 101280->101262 101282->101269 101283->101274 101284->101267 101285->101263 101286->101267 101287->101225 101289 737d3a 101288->101289 101291 737d43 _memmove 101288->101291 101289->101291 101292 737e4f 101289->101292 101291->101225 101293 737e62 101292->101293 101295 737e5f _memmove 101292->101295 101294 750db6 Mailbox 59 API calls 101293->101294 101294->101295 101295->101291 101297 737a5f 101296->101297 101298 737a85 _memmove 101296->101298 101297->101298 101299 750db6 Mailbox 59 API calls 101297->101299 101298->101231 101300 737ad4 101299->101300 101301 750db6 Mailbox 59 API calls 101300->101301 101301->101298 101302->101232 101303->101237 101305 737c5f __NMSG_WRITE 101304->101305 101306 738029 59 API calls 101305->101306 101307 737c70 _memmove 101305->101307 101308 76ed07 _memmove 101306->101308 101307->101244 101310 76d423 101309->101310 101311 734196 101309->101311 101310->101311 101312 76d42c DestroyIcon 101310->101312 101311->101180 101313 792f94 62 API calls _W_store_winword 101311->101313 101312->101311 101313->101180 101314 15386a3 101317 1538318 101314->101317 101316 15386ef 101330 1535d48 101317->101330 101320 15383e8 CreateFileW 101321 15383b7 101320->101321 101326 15383f5 101320->101326 101322 1538411 VirtualAlloc 101321->101322 101321->101326 101328 1538518 CloseHandle 101321->101328 101329 1538528 VirtualFree 101321->101329 101333 1539228 GetPEB 101321->101333 101323 1538432 ReadFile 101322->101323 101322->101326 101323->101326 101327 1538450 VirtualAlloc 101323->101327 101324 1538612 101324->101316 101325 1538604 VirtualFree 101325->101324 101326->101324 101326->101325 101327->101321 101327->101326 101328->101321 101329->101321 101335 15391c8 GetPEB 101330->101335 101332 15363d3 101332->101321 101334 1539252 101333->101334 101334->101320 101336 15391f2 101335->101336 101336->101332 101337 76fe27 101350 74f944 101337->101350 101339 76fe3d 101340 76fe53 101339->101340 101341 76febe 101339->101341 101439 739e5d 60 API calls 101340->101439 101359 73fce0 101341->101359 101343 76fe92 101344 77089c 101343->101344 101345 76fe9a 101343->101345 101441 799e4a 89 API calls 4 library calls 101344->101441 101440 79834f 59 API calls Mailbox 101345->101440 101349 76feb2 Mailbox 101349->101349 101351 74f950 101350->101351 101352 74f962 101350->101352 101442 739d3c 60 API calls Mailbox 101351->101442 101354 74f991 101352->101354 101355 74f968 101352->101355 101443 739d3c 60 API calls Mailbox 101354->101443 101357 750db6 Mailbox 59 API calls 101355->101357 101358 74f95a 101357->101358 101358->101339 101444 738180 101359->101444 101361 73fd3d 101363 77472d 101361->101363 101408 7406f6 101361->101408 101449 73f234 101361->101449 101567 799e4a 89 API calls 4 library calls 101363->101567 101366 774742 101367 77488d 101367->101366 101371 73fe4c 101367->101371 101573 7aa2d9 85 API calls Mailbox 101367->101573 101368 73fe3e 101368->101367 101368->101371 101571 7866ec 59 API calls 2 library calls 101368->101571 101369 740517 101377 750db6 Mailbox 59 API calls 101369->101377 101378 7748f9 101371->101378 101425 774b53 101371->101425 101453 73837c 101371->101453 101372 7747d7 101372->101366 101569 799e4a 89 API calls 4 library calls 101372->101569 101374 774848 101572 7860ef 59 API calls 2 library calls 101374->101572 101387 740545 _memmove 101377->101387 101388 774917 101378->101388 101575 7385c0 59 API calls Mailbox 101378->101575 101380 774755 101380->101372 101568 73f6a3 341 API calls 101380->101568 101383 73fea4 101393 774ad6 101383->101393 101394 73ff32 101383->101394 101433 740179 Mailbox _memmove 101383->101433 101384 77486b 101389 739ea0 341 API calls 101384->101389 101385 7748b2 Mailbox 101385->101371 101574 7866ec 59 API calls 2 library calls 101385->101574 101395 750db6 Mailbox 59 API calls 101387->101395 101392 774928 101388->101392 101576 7385c0 59 API calls Mailbox 101388->101576 101389->101367 101390 750db6 59 API calls Mailbox 101405 73fdd3 101390->101405 101392->101433 101577 7860ab 59 API calls Mailbox 101392->101577 101586 799ae7 60 API calls 101393->101586 101398 750db6 Mailbox 59 API calls 101394->101398 101437 740106 _memmove 101395->101437 101401 73ff39 101398->101401 101401->101408 101460 7409d0 101401->101460 101403 774a4d 101404 739ea0 341 API calls 101403->101404 101407 774a87 101404->101407 101405->101366 101405->101368 101405->101369 101405->101380 101405->101387 101405->101390 101412 77480c 101405->101412 101541 739ea0 101405->101541 101407->101366 101581 7384c0 101407->101581 101566 799e4a 89 API calls 4 library calls 101408->101566 101410 73ffb2 101410->101387 101410->101408 101417 73ffe6 101410->101417 101570 799e4a 89 API calls 4 library calls 101412->101570 101415 774ab2 101585 799e4a 89 API calls 4 library calls 101415->101585 101419 738047 59 API calls 101417->101419 101422 740007 101417->101422 101419->101422 101422->101408 101424 774b24 101422->101424 101429 74004c 101422->101429 101423 740398 101423->101349 101587 739d3c 60 API calls Mailbox 101424->101587 101425->101366 101588 799e4a 89 API calls 4 library calls 101425->101588 101427 750db6 59 API calls Mailbox 101427->101433 101428 7400d8 101537 739d3c 60 API calls Mailbox 101428->101537 101429->101408 101429->101425 101429->101428 101431 774a1c 101434 750db6 Mailbox 59 API calls 101431->101434 101432 7400eb 101432->101408 101538 7382df 59 API calls Mailbox 101432->101538 101433->101403 101433->101408 101433->101415 101433->101423 101433->101427 101433->101431 101539 738740 68 API calls __cinit 101433->101539 101540 738660 68 API calls 101433->101540 101578 795937 68 API calls 101433->101578 101579 7389b3 69 API calls Mailbox 101433->101579 101580 739d3c 60 API calls Mailbox 101433->101580 101434->101403 101437->101433 101438 740162 101437->101438 101565 739c90 59 API calls Mailbox 101437->101565 101438->101349 101439->101343 101440->101349 101441->101349 101442->101358 101443->101358 101445 73818f 101444->101445 101448 7381aa 101444->101448 101446 737e4f 59 API calls 101445->101446 101447 738197 CharUpperBuffW 101446->101447 101447->101448 101448->101361 101450 73f251 101449->101450 101451 73f272 101450->101451 101589 799e4a 89 API calls 4 library calls 101450->101589 101451->101405 101454 76edbd 101453->101454 101455 73838d 101453->101455 101456 750db6 Mailbox 59 API calls 101455->101456 101457 738394 101456->101457 101458 7383b5 101457->101458 101590 738634 59 API calls Mailbox 101457->101590 101458->101378 101458->101383 101461 774cc3 101460->101461 101475 7409f5 101460->101475 101657 799e4a 89 API calls 4 library calls 101461->101657 101463 740cfa 101463->101410 101466 740ee4 101466->101463 101468 740ef1 101466->101468 101467 740a4b PeekMessageW 101532 740a05 Mailbox 101467->101532 101655 741093 341 API calls Mailbox 101468->101655 101470 740ef8 LockWindowUpdate DestroyWindow GetMessageW 101470->101463 101473 740f2a 101470->101473 101472 774e81 Sleep 101472->101532 101476 775c58 TranslateMessage DispatchMessageW GetMessageW 101473->101476 101474 740ce4 101474->101463 101654 741070 10 API calls Mailbox 101474->101654 101475->101532 101658 739e5d 60 API calls 101475->101658 101659 786349 341 API calls 101475->101659 101476->101476 101478 775c88 101476->101478 101478->101463 101479 774d50 TranslateAcceleratorW 101481 740e43 PeekMessageW 101479->101481 101479->101532 101480 740ea5 TranslateMessage DispatchMessageW 101480->101481 101481->101532 101482 750db6 59 API calls Mailbox 101482->101532 101483 740d13 timeGetTime 101483->101532 101484 77581f WaitForSingleObject 101486 77583c GetExitCodeProcess CloseHandle 101484->101486 101484->101532 101520 740f95 101486->101520 101487 740e5f Sleep 101522 740e70 Mailbox 101487->101522 101488 738047 59 API calls 101488->101532 101490 775af8 Sleep 101490->101522 101493 75049f timeGetTime 101493->101522 101494 740f4e timeGetTime 101656 739e5d 60 API calls 101494->101656 101498 775b8f GetExitCodeProcess 101504 775ba5 WaitForSingleObject 101498->101504 101505 775bbb CloseHandle 101498->101505 101500 73b73c 314 API calls 101500->101532 101502 7b5f25 110 API calls 101502->101522 101503 73b7dd 109 API calls 101503->101522 101504->101505 101504->101532 101505->101522 101506 739e5d 60 API calls 101506->101532 101507 775874 101507->101520 101508 775c17 Sleep 101508->101532 101509 775078 Sleep 101509->101532 101516 739ea0 314 API calls 101516->101532 101517 73fce0 314 API calls 101517->101532 101520->101410 101522->101493 101522->101498 101522->101502 101522->101503 101522->101507 101522->101508 101522->101509 101522->101520 101522->101532 101684 737667 101522->101684 101689 792408 60 API calls 101522->101689 101690 739e5d 60 API calls 101522->101690 101691 737de1 101522->101691 101695 7389b3 69 API calls Mailbox 101522->101695 101696 73b73c 341 API calls 101522->101696 101697 7864da 60 API calls 101522->101697 101698 795244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 101522->101698 101699 793c55 66 API calls Mailbox 101522->101699 101524 799e4a 89 API calls 101524->101532 101525 739c90 59 API calls Mailbox 101525->101532 101526 7384c0 69 API calls 101526->101532 101528 78617e 59 API calls Mailbox 101528->101532 101529 737de1 59 API calls 101529->101532 101530 7389b3 69 API calls 101530->101532 101531 7755d5 VariantClear 101531->101532 101532->101467 101532->101472 101532->101474 101532->101479 101532->101480 101532->101481 101532->101482 101532->101483 101532->101484 101532->101487 101532->101488 101532->101490 101532->101494 101532->101500 101532->101506 101532->101516 101532->101517 101532->101520 101532->101522 101532->101524 101532->101525 101532->101526 101532->101528 101532->101529 101532->101530 101532->101531 101533 738cd4 59 API calls Mailbox 101532->101533 101534 77566b VariantClear 101532->101534 101535 775419 VariantClear 101532->101535 101536 786e8f 59 API calls 101532->101536 101591 73e420 101532->101591 101598 73e6a0 101532->101598 101629 73f460 101532->101629 101649 7331ce 101532->101649 101660 7b6018 59 API calls 101532->101660 101661 799a15 59 API calls Mailbox 101532->101661 101662 78d4f2 59 API calls 101532->101662 101663 739837 101532->101663 101681 7860ef 59 API calls 2 library calls 101532->101681 101682 738401 59 API calls 101532->101682 101683 7382df 59 API calls Mailbox 101532->101683 101533->101532 101534->101532 101535->101532 101536->101532 101537->101432 101538->101437 101539->101433 101540->101433 101542 739ebf 101541->101542 101558 739eed Mailbox 101541->101558 101543 750db6 Mailbox 59 API calls 101542->101543 101543->101558 101544 73b475 101545 738047 59 API calls 101544->101545 101560 73a057 101545->101560 101546 73b47a 101548 770055 101546->101548 101563 7709e5 101546->101563 101547 750db6 59 API calls Mailbox 101547->101558 103024 799e4a 89 API calls 4 library calls 101548->103024 101552 770064 101552->101405 101553 738047 59 API calls 101553->101558 101556 737667 59 API calls 101556->101558 101557 786e8f 59 API calls 101557->101558 101558->101544 101558->101546 101558->101547 101558->101548 101558->101553 101558->101556 101558->101557 101559 752d40 67 API calls __cinit 101558->101559 101558->101560 101561 7709d6 101558->101561 101564 73a55a 101558->101564 103007 73b900 101558->103007 103023 73c8c0 341 API calls 2 library calls 101558->103023 101559->101558 101560->101405 103026 799e4a 89 API calls 4 library calls 101561->103026 103027 799e4a 89 API calls 4 library calls 101563->103027 103025 799e4a 89 API calls 4 library calls 101564->103025 101565->101437 101566->101363 101567->101366 101568->101372 101569->101366 101570->101366 101571->101374 101572->101384 101573->101385 101574->101385 101575->101388 101576->101392 101577->101433 101578->101433 101579->101433 101580->101433 101582 7384cb 101581->101582 101584 7384f2 101582->101584 103033 7389b3 69 API calls Mailbox 101582->103033 101584->101415 101585->101366 101586->101417 101587->101425 101588->101366 101589->101451 101590->101458 101592 73e451 101591->101592 101593 73e43d 101591->101593 101701 799e4a 89 API calls 4 library calls 101592->101701 101700 73df00 341 API calls 2 library calls 101593->101700 101596 73e448 101596->101532 101597 773aa4 101597->101597 101599 73e6d5 101598->101599 101600 773aa9 101599->101600 101603 73e73f 101599->101603 101612 73e799 101599->101612 101601 739ea0 341 API calls 101600->101601 101602 773abe 101601->101602 101617 73e970 Mailbox 101602->101617 101703 799e4a 89 API calls 4 library calls 101602->101703 101606 737667 59 API calls 101603->101606 101603->101612 101604 737667 59 API calls 101604->101612 101607 773b04 101606->101607 101704 752d40 101607->101704 101608 752d40 __cinit 67 API calls 101608->101612 101609 773b26 101609->101532 101611 7384c0 69 API calls 101611->101617 101612->101604 101612->101608 101612->101609 101613 73e95a 101612->101613 101612->101617 101613->101617 101707 799e4a 89 API calls 4 library calls 101613->101707 101615 739ea0 341 API calls 101615->101617 101616 738d40 59 API calls 101616->101617 101617->101611 101617->101615 101617->101616 101625 73f195 101617->101625 101627 799e4a 89 API calls 101617->101627 101628 73ea78 101617->101628 101702 737f77 59 API calls 2 library calls 101617->101702 101708 786e8f 59 API calls 101617->101708 101709 7ac5c3 341 API calls 101617->101709 101710 7ab53c 341 API calls Mailbox 101617->101710 101712 739c90 59 API calls Mailbox 101617->101712 101713 7a93c6 341 API calls Mailbox 101617->101713 101711 799e4a 89 API calls 4 library calls 101625->101711 101626 773e25 101626->101532 101627->101617 101628->101532 101630 73f650 101629->101630 101631 73f4ba 101629->101631 101634 737de1 59 API calls 101630->101634 101632 73f4c6 101631->101632 101633 77441e 101631->101633 101893 73f290 341 API calls 2 library calls 101632->101893 101895 7abc6b 101633->101895 101640 73f58c Mailbox 101634->101640 101637 77442c 101641 73f630 101637->101641 101935 799e4a 89 API calls 4 library calls 101637->101935 101639 73f4fd 101639->101637 101639->101640 101639->101641 101792 793c37 101640->101792 101795 7a445a 101640->101795 101804 7adf37 101640->101804 101807 734e4a 101640->101807 101813 79cb7a 101640->101813 101641->101532 101643 73f5e3 101643->101641 101894 739c90 59 API calls Mailbox 101643->101894 101650 733212 101649->101650 101652 7331e0 101649->101652 101650->101532 101651 733205 IsDialogMessageW 101651->101650 101651->101652 101652->101650 101652->101651 101653 76cf32 GetClassLongW 101652->101653 101653->101651 101653->101652 101654->101466 101655->101470 101656->101532 101657->101475 101658->101475 101659->101475 101660->101532 101661->101532 101662->101532 101664 739851 101663->101664 101665 73984b 101663->101665 101666 76f5d3 __i64tow 101664->101666 101667 739899 101664->101667 101668 739857 __itow 101664->101668 101673 76f4da 101664->101673 101665->101532 103005 753698 83 API calls 4 library calls 101667->103005 101670 750db6 Mailbox 59 API calls 101668->101670 101672 739871 101670->101672 101672->101665 101675 737de1 59 API calls 101672->101675 101674 750db6 Mailbox 59 API calls 101673->101674 101679 76f552 Mailbox _wcscpy 101673->101679 101676 76f51f 101674->101676 101675->101665 101677 750db6 Mailbox 59 API calls 101676->101677 101678 76f545 101677->101678 101678->101679 101680 737de1 59 API calls 101678->101680 103006 753698 83 API calls 4 library calls 101679->103006 101680->101679 101681->101532 101682->101532 101683->101532 101685 750db6 Mailbox 59 API calls 101684->101685 101686 737688 101685->101686 101687 750db6 Mailbox 59 API calls 101686->101687 101688 737696 101687->101688 101688->101522 101689->101522 101690->101522 101692 737df0 __NMSG_WRITE _memmove 101691->101692 101693 750db6 Mailbox 59 API calls 101692->101693 101694 737e2e 101693->101694 101694->101522 101695->101522 101696->101522 101697->101522 101698->101522 101699->101522 101700->101596 101701->101597 101702->101617 101703->101617 101714 752c44 101704->101714 101706 752d4b 101706->101612 101707->101617 101708->101617 101709->101617 101710->101617 101711->101626 101712->101617 101713->101617 101715 752c50 __wsopen_helper 101714->101715 101722 753217 101715->101722 101721 752c77 __wsopen_helper 101721->101706 101739 759c0b 101722->101739 101724 752c59 101725 752c88 DecodePointer DecodePointer 101724->101725 101726 752cb5 101725->101726 101727 752c65 101725->101727 101726->101727 101785 7587a4 59 API calls 2 library calls 101726->101785 101736 752c82 101727->101736 101729 752d18 EncodePointer EncodePointer 101729->101727 101730 752cc7 101730->101729 101731 752cec 101730->101731 101786 758864 61 API calls 2 library calls 101730->101786 101731->101727 101734 752d06 EncodePointer 101731->101734 101787 758864 61 API calls 2 library calls 101731->101787 101734->101729 101735 752d00 101735->101727 101735->101734 101788 753220 101736->101788 101740 759c1c 101739->101740 101741 759c2f EnterCriticalSection 101739->101741 101746 759c93 101740->101746 101741->101724 101743 759c22 101743->101741 101770 7530b5 58 API calls 3 library calls 101743->101770 101747 759c9f __wsopen_helper 101746->101747 101748 759cc0 101747->101748 101749 759ca8 101747->101749 101762 759ce1 __wsopen_helper 101748->101762 101774 75881d 58 API calls 2 library calls 101748->101774 101771 75a16b 58 API calls __NMSG_WRITE 101749->101771 101751 759cad 101772 75a1c8 58 API calls 5 library calls 101751->101772 101754 759cd5 101756 759cdc 101754->101756 101757 759ceb 101754->101757 101755 759cb4 101773 75309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101755->101773 101775 758b28 58 API calls __getptd_noexit 101756->101775 101760 759c0b __lock 58 API calls 101757->101760 101763 759cf2 101760->101763 101762->101743 101764 759d17 101763->101764 101765 759cff 101763->101765 101777 752d55 101764->101777 101776 759e2b InitializeCriticalSectionAndSpinCount 101765->101776 101768 759d0b 101783 759d33 LeaveCriticalSection _doexit 101768->101783 101771->101751 101772->101755 101774->101754 101775->101762 101776->101768 101778 752d5e RtlFreeHeap 101777->101778 101782 752d87 _free 101777->101782 101779 752d73 101778->101779 101778->101782 101784 758b28 58 API calls __getptd_noexit 101779->101784 101781 752d79 GetLastError 101781->101782 101782->101768 101783->101762 101784->101781 101785->101730 101786->101731 101787->101735 101791 759d75 LeaveCriticalSection 101788->101791 101790 752c87 101790->101721 101791->101790 101936 79445a GetFileAttributesW 101792->101936 101796 739837 84 API calls 101795->101796 101797 7a4494 101796->101797 101940 736240 101797->101940 101799 7a44a4 101800 7a44c9 101799->101800 101801 739ea0 341 API calls 101799->101801 101803 7a44cd 101800->101803 101965 739a98 59 API calls Mailbox 101800->101965 101801->101800 101803->101643 101974 7acadd 101804->101974 101806 7adf47 101806->101643 101808 734e54 101807->101808 101812 734e5b 101807->101812 102099 7553a6 101808->102099 101810 734e7b FreeLibrary 101811 734e6a 101810->101811 101811->101643 101812->101810 101812->101811 101814 737667 59 API calls 101813->101814 101815 79cbaf 101814->101815 101816 737667 59 API calls 101815->101816 101817 79cbb8 101816->101817 101818 79cbcc 101817->101818 102556 739b3c 59 API calls 101817->102556 101820 739837 84 API calls 101818->101820 101821 79cbe9 101820->101821 101822 79cc0b 101821->101822 101823 79ccea 101821->101823 101835 79cd1a Mailbox 101821->101835 101824 739837 84 API calls 101822->101824 102369 734ddd 101823->102369 101826 79cc17 101824->101826 101828 738047 59 API calls 101826->101828 101830 79cc23 101828->101830 101829 79cd16 101832 737667 59 API calls 101829->101832 101829->101835 101837 79cc69 101830->101837 101838 79cc37 101830->101838 101831 734ddd 136 API calls 101831->101829 101833 79cd4b 101832->101833 101834 737667 59 API calls 101833->101834 101836 79cd54 101834->101836 101835->101643 101840 737667 59 API calls 101836->101840 101839 739837 84 API calls 101837->101839 101841 738047 59 API calls 101838->101841 101842 79cc76 101839->101842 101843 79cd5d 101840->101843 101844 79cc47 101841->101844 101845 738047 59 API calls 101842->101845 101846 737667 59 API calls 101843->101846 101847 737cab 59 API calls 101844->101847 101848 79cc82 101845->101848 101849 79cd66 101846->101849 101850 79cc51 101847->101850 102557 794a31 GetFileAttributesW 101848->102557 101852 739837 84 API calls 101849->101852 101853 739837 84 API calls 101850->101853 101855 79cd73 101852->101855 101856 79cc5d 101853->101856 101854 79cc8b 101857 79cc9e 101854->101857 101860 7379f2 59 API calls 101854->101860 102393 73459b 101855->102393 101859 737b2e 59 API calls 101856->101859 101862 739837 84 API calls 101857->101862 101867 79cca4 101857->101867 101859->101837 101860->101857 101861 79cd8e 102444 7379f2 101861->102444 101864 79cccb 101862->101864 102558 7937ef 75 API calls Mailbox 101864->102558 101867->101835 101868 79cdd1 101869 738047 59 API calls 101868->101869 101871 79cddf 101869->101871 101870 7379f2 59 API calls 101872 79cdae 101870->101872 101873 737b2e 59 API calls 101871->101873 101872->101868 101874 737bcc 59 API calls 101872->101874 101875 79cded 101873->101875 101876 79cdc3 101874->101876 101877 737b2e 59 API calls 101875->101877 101878 737bcc 59 API calls 101876->101878 101879 79cdfb 101877->101879 101878->101868 101880 737b2e 59 API calls 101879->101880 101881 79ce09 101880->101881 101882 739837 84 API calls 101881->101882 101883 79ce15 101882->101883 102447 794071 101883->102447 101885 79ce26 101886 793c37 3 API calls 101885->101886 101887 79ce30 101886->101887 101893->101639 101894->101643 101896 7abcb0 101895->101896 101897 7abc96 101895->101897 102998 7aa213 59 API calls Mailbox 101896->102998 102997 799e4a 89 API calls 4 library calls 101897->102997 101900 7abcbb 101901 739ea0 340 API calls 101900->101901 101902 7abd1c 101901->101902 101903 7abca8 Mailbox 101902->101903 101904 7abdae 101902->101904 101907 7abd5d 101902->101907 101903->101637 101905 7abe04 101904->101905 101906 7abdb4 101904->101906 101905->101903 101908 739837 84 API calls 101905->101908 103000 79791a 59 API calls 101906->103000 102999 7972df 59 API calls Mailbox 101907->102999 101910 7abe16 101908->101910 101913 737e4f 59 API calls 101910->101913 101911 7abdd7 103001 735d41 59 API calls Mailbox 101911->103001 101916 7abe3a CharUpperBuffW 101913->101916 101915 7abd8d 101918 73f460 340 API calls 101915->101918 101919 7abe54 101916->101919 101917 7abddf Mailbox 101922 73fce0 340 API calls 101917->101922 101918->101903 101920 7abe5b 101919->101920 101921 7abea7 101919->101921 103002 7972df 59 API calls Mailbox 101920->103002 101923 739837 84 API calls 101921->101923 101922->101903 101924 7abeaf 101923->101924 103003 739e5d 60 API calls 101924->103003 101927 7abe89 101928 73f460 340 API calls 101927->101928 101928->101903 101929 7abeb9 101929->101903 101930 739837 84 API calls 101929->101930 101931 7abed4 101930->101931 103004 735d41 59 API calls Mailbox 101931->103004 101933 7abee4 101934 73fce0 340 API calls 101933->101934 101934->101903 101935->101641 101937 793c3e 101936->101937 101938 794475 FindFirstFileW 101936->101938 101937->101643 101938->101937 101939 79448a FindClose 101938->101939 101939->101937 101941 737a16 59 API calls 101940->101941 101958 736265 101941->101958 101942 73646a 101968 73750f 59 API calls 2 library calls 101942->101968 101944 736484 Mailbox 101944->101799 101947 76dff6 101971 78f8aa 91 API calls 4 library calls 101947->101971 101948 73750f 59 API calls 101948->101958 101952 737d8c 59 API calls 101952->101958 101953 76e004 101972 73750f 59 API calls 2 library calls 101953->101972 101955 76e01a 101955->101944 101956 736799 _memmove 101973 78f8aa 91 API calls 4 library calls 101956->101973 101957 76df92 101959 738029 59 API calls 101957->101959 101958->101942 101958->101947 101958->101948 101958->101952 101958->101956 101958->101957 101962 737e4f 59 API calls 101958->101962 101966 735f6c 60 API calls 101958->101966 101967 735d41 59 API calls Mailbox 101958->101967 101969 735e72 60 API calls 101958->101969 101970 737924 59 API calls 2 library calls 101958->101970 101960 76df9d 101959->101960 101964 750db6 Mailbox 59 API calls 101960->101964 101963 73643b CharUpperBuffW 101962->101963 101963->101958 101964->101956 101965->101803 101966->101958 101967->101958 101968->101944 101969->101958 101970->101958 101971->101953 101972->101955 101973->101944 101975 739837 84 API calls 101974->101975 101976 7acb1a 101975->101976 102000 7acb61 Mailbox 101976->102000 102012 7ad7a5 101976->102012 101978 7acdb9 101979 7acf2e 101978->101979 101983 7acdc7 101978->101983 102062 7ad8c8 92 API calls Mailbox 101979->102062 101982 7acf3d 101982->101983 101984 7acf49 101982->101984 102025 7ac96e 101983->102025 101984->102000 101985 739837 84 API calls 102002 7acbb2 Mailbox 101985->102002 101990 7ace00 102040 750c08 101990->102040 101993 7ace1a 102046 799e4a 89 API calls 4 library calls 101993->102046 101994 7ace33 102047 7392ce 101994->102047 101997 7ace25 GetCurrentProcess TerminateProcess 101997->101994 102000->101806 102002->101978 102002->101985 102002->102000 102044 7afbce 59 API calls 2 library calls 102002->102044 102045 7acfdf 61 API calls 2 library calls 102002->102045 102004 7acfa4 102004->102000 102008 7acfb8 FreeLibrary 102004->102008 102005 7ace6b 102059 7ad649 107 API calls _free 102005->102059 102008->102000 102011 7ace7c 102011->102004 102060 738d40 59 API calls Mailbox 102011->102060 102061 739d3c 60 API calls Mailbox 102011->102061 102063 7ad649 107 API calls _free 102011->102063 102013 737e4f 59 API calls 102012->102013 102014 7ad7c0 CharLowerBuffW 102013->102014 102064 78f167 102014->102064 102018 737667 59 API calls 102019 7ad7f9 102018->102019 102071 73784b 102019->102071 102021 7ad810 102022 737d2c 59 API calls 102021->102022 102023 7ad81c Mailbox 102022->102023 102024 7ad858 Mailbox 102023->102024 102084 7acfdf 61 API calls 2 library calls 102023->102084 102024->102002 102026 7ac989 102025->102026 102027 7ac9de 102025->102027 102028 750db6 Mailbox 59 API calls 102026->102028 102031 7ada50 102027->102031 102030 7ac9ab 102028->102030 102029 750db6 Mailbox 59 API calls 102029->102030 102030->102027 102030->102029 102032 7adc79 Mailbox 102031->102032 102039 7ada73 _strcat _wcscpy __NMSG_WRITE 102031->102039 102032->101990 102033 739be6 59 API calls 102033->102039 102034 739b3c 59 API calls 102034->102039 102035 739b98 59 API calls 102035->102039 102036 75571c 58 API calls __crtGetStringTypeA_stat 102036->102039 102037 739837 84 API calls 102037->102039 102039->102032 102039->102033 102039->102034 102039->102035 102039->102036 102039->102037 102088 795887 61 API calls 2 library calls 102039->102088 102042 750c1d 102040->102042 102041 750cb5 VirtualProtect 102043 750c83 102041->102043 102042->102041 102042->102043 102043->101993 102043->101994 102044->102002 102045->102002 102046->101997 102048 7392d6 102047->102048 102049 750db6 Mailbox 59 API calls 102048->102049 102050 7392e4 102049->102050 102051 7392f0 102050->102051 102089 7391fc 59 API calls Mailbox 102050->102089 102053 739050 102051->102053 102090 739160 102053->102090 102055 73905f 102056 750db6 Mailbox 59 API calls 102055->102056 102057 7390fb 102055->102057 102056->102057 102057->102011 102058 738d40 59 API calls Mailbox 102057->102058 102058->102005 102059->102011 102060->102011 102061->102011 102062->101982 102063->102011 102066 78f192 __NMSG_WRITE 102064->102066 102065 78f1d1 102065->102018 102065->102023 102066->102065 102067 78f1c7 102066->102067 102068 78f278 102066->102068 102067->102065 102085 7378c4 61 API calls 102067->102085 102068->102065 102086 7378c4 61 API calls 102068->102086 102072 7378b7 102071->102072 102073 73785a 102071->102073 102074 737d2c 59 API calls 102072->102074 102073->102072 102075 737865 102073->102075 102076 737888 _memmove 102074->102076 102077 737880 102075->102077 102078 76eb09 102075->102078 102076->102021 102087 737f27 59 API calls Mailbox 102077->102087 102079 738029 59 API calls 102078->102079 102081 76eb13 102079->102081 102082 750db6 Mailbox 59 API calls 102081->102082 102083 76eb33 102082->102083 102084->102024 102085->102067 102086->102068 102087->102076 102088->102039 102089->102051 102091 739169 Mailbox 102090->102091 102092 76f19f 102091->102092 102096 739173 102091->102096 102093 750db6 Mailbox 59 API calls 102092->102093 102095 76f1ab 102093->102095 102094 73917a 102094->102055 102096->102094 102098 739c90 59 API calls Mailbox 102096->102098 102098->102096 102100 7553b2 __wsopen_helper 102099->102100 102101 7553c6 102100->102101 102102 7553de 102100->102102 102134 758b28 58 API calls __getptd_noexit 102101->102134 102108 7553d6 __wsopen_helper 102102->102108 102112 756c11 102102->102112 102104 7553cb 102135 758db6 9 API calls __wsopen_helper 102104->102135 102108->101812 102113 756c21 102112->102113 102114 756c43 EnterCriticalSection 102112->102114 102113->102114 102115 756c29 102113->102115 102116 7553f0 102114->102116 102117 759c0b __lock 58 API calls 102115->102117 102118 75533a 102116->102118 102117->102116 102119 75535d 102118->102119 102120 755349 102118->102120 102122 755359 102119->102122 102137 754a3d 102119->102137 102180 758b28 58 API calls __getptd_noexit 102120->102180 102136 755415 LeaveCriticalSection LeaveCriticalSection _fprintf 102122->102136 102123 75534e 102181 758db6 9 API calls __wsopen_helper 102123->102181 102130 755377 102154 760a02 102130->102154 102132 75537d 102132->102122 102133 752d55 _free 58 API calls 102132->102133 102133->102122 102134->102104 102135->102108 102136->102108 102138 754a50 102137->102138 102142 754a74 102137->102142 102139 7546e6 __fseek_nolock 58 API calls 102138->102139 102138->102142 102140 754a6d 102139->102140 102182 75d886 102140->102182 102143 760b77 102142->102143 102144 755371 102143->102144 102145 760b84 102143->102145 102147 7546e6 102144->102147 102145->102144 102146 752d55 _free 58 API calls 102145->102146 102146->102144 102148 754705 102147->102148 102149 7546f0 102147->102149 102148->102130 102324 758b28 58 API calls __getptd_noexit 102149->102324 102151 7546f5 102325 758db6 9 API calls __wsopen_helper 102151->102325 102153 754700 102153->102130 102155 760a0e __wsopen_helper 102154->102155 102156 760a32 102155->102156 102157 760a1b 102155->102157 102159 760abd 102156->102159 102161 760a42 102156->102161 102341 758af4 58 API calls __getptd_noexit 102157->102341 102346 758af4 58 API calls __getptd_noexit 102159->102346 102160 760a20 102342 758b28 58 API calls __getptd_noexit 102160->102342 102165 760a60 102161->102165 102166 760a6a 102161->102166 102163 760a65 102347 758b28 58 API calls __getptd_noexit 102163->102347 102343 758af4 58 API calls __getptd_noexit 102165->102343 102168 75d206 ___lock_fhandle 59 API calls 102166->102168 102170 760a70 102168->102170 102172 760a83 102170->102172 102173 760a8e 102170->102173 102171 760ac9 102348 758db6 9 API calls __wsopen_helper 102171->102348 102326 760add 102172->102326 102344 758b28 58 API calls __getptd_noexit 102173->102344 102176 760a27 __wsopen_helper 102176->102132 102178 760a89 102345 760ab5 LeaveCriticalSection __unlock_fhandle 102178->102345 102180->102123 102181->102122 102183 75d892 __wsopen_helper 102182->102183 102184 75d8b6 102183->102184 102185 75d89f 102183->102185 102187 75d955 102184->102187 102190 75d8ca 102184->102190 102283 758af4 58 API calls __getptd_noexit 102185->102283 102289 758af4 58 API calls __getptd_noexit 102187->102289 102189 75d8a4 102284 758b28 58 API calls __getptd_noexit 102189->102284 102193 75d8f2 102190->102193 102194 75d8e8 102190->102194 102191 75d8ed 102290 758b28 58 API calls __getptd_noexit 102191->102290 102210 75d206 102193->102210 102285 758af4 58 API calls __getptd_noexit 102194->102285 102198 75d8f8 102200 75d91e 102198->102200 102201 75d90b 102198->102201 102199 75d961 102291 758db6 9 API calls __wsopen_helper 102199->102291 102286 758b28 58 API calls __getptd_noexit 102200->102286 102219 75d975 102201->102219 102205 75d8ab __wsopen_helper 102205->102142 102206 75d917 102288 75d94d LeaveCriticalSection __unlock_fhandle 102206->102288 102207 75d923 102287 758af4 58 API calls __getptd_noexit 102207->102287 102211 75d212 __wsopen_helper 102210->102211 102212 75d261 EnterCriticalSection 102211->102212 102213 759c0b __lock 58 API calls 102211->102213 102214 75d287 __wsopen_helper 102212->102214 102215 75d237 102213->102215 102214->102198 102218 75d24f 102215->102218 102292 759e2b InitializeCriticalSectionAndSpinCount 102215->102292 102293 75d28b LeaveCriticalSection _doexit 102218->102293 102220 75d982 __write_nolock 102219->102220 102221 75d9c1 102220->102221 102222 75d9e0 102220->102222 102267 75d9b6 102220->102267 102303 758af4 58 API calls __getptd_noexit 102221->102303 102225 75da38 102222->102225 102226 75da1c 102222->102226 102230 75da51 102225->102230 102309 7618c1 60 API calls 3 library calls 102225->102309 102306 758af4 58 API calls __getptd_noexit 102226->102306 102227 75e1d6 102227->102206 102228 75d9c6 102304 758b28 58 API calls __getptd_noexit 102228->102304 102294 765c6b 102230->102294 102233 75da21 102307 758b28 58 API calls __getptd_noexit 102233->102307 102235 75d9cd 102305 758db6 9 API calls __wsopen_helper 102235->102305 102237 75da5f 102239 75ddb8 102237->102239 102310 7599ac 58 API calls 2 library calls 102237->102310 102241 75ddd6 102239->102241 102242 75e14b WriteFile 102239->102242 102240 75da28 102308 758db6 9 API calls __wsopen_helper 102240->102308 102245 75ddec 102241->102245 102246 75defa 102241->102246 102247 75ddab GetLastError 102242->102247 102252 75dd78 102242->102252 102254 75de5b WriteFile 102245->102254 102256 75e184 102245->102256 102249 75dfef 102246->102249 102265 75df05 102246->102265 102247->102252 102248 75da8b GetConsoleMode 102248->102239 102250 75daca 102248->102250 102249->102256 102264 75e064 WideCharToMultiByte 102249->102264 102250->102239 102253 75dada GetConsoleCP 102250->102253 102252->102256 102257 75ded8 102252->102257 102252->102267 102253->102256 102280 75db09 102253->102280 102254->102247 102258 75de98 102254->102258 102255 75e1b2 102316 758af4 58 API calls __getptd_noexit 102255->102316 102256->102267 102315 758b28 58 API calls __getptd_noexit 102256->102315 102262 75dee3 102257->102262 102263 75e17b 102257->102263 102258->102245 102259 75debc 102258->102259 102259->102252 102260 75df6a WriteFile 102260->102247 102266 75dfb9 102260->102266 102312 758b28 58 API calls __getptd_noexit 102262->102312 102314 758b07 58 API calls 3 library calls 102263->102314 102264->102247 102275 75e0ab 102264->102275 102265->102256 102265->102260 102266->102252 102266->102259 102266->102265 102317 75c5f6 102267->102317 102270 75e0b3 WriteFile 102273 75e106 GetLastError 102270->102273 102270->102275 102271 75dee8 102313 758af4 58 API calls __getptd_noexit 102271->102313 102273->102275 102275->102249 102275->102252 102275->102259 102275->102270 102276 767a5e WriteConsoleW CreateFileW __putwch_nolock 102281 75dc5f 102276->102281 102277 7662ba 60 API calls __write_nolock 102277->102280 102278 75dbf2 WideCharToMultiByte 102278->102252 102279 75dc2d WriteFile 102278->102279 102279->102247 102279->102281 102280->102252 102280->102277 102280->102278 102280->102281 102311 7535f5 58 API calls __isleadbyte_l 102280->102311 102281->102247 102281->102252 102281->102276 102281->102280 102282 75dc87 WriteFile 102281->102282 102282->102247 102282->102281 102283->102189 102284->102205 102285->102191 102286->102207 102287->102206 102288->102205 102289->102191 102290->102199 102291->102205 102292->102218 102293->102212 102295 765c76 102294->102295 102297 765c83 102294->102297 102296 758b28 __fseek_nolock 58 API calls 102295->102296 102298 765c7b 102296->102298 102299 765c8f 102297->102299 102300 758b28 __fseek_nolock 58 API calls 102297->102300 102298->102237 102299->102237 102301 765cb0 102300->102301 102302 758db6 __wsopen_helper 9 API calls 102301->102302 102302->102298 102303->102228 102304->102235 102305->102267 102306->102233 102307->102240 102308->102267 102309->102230 102310->102248 102311->102280 102312->102271 102313->102267 102314->102267 102315->102255 102316->102267 102318 75c600 IsProcessorFeaturePresent 102317->102318 102319 75c5fe 102317->102319 102321 76590a 102318->102321 102319->102227 102322 7658b9 ___raise_securityfailure 5 API calls 102321->102322 102323 7659ed 102322->102323 102323->102227 102324->102151 102325->102153 102349 75d4c3 102326->102349 102328 760b41 102362 75d43d 59 API calls 2 library calls 102328->102362 102329 760aeb 102329->102328 102331 75d4c3 __chsize_nolock 58 API calls 102329->102331 102340 760b1f 102329->102340 102334 760b16 102331->102334 102332 75d4c3 __chsize_nolock 58 API calls 102335 760b2b CloseHandle 102332->102335 102333 760b49 102339 760b6b 102333->102339 102363 758b07 58 API calls 3 library calls 102333->102363 102337 75d4c3 __chsize_nolock 58 API calls 102334->102337 102335->102328 102338 760b37 GetLastError 102335->102338 102337->102340 102338->102328 102339->102178 102340->102328 102340->102332 102341->102160 102342->102176 102343->102163 102344->102178 102345->102176 102346->102163 102347->102171 102348->102176 102350 75d4e3 102349->102350 102351 75d4ce 102349->102351 102357 75d508 102350->102357 102366 758af4 58 API calls __getptd_noexit 102350->102366 102364 758af4 58 API calls __getptd_noexit 102351->102364 102354 75d4d3 102365 758b28 58 API calls __getptd_noexit 102354->102365 102355 75d512 102367 758b28 58 API calls __getptd_noexit 102355->102367 102357->102329 102359 75d4db 102359->102329 102360 75d51a 102368 758db6 9 API calls __wsopen_helper 102360->102368 102362->102333 102363->102339 102364->102354 102365->102359 102366->102355 102367->102360 102368->102359 102559 734bb5 102369->102559 102374 76d8e6 102376 734e4a 84 API calls 102374->102376 102375 734e08 LoadLibraryExW 102569 734b6a 102375->102569 102378 76d8ed 102376->102378 102380 734b6a 3 API calls 102378->102380 102382 76d8f5 102380->102382 102595 734f0b 102382->102595 102383 734e2f 102383->102382 102384 734e3b 102383->102384 102385 734e4a 84 API calls 102384->102385 102387 734e40 102385->102387 102387->101829 102387->101831 102390 76d91c 102603 734ec7 102390->102603 102394 737667 59 API calls 102393->102394 102395 7345b1 102394->102395 102396 737667 59 API calls 102395->102396 102397 7345b9 102396->102397 102398 737667 59 API calls 102397->102398 102399 7345c1 102398->102399 102400 737667 59 API calls 102399->102400 102401 7345c9 102400->102401 102402 76d4d2 102401->102402 102403 7345fd 102401->102403 102404 738047 59 API calls 102402->102404 102405 73784b 59 API calls 102403->102405 102406 76d4db 102404->102406 102407 73460b 102405->102407 102877 737d8c 102406->102877 102409 737d2c 59 API calls 102407->102409 102410 734615 102409->102410 102412 734640 102410->102412 102413 73784b 59 API calls 102410->102413 102411 734680 102414 73784b 59 API calls 102411->102414 102412->102411 102415 73465f 102412->102415 102431 76d4fb 102412->102431 102416 734636 102413->102416 102418 734691 102414->102418 102417 7379f2 59 API calls 102415->102417 102420 737d2c 59 API calls 102416->102420 102422 734669 102417->102422 102423 7346a3 102418->102423 102425 738047 59 API calls 102418->102425 102419 76d5cb 102421 737bcc 59 API calls 102419->102421 102420->102412 102439 76d588 102421->102439 102422->102411 102428 73784b 59 API calls 102422->102428 102424 7346b3 102423->102424 102426 738047 59 API calls 102423->102426 102427 7346ba 102424->102427 102429 738047 59 API calls 102424->102429 102425->102423 102426->102424 102430 738047 59 API calls 102427->102430 102441 7346c1 Mailbox 102427->102441 102428->102411 102429->102427 102430->102441 102431->102419 102432 76d5b4 102431->102432 102438 76d532 102431->102438 102432->102419 102434 76d59f 102432->102434 102433 7379f2 59 API calls 102433->102439 102437 737bcc 59 API calls 102434->102437 102435 76d590 102436 737bcc 59 API calls 102435->102436 102436->102439 102437->102439 102438->102435 102442 76d57b 102438->102442 102439->102411 102439->102433 102881 737924 59 API calls 2 library calls 102439->102881 102441->101861 102443 737bcc 59 API calls 102442->102443 102443->102439 102445 737e4f 59 API calls 102444->102445 102446 7379fd 102445->102446 102446->101868 102446->101870 102448 79408d 102447->102448 102449 7940a0 102448->102449 102450 794092 102448->102450 102452 737667 59 API calls 102449->102452 102451 738047 59 API calls 102450->102451 102454 79409b Mailbox 102451->102454 102453 7940a8 102452->102453 102455 737667 59 API calls 102453->102455 102454->101885 102456 7940b0 102455->102456 102457 737667 59 API calls 102456->102457 102556->101818 102557->101854 102558->101867 102608 734c03 102559->102608 102561 734bdc 102563 734bf5 102561->102563 102564 734bec FreeLibrary 102561->102564 102566 75525b 102563->102566 102564->102563 102565 734c03 2 API calls 102565->102561 102612 755270 102566->102612 102568 734dfc 102568->102374 102568->102375 102693 734c36 102569->102693 102572 734c36 2 API calls 102575 734b8f 102572->102575 102573 734ba1 FreeLibrary 102574 734baa 102573->102574 102576 734c70 102574->102576 102575->102573 102575->102574 102577 750db6 Mailbox 59 API calls 102576->102577 102578 734c85 102577->102578 102697 73522e 102578->102697 102580 734c91 _memmove 102581 734ccc 102580->102581 102583 734dc1 102580->102583 102584 734d89 102580->102584 102582 734ec7 69 API calls 102581->102582 102587 734cd5 102582->102587 102711 79991b 95 API calls 102583->102711 102700 734e89 CreateStreamOnHGlobal 102584->102700 102588 734f0b 74 API calls 102587->102588 102590 76d8a7 102587->102590 102594 734d69 102587->102594 102706 734ee5 102587->102706 102588->102587 102591 734ee5 85 API calls 102590->102591 102592 76d8bb 102591->102592 102593 734f0b 74 API calls 102592->102593 102593->102594 102594->102383 102596 76d9cd 102595->102596 102597 734f1d 102595->102597 102729 7555e2 102597->102729 102600 799109 102854 798f5f 102600->102854 102602 79911f 102602->102390 102604 734ed6 102603->102604 102605 76d990 102603->102605 102859 755c60 102604->102859 102607 734ede 102609 734bd0 102608->102609 102610 734c0c LoadLibraryA 102608->102610 102609->102561 102609->102565 102610->102609 102611 734c1d GetProcAddress 102610->102611 102611->102609 102615 75527c __wsopen_helper 102612->102615 102613 75528f 102661 758b28 58 API calls __getptd_noexit 102613->102661 102615->102613 102617 7552c0 102615->102617 102616 755294 102662 758db6 9 API calls __wsopen_helper 102616->102662 102631 7604e8 102617->102631 102620 7552c5 102621 7552ce 102620->102621 102622 7552db 102620->102622 102663 758b28 58 API calls __getptd_noexit 102621->102663 102624 755305 102622->102624 102625 7552e5 102622->102625 102646 760607 102624->102646 102664 758b28 58 API calls __getptd_noexit 102625->102664 102627 75529f __wsopen_helper @_EH4_CallFilterFunc@8 102627->102568 102632 7604f4 __wsopen_helper 102631->102632 102633 759c0b __lock 58 API calls 102632->102633 102644 760502 102633->102644 102634 760576 102666 7605fe 102634->102666 102635 76057d 102671 75881d 58 API calls 2 library calls 102635->102671 102638 760584 102638->102634 102672 759e2b InitializeCriticalSectionAndSpinCount 102638->102672 102639 7605f3 __wsopen_helper 102639->102620 102641 759c93 __mtinitlocknum 58 API calls 102641->102644 102643 7605aa EnterCriticalSection 102643->102634 102644->102634 102644->102635 102644->102641 102669 756c50 59 API calls __lock 102644->102669 102670 756cba LeaveCriticalSection LeaveCriticalSection _doexit 102644->102670 102647 760627 __wopenfile 102646->102647 102648 760641 102647->102648 102660 7607fc 102647->102660 102679 7537cb 60 API calls 3 library calls 102647->102679 102677 758b28 58 API calls __getptd_noexit 102648->102677 102650 760646 102678 758db6 9 API calls __wsopen_helper 102650->102678 102652 76085f 102674 7685a1 102652->102674 102654 755310 102665 755332 LeaveCriticalSection LeaveCriticalSection _fprintf 102654->102665 102656 7607f5 102656->102660 102680 7537cb 60 API calls 3 library calls 102656->102680 102658 760814 102658->102660 102681 7537cb 60 API calls 3 library calls 102658->102681 102660->102648 102660->102652 102661->102616 102662->102627 102663->102627 102664->102627 102665->102627 102673 759d75 LeaveCriticalSection 102666->102673 102668 760605 102668->102639 102669->102644 102670->102644 102671->102638 102672->102643 102673->102668 102682 767d85 102674->102682 102676 7685ba 102676->102654 102677->102650 102678->102654 102679->102656 102680->102658 102681->102660 102684 767d91 __wsopen_helper 102682->102684 102683 767da7 102685 758b28 __fseek_nolock 58 API calls 102683->102685 102684->102683 102686 767ddd 102684->102686 102687 767dac 102685->102687 102688 767e4e __wsopen_nolock 109 API calls 102686->102688 102689 758db6 __wsopen_helper 9 API calls 102687->102689 102690 767df9 102688->102690 102692 767db6 __wsopen_helper 102689->102692 102691 767e22 __wsopen_helper LeaveCriticalSection 102690->102691 102691->102692 102692->102676 102694 734b83 102693->102694 102695 734c3f LoadLibraryA 102693->102695 102694->102572 102694->102575 102695->102694 102696 734c50 GetProcAddress 102695->102696 102696->102694 102698 750db6 Mailbox 59 API calls 102697->102698 102699 735240 102698->102699 102699->102580 102701 734ea3 FindResourceExW 102700->102701 102705 734ec0 102700->102705 102702 76d933 LoadResource 102701->102702 102701->102705 102703 76d948 SizeofResource 102702->102703 102702->102705 102704 76d95c LockResource 102703->102704 102703->102705 102704->102705 102705->102581 102707 734ef4 102706->102707 102708 76d9ab 102706->102708 102712 75584d 102707->102712 102710 734f02 102710->102587 102711->102581 102715 755859 __wsopen_helper 102712->102715 102713 75586b 102725 758b28 58 API calls __getptd_noexit 102713->102725 102715->102713 102716 755891 102715->102716 102717 756c11 __lock_file 59 API calls 102716->102717 102719 755897 102717->102719 102718 755870 102726 758db6 9 API calls __wsopen_helper 102718->102726 102727 7557be 83 API calls 4 library calls 102719->102727 102722 7558a6 102728 7558c8 LeaveCriticalSection LeaveCriticalSection _fprintf 102722->102728 102724 75587b __wsopen_helper 102724->102710 102725->102718 102726->102724 102727->102722 102728->102724 102732 7555fd 102729->102732 102731 734f2e 102731->102600 102733 755609 __wsopen_helper 102732->102733 102734 75564c 102733->102734 102735 75561f _memset 102733->102735 102736 755644 __wsopen_helper 102733->102736 102737 756c11 __lock_file 59 API calls 102734->102737 102759 758b28 58 API calls __getptd_noexit 102735->102759 102736->102731 102738 755652 102737->102738 102745 75541d 102738->102745 102741 755639 102760 758db6 9 API calls __wsopen_helper 102741->102760 102749 755438 _memset 102745->102749 102752 755453 102745->102752 102746 755443 102850 758b28 58 API calls __getptd_noexit 102746->102850 102748 755448 102851 758db6 9 API calls __wsopen_helper 102748->102851 102749->102746 102749->102752 102754 755493 102749->102754 102761 755686 LeaveCriticalSection LeaveCriticalSection _fprintf 102752->102761 102753 7555a4 _memset 102853 758b28 58 API calls __getptd_noexit 102753->102853 102754->102752 102754->102753 102755 7546e6 __fseek_nolock 58 API calls 102754->102755 102762 760e5b 102754->102762 102830 760ba7 102754->102830 102852 760cc8 58 API calls 4 library calls 102754->102852 102755->102754 102759->102741 102760->102736 102761->102736 102763 760e93 102762->102763 102764 760e7c 102762->102764 102766 7615cb 102763->102766 102769 760ecd 102763->102769 102765 758af4 __chsize_nolock 58 API calls 102764->102765 102768 760e81 102765->102768 102767 758af4 __chsize_nolock 58 API calls 102766->102767 102770 7615d0 102767->102770 102771 758b28 __fseek_nolock 58 API calls 102768->102771 102772 760ed5 102769->102772 102779 760eec 102769->102779 102773 758b28 __fseek_nolock 58 API calls 102770->102773 102810 760e88 102771->102810 102774 758af4 __chsize_nolock 58 API calls 102772->102774 102775 760ee1 102773->102775 102776 760eda 102774->102776 102777 758db6 __wsopen_helper 9 API calls 102775->102777 102780 758b28 __fseek_nolock 58 API calls 102776->102780 102777->102810 102778 760f01 102781 758af4 __chsize_nolock 58 API calls 102778->102781 102779->102778 102782 760f1b 102779->102782 102783 760f39 102779->102783 102779->102810 102780->102775 102781->102776 102782->102778 102785 760f26 102782->102785 102784 75881d __malloc_crt 58 API calls 102783->102784 102786 760f49 102784->102786 102787 765c6b __flswbuf 58 API calls 102785->102787 102788 760f51 102786->102788 102789 760f6c 102786->102789 102790 76103a 102787->102790 102791 758b28 __fseek_nolock 58 API calls 102788->102791 102793 7618c1 __lseeki64_nolock 60 API calls 102789->102793 102792 7610b3 ReadFile 102790->102792 102797 761050 GetConsoleMode 102790->102797 102794 760f56 102791->102794 102795 7610d5 102792->102795 102796 761593 GetLastError 102792->102796 102793->102785 102800 758af4 __chsize_nolock 58 API calls 102794->102800 102795->102796 102804 7610a5 102795->102804 102801 761093 102796->102801 102802 7615a0 102796->102802 102798 761064 102797->102798 102799 7610b0 102797->102799 102798->102799 102803 76106a ReadConsoleW 102798->102803 102799->102792 102800->102810 102807 758b07 __dosmaperr 58 API calls 102801->102807 102812 761099 102801->102812 102805 758b28 __fseek_nolock 58 API calls 102802->102805 102803->102804 102806 76108d GetLastError 102803->102806 102804->102812 102813 76110a 102804->102813 102814 761377 102804->102814 102808 7615a5 102805->102808 102806->102801 102807->102812 102809 758af4 __chsize_nolock 58 API calls 102808->102809 102809->102812 102810->102754 102811 752d55 _free 58 API calls 102811->102810 102812->102810 102812->102811 102816 761176 ReadFile 102813->102816 102822 7611f7 102813->102822 102814->102812 102817 76147d ReadFile 102814->102817 102818 761197 GetLastError 102816->102818 102825 7611a1 102816->102825 102821 7614a0 GetLastError 102817->102821 102829 7614ae 102817->102829 102818->102825 102819 7612b4 102824 761264 MultiByteToWideChar 102819->102824 102826 7618c1 __lseeki64_nolock 60 API calls 102819->102826 102820 7612a4 102823 758b28 __fseek_nolock 58 API calls 102820->102823 102821->102829 102822->102812 102822->102819 102822->102820 102822->102824 102823->102812 102824->102806 102824->102812 102825->102813 102827 7618c1 __lseeki64_nolock 60 API calls 102825->102827 102826->102824 102827->102825 102828 7618c1 __lseeki64_nolock 60 API calls 102828->102829 102829->102814 102829->102828 102831 760bb2 102830->102831 102835 760bc7 102830->102835 102832 758b28 __fseek_nolock 58 API calls 102831->102832 102833 760bb7 102832->102833 102834 758db6 __wsopen_helper 9 API calls 102833->102834 102842 760bc2 102834->102842 102836 760bfc 102835->102836 102837 765fe4 __getbuf 58 API calls 102835->102837 102835->102842 102838 7546e6 __fseek_nolock 58 API calls 102836->102838 102837->102836 102839 760c10 102838->102839 102840 760d47 __read 72 API calls 102839->102840 102841 760c17 102840->102841 102841->102842 102843 7546e6 __fseek_nolock 58 API calls 102841->102843 102842->102754 102844 760c3a 102843->102844 102844->102842 102845 7546e6 __fseek_nolock 58 API calls 102844->102845 102846 760c46 102845->102846 102846->102842 102847 7546e6 __fseek_nolock 58 API calls 102846->102847 102848 760c53 102847->102848 102849 7546e6 __fseek_nolock 58 API calls 102848->102849 102849->102842 102850->102748 102851->102752 102852->102754 102853->102748 102857 75520a GetSystemTimeAsFileTime 102854->102857 102856 798f6e 102856->102602 102858 755238 __aulldiv 102857->102858 102858->102856 102860 755c6c __wsopen_helper 102859->102860 102861 755c93 102860->102861 102862 755c7e 102860->102862 102864 756c11 __lock_file 59 API calls 102861->102864 102873 758b28 58 API calls __getptd_noexit 102862->102873 102866 755c99 102864->102866 102865 755c83 102874 758db6 9 API calls __wsopen_helper 102865->102874 102875 7558d0 67 API calls 6 library calls 102866->102875 102869 755ca4 102876 755cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 102869->102876 102870 755c8e __wsopen_helper 102870->102607 102872 755cb6 102872->102870 102873->102865 102874->102870 102875->102869 102876->102872 102878 737da6 102877->102878 102880 737d99 102877->102880 102879 750db6 Mailbox 59 API calls 102878->102879 102879->102880 102880->102412 102881->102439 102997->101903 102998->101900 102999->101915 103000->101911 103001->101917 103002->101927 103003->101929 103004->101933 103005->101668 103006->101666 103008 73b91a 103007->103008 103011 73bac7 103007->103011 103009 73bf81 103008->103009 103008->103011 103013 73b9fc 103008->103013 103014 73baab 103008->103014 103009->103014 103032 7394dc 59 API calls wcstoxq 103009->103032 103010 73ba8b Mailbox 103010->101558 103010->103014 103018 771361 103010->103018 103031 738cd4 59 API calls Mailbox 103010->103031 103011->103009 103011->103010 103011->103014 103016 73bb46 103011->103016 103013->103014 103013->103016 103017 73ba38 103013->103017 103014->101558 103014->103014 103016->103010 103016->103014 103016->103018 103029 786e8f 59 API calls 103016->103029 103017->103010 103017->103014 103022 7711b4 103017->103022 103018->103014 103030 753d46 59 API calls __wtof_l 103018->103030 103022->103014 103028 753d46 59 API calls __wtof_l 103022->103028 103023->101558 103024->101552 103025->101560 103026->101563 103027->101560 103028->103022 103029->103010 103030->103014 103031->103010 103032->103014 103033->101584 103034 757c56 103035 757c62 __wsopen_helper 103034->103035 103071 759e08 GetStartupInfoW 103035->103071 103037 757c67 103073 758b7c GetProcessHeap 103037->103073 103039 757cbf 103040 757cca 103039->103040 103156 757da6 58 API calls 3 library calls 103039->103156 103074 759ae6 103040->103074 103043 757cd0 103044 757cdb __RTC_Initialize 103043->103044 103157 757da6 58 API calls 3 library calls 103043->103157 103095 75d5d2 103044->103095 103047 757cea 103048 757cf6 GetCommandLineW 103047->103048 103158 757da6 58 API calls 3 library calls 103047->103158 103114 764f23 GetEnvironmentStringsW 103048->103114 103051 757cf5 103051->103048 103054 757d10 103057 757d1b 103054->103057 103159 7530b5 58 API calls 3 library calls 103054->103159 103124 764d58 103057->103124 103058 757d21 103059 757d2c 103058->103059 103160 7530b5 58 API calls 3 library calls 103058->103160 103138 7530ef 103059->103138 103062 757d34 103063 757d3f __wwincmdln 103062->103063 103161 7530b5 58 API calls 3 library calls 103062->103161 103144 7347d0 103063->103144 103066 757d53 103067 757d62 103066->103067 103162 753358 58 API calls _doexit 103066->103162 103163 7530e0 58 API calls _doexit 103067->103163 103070 757d67 __wsopen_helper 103072 759e1e 103071->103072 103072->103037 103073->103039 103164 753187 36 API calls 2 library calls 103074->103164 103076 759aeb 103165 759d3c InitializeCriticalSectionAndSpinCount ___lock_fhandle 103076->103165 103078 759af0 103079 759af4 103078->103079 103167 759d8a TlsAlloc 103078->103167 103166 759b5c 61 API calls 2 library calls 103079->103166 103082 759af9 103082->103043 103083 759b06 103083->103079 103084 759b11 103083->103084 103168 7587d5 103084->103168 103087 759b53 103176 759b5c 61 API calls 2 library calls 103087->103176 103090 759b58 103090->103043 103091 759b32 103091->103087 103092 759b38 103091->103092 103175 759a33 58 API calls 4 library calls 103092->103175 103094 759b40 GetCurrentThreadId 103094->103043 103096 75d5de __wsopen_helper 103095->103096 103097 759c0b __lock 58 API calls 103096->103097 103098 75d5e5 103097->103098 103099 7587d5 __calloc_crt 58 API calls 103098->103099 103101 75d5f6 103099->103101 103100 75d661 GetStartupInfoW 103108 75d676 103100->103108 103111 75d7a5 103100->103111 103101->103100 103102 75d601 __wsopen_helper @_EH4_CallFilterFunc@8 103101->103102 103102->103047 103103 75d86d 103190 75d87d LeaveCriticalSection _doexit 103103->103190 103105 7587d5 __calloc_crt 58 API calls 103105->103108 103106 75d7f2 GetStdHandle 103106->103111 103107 75d805 GetFileType 103107->103111 103108->103105 103109 75d6c4 103108->103109 103108->103111 103110 75d6f8 GetFileType 103109->103110 103109->103111 103188 759e2b InitializeCriticalSectionAndSpinCount 103109->103188 103110->103109 103111->103103 103111->103106 103111->103107 103189 759e2b InitializeCriticalSectionAndSpinCount 103111->103189 103115 764f34 103114->103115 103116 757d06 103114->103116 103191 75881d 58 API calls 2 library calls 103115->103191 103120 764b1b GetModuleFileNameW 103116->103120 103118 764f5a _memmove 103119 764f70 FreeEnvironmentStringsW 103118->103119 103119->103116 103121 764b4f _wparse_cmdline 103120->103121 103123 764b8f _wparse_cmdline 103121->103123 103192 75881d 58 API calls 2 library calls 103121->103192 103123->103054 103125 764d69 103124->103125 103126 764d71 __NMSG_WRITE 103124->103126 103125->103058 103127 7587d5 __calloc_crt 58 API calls 103126->103127 103134 764d9a __NMSG_WRITE 103127->103134 103128 764df1 103129 752d55 _free 58 API calls 103128->103129 103129->103125 103130 7587d5 __calloc_crt 58 API calls 103130->103134 103131 764e16 103132 752d55 _free 58 API calls 103131->103132 103132->103125 103134->103125 103134->103128 103134->103130 103134->103131 103135 764e2d 103134->103135 103193 764607 58 API calls 2 library calls 103134->103193 103194 758dc6 IsProcessorFeaturePresent 103135->103194 103137 764e39 103137->103058 103139 7530fb __IsNonwritableInCurrentImage 103138->103139 103209 75a4d1 103139->103209 103141 753119 __initterm_e 103142 752d40 __cinit 67 API calls 103141->103142 103143 753138 _doexit __IsNonwritableInCurrentImage 103141->103143 103142->103143 103143->103062 103145 7347ea 103144->103145 103155 734889 103144->103155 103146 734824 IsThemeActive 103145->103146 103212 75336c 103146->103212 103150 734850 103224 7348fd SystemParametersInfoW SystemParametersInfoW 103150->103224 103152 73485c 103225 733b3a 103152->103225 103154 734864 SystemParametersInfoW 103154->103155 103155->103066 103156->103040 103157->103044 103158->103051 103162->103067 103163->103070 103164->103076 103165->103078 103166->103082 103167->103083 103171 7587dc 103168->103171 103170 758817 103170->103087 103174 759de6 TlsSetValue 103170->103174 103171->103170 103173 7587fa 103171->103173 103177 7651f6 103171->103177 103173->103170 103173->103171 103185 75a132 Sleep 103173->103185 103174->103091 103175->103094 103176->103090 103178 765201 103177->103178 103179 76521c 103177->103179 103178->103179 103180 76520d 103178->103180 103182 76522c HeapAlloc 103179->103182 103183 765212 103179->103183 103187 7533a1 DecodePointer 103179->103187 103186 758b28 58 API calls __getptd_noexit 103180->103186 103182->103179 103182->103183 103183->103171 103185->103173 103186->103183 103187->103179 103188->103109 103189->103111 103190->103102 103191->103118 103192->103123 103193->103134 103195 758dd1 103194->103195 103200 758c59 103195->103200 103199 758dec 103199->103137 103201 758c73 _memset ___raise_securityfailure 103200->103201 103202 758c93 IsDebuggerPresent 103201->103202 103208 75a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 103202->103208 103204 75c5f6 __crtGetStringTypeA_stat 6 API calls 103206 758d7a 103204->103206 103205 758d57 ___raise_securityfailure 103205->103204 103207 75a140 GetCurrentProcess TerminateProcess 103206->103207 103207->103199 103208->103205 103210 75a4d4 EncodePointer 103209->103210 103210->103210 103211 75a4ee 103210->103211 103211->103141 103213 759c0b __lock 58 API calls 103212->103213 103214 753377 DecodePointer EncodePointer 103213->103214 103277 759d75 LeaveCriticalSection 103214->103277 103216 734849 103217 7533d4 103216->103217 103218 7533de 103217->103218 103219 7533f8 103217->103219 103218->103219 103278 758b28 58 API calls __getptd_noexit 103218->103278 103219->103150 103221 7533e8 103279 758db6 9 API calls __wsopen_helper 103221->103279 103223 7533f3 103223->103150 103224->103152 103226 733b47 __write_nolock 103225->103226 103227 737667 59 API calls 103226->103227 103228 733b51 GetCurrentDirectoryW 103227->103228 103280 733766 103228->103280 103230 733b7a IsDebuggerPresent 103231 76d272 MessageBoxA 103230->103231 103232 733b88 103230->103232 103234 76d28c 103231->103234 103233 733ba5 103232->103233 103232->103234 103263 733c61 103232->103263 103361 737285 103233->103361 103402 737213 59 API calls Mailbox 103234->103402 103235 733c68 SetCurrentDirectoryW 103239 733c75 Mailbox 103235->103239 103239->103154 103241 76d29c 103244 76d2b2 SetCurrentDirectoryW 103241->103244 103244->103239 103263->103235 103277->103216 103278->103221 103279->103223 103281 737667 59 API calls 103280->103281 103282 73377c 103281->103282 103411 733d31 103282->103411 103284 73379a 103285 734706 61 API calls 103284->103285 103286 7337ae 103285->103286 103287 737de1 59 API calls 103286->103287 103288 7337bb 103287->103288 103289 734ddd 136 API calls 103288->103289 103290 7337d4 103289->103290 103291 76d173 103290->103291 103292 7337dc Mailbox 103290->103292 103453 79955b 103291->103453 103296 738047 59 API calls 103292->103296 103295 76d192 103298 752d55 _free 58 API calls 103295->103298 103299 7337ef 103296->103299 103297 734e4a 84 API calls 103297->103295 103300 76d19f 103298->103300 103425 73928a 103299->103425 103302 734e4a 84 API calls 103300->103302 103304 76d1a8 103302->103304 103308 733ed0 59 API calls 103304->103308 103305 737de1 59 API calls 103306 733808 103305->103306 103307 7384c0 69 API calls 103306->103307 103309 73381a Mailbox 103307->103309 103310 76d1c3 103308->103310 103311 737de1 59 API calls 103309->103311 103312 733ed0 59 API calls 103310->103312 103313 733840 103311->103313 103314 76d1df 103312->103314 103315 7384c0 69 API calls 103313->103315 103316 734706 61 API calls 103314->103316 103318 73384f Mailbox 103315->103318 103317 76d204 103316->103317 103319 733ed0 59 API calls 103317->103319 103321 737667 59 API calls 103318->103321 103320 76d210 103319->103320 103322 738047 59 API calls 103320->103322 103323 73386d 103321->103323 103324 76d21e 103322->103324 103428 733ed0 103323->103428 103326 733ed0 59 API calls 103324->103326 103328 76d22d 103326->103328 103334 738047 59 API calls 103328->103334 103330 733887 103330->103304 103331 733891 103330->103331 103332 752efd _W_store_winword 60 API calls 103331->103332 103333 73389c 103332->103333 103333->103310 103335 7338a6 103333->103335 103336 76d24f 103334->103336 103337 752efd _W_store_winword 60 API calls 103335->103337 103338 733ed0 59 API calls 103336->103338 103339 7338b1 103337->103339 103340 76d25c 103338->103340 103339->103314 103341 7338bb 103339->103341 103340->103340 103342 752efd _W_store_winword 60 API calls 103341->103342 103343 7338c6 103342->103343 103343->103328 103344 733907 103343->103344 103346 733ed0 59 API calls 103343->103346 103344->103328 103345 733914 103344->103345 103347 7392ce 59 API calls 103345->103347 103348 7338ea 103346->103348 103349 733924 103347->103349 103350 738047 59 API calls 103348->103350 103351 739050 59 API calls 103349->103351 103352 7338f8 103350->103352 103353 733932 103351->103353 103354 733ed0 59 API calls 103352->103354 103444 738ee0 103353->103444 103354->103344 103356 73394f 103357 73928a 59 API calls 103356->103357 103358 738ee0 60 API calls 103356->103358 103359 733ed0 59 API calls 103356->103359 103360 733995 Mailbox 103356->103360 103357->103356 103358->103356 103359->103356 103360->103230 103362 737292 __write_nolock 103361->103362 103363 76ea22 _memset 103362->103363 103364 7372ab 103362->103364 103366 76ea3e GetOpenFileNameW 103363->103366 103499 734750 103364->103499 103369 76ea8d 103366->103369 103371 737bcc 59 API calls 103369->103371 103373 76eaa2 103371->103373 103373->103373 103402->103241 103412 733d3e __write_nolock 103411->103412 103413 737bcc 59 API calls 103412->103413 103418 733ea4 Mailbox 103412->103418 103415 733d70 103413->103415 103414 7379f2 59 API calls 103414->103415 103415->103414 103422 733da6 Mailbox 103415->103422 103416 7379f2 59 API calls 103416->103422 103417 733e77 103417->103418 103419 737de1 59 API calls 103417->103419 103418->103284 103421 733e98 103419->103421 103420 737de1 59 API calls 103420->103422 103423 733f74 59 API calls 103421->103423 103422->103416 103422->103417 103422->103418 103422->103420 103488 733f74 103422->103488 103423->103418 103426 750db6 Mailbox 59 API calls 103425->103426 103427 7337fb 103426->103427 103427->103305 103429 733ef3 103428->103429 103430 733eda 103428->103430 103432 737bcc 59 API calls 103429->103432 103431 738047 59 API calls 103430->103431 103433 733879 103431->103433 103432->103433 103434 752efd 103433->103434 103435 752f7e 103434->103435 103436 752f09 103434->103436 103496 752f90 60 API calls 4 library calls 103435->103496 103443 752f2e 103436->103443 103494 758b28 58 API calls __getptd_noexit 103436->103494 103439 752f8b 103439->103330 103440 752f15 103495 758db6 9 API calls __wsopen_helper 103440->103495 103442 752f20 103442->103330 103443->103330 103445 738ef7 103444->103445 103446 76f17c 103444->103446 103448 739040 103445->103448 103449 738ff8 103445->103449 103452 738fff 103445->103452 103446->103445 103498 738bdb 59 API calls Mailbox 103446->103498 103497 739d3c 60 API calls Mailbox 103448->103497 103450 750db6 Mailbox 59 API calls 103449->103450 103450->103452 103452->103356 103454 734ee5 85 API calls 103453->103454 103455 7995ca 103454->103455 103456 799734 96 API calls 103455->103456 103457 7995dc 103456->103457 103458 734f0b 74 API calls 103457->103458 103486 76d186 103457->103486 103459 7995f7 103458->103459 103460 734f0b 74 API calls 103459->103460 103461 799607 103460->103461 103462 734f0b 74 API calls 103461->103462 103463 799622 103462->103463 103464 734f0b 74 API calls 103463->103464 103465 79963d 103464->103465 103466 734ee5 85 API calls 103465->103466 103467 799654 103466->103467 103468 75571c __crtGetStringTypeA_stat 58 API calls 103467->103468 103469 79965b 103468->103469 103470 75571c __crtGetStringTypeA_stat 58 API calls 103469->103470 103471 799665 103470->103471 103472 734f0b 74 API calls 103471->103472 103473 799679 103472->103473 103474 799109 GetSystemTimeAsFileTime 103473->103474 103475 79968c 103474->103475 103476 7996a1 103475->103476 103477 7996b6 103475->103477 103480 752d55 _free 58 API calls 103476->103480 103478 79971b 103477->103478 103479 7996bc 103477->103479 103483 752d55 _free 58 API calls 103478->103483 103482 798b06 116 API calls 103479->103482 103481 7996a7 103480->103481 103484 752d55 _free 58 API calls 103481->103484 103485 799713 103482->103485 103483->103486 103484->103486 103487 752d55 _free 58 API calls 103485->103487 103486->103295 103486->103297 103487->103486 103489 733f82 103488->103489 103493 733fa4 _memmove 103488->103493 103491 750db6 Mailbox 59 API calls 103489->103491 103490 750db6 Mailbox 59 API calls 103492 733fb8 103490->103492 103491->103493 103492->103422 103493->103490 103494->103440 103495->103442 103496->103439 103497->103452 103498->103445 103561 761940 103499->103561 103502 734799 103505 737d8c 59 API calls 103502->103505 103503 73477c 103504 737bcc 59 API calls 103503->103504 103506 734788 103504->103506 103505->103506 103562 73475d GetFullPathNameW 103561->103562 103562->103502 103562->103503 103727 731066 103732 73f76f 103727->103732 103729 73106c 103730 752d40 __cinit 67 API calls 103729->103730 103731 731076 103730->103731 103733 73f790 103732->103733 103765 74ff03 103733->103765 103737 73f7d7 103738 737667 59 API calls 103737->103738 103739 73f7e1 103738->103739 103740 737667 59 API calls 103739->103740 103741 73f7eb 103740->103741 103742 737667 59 API calls 103741->103742 103743 73f7f5 103742->103743 103744 737667 59 API calls 103743->103744 103745 73f833 103744->103745 103746 737667 59 API calls 103745->103746 103747 73f8fe 103746->103747 103775 745f87 103747->103775 103751 73f930 103752 737667 59 API calls 103751->103752 103753 73f93a 103752->103753 103803 74fd9e 103753->103803 103755 73f981 103756 73f991 GetStdHandle 103755->103756 103757 7745ab 103756->103757 103758 73f9dd 103756->103758 103757->103758 103760 7745b4 103757->103760 103759 73f9e5 OleInitialize 103758->103759 103759->103729 103810 796b38 64 API calls Mailbox 103760->103810 103762 7745bb 103811 797207 CreateThread 103762->103811 103764 7745c7 CloseHandle 103764->103759 103812 74ffdc 103765->103812 103768 74ffdc 59 API calls 103769 74ff45 103768->103769 103770 737667 59 API calls 103769->103770 103771 74ff51 103770->103771 103772 737bcc 59 API calls 103771->103772 103773 73f796 103772->103773 103774 750162 6 API calls 103773->103774 103774->103737 103776 737667 59 API calls 103775->103776 103777 745f97 103776->103777 103778 737667 59 API calls 103777->103778 103779 745f9f 103778->103779 103819 745a9d 103779->103819 103782 745a9d 59 API calls 103783 745faf 103782->103783 103784 737667 59 API calls 103783->103784 103785 745fba 103784->103785 103786 750db6 Mailbox 59 API calls 103785->103786 103787 73f908 103786->103787 103788 7460f9 103787->103788 103789 746107 103788->103789 103790 737667 59 API calls 103789->103790 103791 746112 103790->103791 103792 737667 59 API calls 103791->103792 103793 74611d 103792->103793 103794 737667 59 API calls 103793->103794 103795 746128 103794->103795 103796 737667 59 API calls 103795->103796 103797 746133 103796->103797 103798 745a9d 59 API calls 103797->103798 103799 74613e 103798->103799 103800 750db6 Mailbox 59 API calls 103799->103800 103801 746145 RegisterWindowMessageW 103800->103801 103801->103751 103804 78576f 103803->103804 103805 74fdae 103803->103805 103822 799ae7 60 API calls 103804->103822 103807 750db6 Mailbox 59 API calls 103805->103807 103809 74fdb6 103807->103809 103808 78577a 103809->103755 103810->103762 103811->103764 103823 7971ed 65 API calls 103811->103823 103813 737667 59 API calls 103812->103813 103814 74ffe7 103813->103814 103815 737667 59 API calls 103814->103815 103816 74ffef 103815->103816 103817 737667 59 API calls 103816->103817 103818 74ff3b 103817->103818 103818->103768 103820 737667 59 API calls 103819->103820 103821 745aa5 103820->103821 103821->103782 103822->103808 103824 731016 103829 734974 103824->103829 103827 752d40 __cinit 67 API calls 103828 731025 103827->103828 103830 750db6 Mailbox 59 API calls 103829->103830 103831 73497c 103830->103831 103832 73101b 103831->103832 103836 734936 103831->103836 103832->103827 103837 734951 103836->103837 103838 73493f 103836->103838 103840 7349a0 103837->103840 103839 752d40 __cinit 67 API calls 103838->103839 103839->103837 103841 737667 59 API calls 103840->103841 103842 7349b8 GetVersionExW 103841->103842 103843 737bcc 59 API calls 103842->103843 103844 7349fb 103843->103844 103845 737d2c 59 API calls 103844->103845 103850 734a28 103844->103850 103846 734a1c 103845->103846 103847 737726 59 API calls 103846->103847 103847->103850 103848 734a93 GetCurrentProcess IsWow64Process 103849 734aac 103848->103849 103852 734ac2 103849->103852 103853 734b2b GetSystemInfo 103849->103853 103850->103848 103851 76d864 103850->103851 103864 734b37 103852->103864 103854 734af8 103853->103854 103854->103832 103857 734ad4 103860 734b37 2 API calls 103857->103860 103858 734b1f GetSystemInfo 103859 734ae9 103858->103859 103859->103854 103862 734aef FreeLibrary 103859->103862 103861 734adc GetNativeSystemInfo 103860->103861 103861->103859 103862->103854 103865 734ad0 103864->103865 103866 734b40 LoadLibraryA 103864->103866 103865->103857 103865->103858 103866->103865 103867 734b51 GetProcAddress 103866->103867 103867->103865 103868 731055 103873 732649 103868->103873 103871 752d40 __cinit 67 API calls 103872 731064 103871->103872 103874 737667 59 API calls 103873->103874 103875 7326b7 103874->103875 103880 733582 103875->103880 103878 732754 103879 73105a 103878->103879 103883 733416 59 API calls 2 library calls 103878->103883 103879->103871 103884 7335b0 103880->103884 103883->103878 103885 7335a1 103884->103885 103886 7335bd 103884->103886 103885->103878 103886->103885 103887 7335c4 RegOpenKeyExW 103886->103887 103887->103885 103888 7335de RegQueryValueExW 103887->103888 103889 733614 RegCloseKey 103888->103889 103890 7335ff 103888->103890 103889->103885 103890->103889 103891 73e5ab 103894 73d100 103891->103894 103893 73e5b9 103895 73d11d 103894->103895 103923 73d37d 103894->103923 103896 772691 103895->103896 103897 7726e0 103895->103897 103926 73d144 103895->103926 103900 772694 103896->103900 103905 7726af 103896->103905 103938 7aa3e6 341 API calls __cinit 103897->103938 103901 7726a0 103900->103901 103900->103926 103936 7aa9fa 341 API calls 103901->103936 103902 752d40 __cinit 67 API calls 103902->103926 103905->103923 103937 7aaea2 341 API calls 3 library calls 103905->103937 103906 73d434 103930 738a52 68 API calls 103906->103930 103907 7728b5 103907->103907 103908 73d54b 103908->103893 103912 73d443 103912->103893 103913 7727fc 103942 7aa751 89 API calls 103913->103942 103916 7384c0 69 API calls 103916->103926 103923->103908 103943 799e4a 89 API calls 4 library calls 103923->103943 103924 739ea0 341 API calls 103924->103926 103925 738047 59 API calls 103925->103926 103926->103902 103926->103906 103926->103908 103926->103913 103926->103916 103926->103923 103926->103924 103926->103925 103928 738740 68 API calls __cinit 103926->103928 103929 738542 68 API calls 103926->103929 103931 73843a 68 API calls 103926->103931 103932 73cf7c 341 API calls 103926->103932 103933 739dda 59 API calls Mailbox 103926->103933 103934 73cf00 89 API calls 103926->103934 103935 73cd7d 341 API calls 103926->103935 103939 738a52 68 API calls 103926->103939 103940 739d3c 60 API calls Mailbox 103926->103940 103941 78678d 60 API calls 103926->103941 103928->103926 103929->103926 103930->103912 103931->103926 103932->103926 103933->103926 103934->103926 103935->103926 103936->103908 103937->103923 103938->103926 103939->103926 103940->103926 103941->103926 103942->103923 103943->103907 103944 73be19 103945 73c36a 103944->103945 103946 73be22 103944->103946 103955 73ba8b Mailbox 103945->103955 103959 787bdb 59 API calls _memmove 103945->103959 103946->103945 103947 739837 84 API calls 103946->103947 103948 73be4d 103947->103948 103948->103945 103949 73be5d 103948->103949 103951 737a51 59 API calls 103949->103951 103951->103955 103952 771085 103953 738047 59 API calls 103952->103953 103953->103955 103954 73baab 103955->103954 103957 771361 103955->103957 103961 738cd4 59 API calls Mailbox 103955->103961 103957->103954 103960 753d46 59 API calls __wtof_l 103957->103960 103959->103952 103960->103954 103961->103955 103962 76fdfc 103966 73ab30 Mailbox _memmove 103962->103966 103964 78617e Mailbox 59 API calls 103978 73a057 103964->103978 103967 73b525 103966->103967 103966->103978 103987 737de1 59 API calls 103966->103987 103991 739f37 Mailbox 103966->103991 103993 7abc6b 341 API calls 103966->103993 103995 750db6 59 API calls Mailbox 103966->103995 103996 73b2b6 103966->103996 103997 739ea0 341 API calls 103966->103997 103999 77086a 103966->103999 104001 770878 103966->104001 104003 77085c 103966->104003 104004 73b21c 103966->104004 104007 786e8f 59 API calls 103966->104007 104011 7adf23 103966->104011 104014 798715 103966->104014 104018 7ac2e0 103966->104018 104050 797956 103966->104050 104056 78617e 103966->104056 104060 739c90 59 API calls Mailbox 103966->104060 104064 7ac193 85 API calls 2 library calls 103966->104064 104066 799e4a 89 API calls 4 library calls 103967->104066 103970 750db6 59 API calls Mailbox 103970->103991 103971 7709e5 104071 799e4a 89 API calls 4 library calls 103971->104071 103972 770055 104065 799e4a 89 API calls 4 library calls 103972->104065 103974 73b900 60 API calls 103974->103991 103976 770064 103977 73b475 103979 738047 59 API calls 103977->103979 103979->103978 103982 73b47a 103982->103971 103982->103972 103983 737667 59 API calls 103983->103991 103984 738047 59 API calls 103984->103991 103986 786e8f 59 API calls 103986->103991 103987->103966 103988 7709d6 104070 799e4a 89 API calls 4 library calls 103988->104070 103990 752d40 67 API calls __cinit 103990->103991 103991->103970 103991->103972 103991->103974 103991->103977 103991->103978 103991->103982 103991->103983 103991->103984 103991->103986 103991->103988 103991->103990 103992 73a55a 103991->103992 104059 73c8c0 341 API calls 2 library calls 103991->104059 104069 799e4a 89 API calls 4 library calls 103992->104069 103993->103966 103995->103966 104063 73f6a3 341 API calls 103996->104063 103997->103966 104067 739c90 59 API calls Mailbox 103999->104067 104068 799e4a 89 API calls 4 library calls 104001->104068 104003->103964 104003->103978 104061 739d3c 60 API calls Mailbox 104004->104061 104006 73b22d 104062 739d3c 60 API calls Mailbox 104006->104062 104007->103966 104012 7acadd 130 API calls 104011->104012 104013 7adf33 104012->104013 104013->103966 104015 79871e 104014->104015 104017 798723 104014->104017 104072 7977b3 104015->104072 104017->103966 104019 737667 59 API calls 104018->104019 104020 7ac2f4 104019->104020 104021 737667 59 API calls 104020->104021 104022 7ac2fc 104021->104022 104023 737667 59 API calls 104022->104023 104024 7ac304 104023->104024 104025 739837 84 API calls 104024->104025 104046 7ac312 104025->104046 104026 737bcc 59 API calls 104026->104046 104027 7ac4fb 104028 7ac528 Mailbox 104027->104028 104097 739a3c 59 API calls Mailbox 104027->104097 104028->103966 104029 7ac4e2 104034 737cab 59 API calls 104029->104034 104031 737924 59 API calls 104031->104046 104032 7ac4fd 104035 737cab 59 API calls 104032->104035 104033 738047 59 API calls 104033->104046 104036 7ac4ef 104034->104036 104037 7ac50c 104035->104037 104039 737b2e 59 API calls 104036->104039 104040 737b2e 59 API calls 104037->104040 104038 737e4f 59 API calls 104042 7ac3a9 CharUpperBuffW 104038->104042 104039->104027 104040->104027 104041 737e4f 59 API calls 104043 7ac469 CharUpperBuffW 104041->104043 104095 73843a 68 API calls 104042->104095 104096 73c5a7 69 API calls 2 library calls 104043->104096 104046->104026 104046->104027 104046->104028 104046->104029 104046->104031 104046->104032 104046->104033 104046->104038 104046->104041 104047 737cab 59 API calls 104046->104047 104048 739837 84 API calls 104046->104048 104049 737b2e 59 API calls 104046->104049 104047->104046 104048->104046 104049->104046 104051 797962 104050->104051 104052 750db6 Mailbox 59 API calls 104051->104052 104053 797970 104052->104053 104054 737667 59 API calls 104053->104054 104055 79797e 104053->104055 104054->104055 104055->103966 104098 7860c0 104056->104098 104058 78618c 104058->103966 104059->103991 104060->103966 104061->104006 104062->103996 104063->103967 104064->103966 104065->103976 104066->104003 104067->104003 104068->104003 104069->103978 104070->103971 104071->103978 104073 7978ea 104072->104073 104075 7977ca 104072->104075 104073->104017 104074 79780a 104077 750db6 Mailbox 59 API calls 104074->104077 104075->104074 104076 7977e2 104075->104076 104078 797821 104075->104078 104076->104074 104079 7977f2 104076->104079 104092 797800 Mailbox _memmove 104077->104092 104082 750db6 Mailbox 59 API calls 104078->104082 104089 79783e 104078->104089 104085 750db6 Mailbox 59 API calls 104079->104085 104080 797869 104083 750db6 Mailbox 59 API calls 104080->104083 104081 797877 104084 750db6 Mailbox 59 API calls 104081->104084 104082->104089 104083->104092 104086 79787d 104084->104086 104085->104092 104093 79746b 59 API calls Mailbox 104086->104093 104087 750db6 Mailbox 59 API calls 104087->104073 104089->104080 104089->104081 104089->104092 104090 797889 104094 735a15 61 API calls Mailbox 104090->104094 104092->104087 104093->104090 104094->104092 104095->104046 104096->104046 104097->104028 104099 7860e8 104098->104099 104100 7860cb 104098->104100 104099->104058 104100->104099 104102 7860ab 59 API calls Mailbox 104100->104102 104102->104100 104103 15380f8 104104 1535d48 GetPEB 104103->104104 104105 153819b 104104->104105 104117 1537fe8 104105->104117 104118 1537ff1 Sleep 104117->104118 104119 1537fff 104118->104119 104120 73107d 104125 73708b 104120->104125 104122 73108c 104123 752d40 __cinit 67 API calls 104122->104123 104124 731096 104123->104124 104126 73709b __write_nolock 104125->104126 104127 737667 59 API calls 104126->104127 104128 737151 104127->104128 104129 734706 61 API calls 104128->104129 104130 73715a 104129->104130 104156 75050b 104130->104156 104133 737cab 59 API calls 104134 737173 104133->104134 104135 733f74 59 API calls 104134->104135 104136 737182 104135->104136 104137 737667 59 API calls 104136->104137 104138 73718b 104137->104138 104139 737d8c 59 API calls 104138->104139 104140 737194 RegOpenKeyExW 104139->104140 104141 76e8b1 RegQueryValueExW 104140->104141 104145 7371b6 Mailbox 104140->104145 104142 76e943 RegCloseKey 104141->104142 104143 76e8ce 104141->104143 104142->104145 104155 76e955 _wcscat Mailbox __NMSG_WRITE 104142->104155 104144 750db6 Mailbox 59 API calls 104143->104144 104146 76e8e7 104144->104146 104145->104122 104147 73522e 59 API calls 104146->104147 104148 76e8f2 RegQueryValueExW 104147->104148 104150 76e90f 104148->104150 104152 76e929 104148->104152 104149 7379f2 59 API calls 104149->104155 104151 737bcc 59 API calls 104150->104151 104151->104152 104152->104142 104153 737de1 59 API calls 104153->104155 104154 733f74 59 API calls 104154->104155 104155->104145 104155->104149 104155->104153 104155->104154 104157 761940 __write_nolock 104156->104157 104158 750518 GetFullPathNameW 104157->104158 104159 75053a 104158->104159 104160 737bcc 59 API calls 104159->104160 104161 737165 104160->104161 104161->104133

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00733B68
                                          • IsDebuggerPresent.KERNEL32 ref: 00733B7A
                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,007F52F8,007F52E0,?,?), ref: 00733BEB
                                            • Part of subcall function 00737BCC: _memmove.LIBCMT ref: 00737C06
                                            • Part of subcall function 0074092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00733C14,007F52F8,?,?,?), ref: 0074096E
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00733C6F
                                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,007E7770,00000010), ref: 0076D281
                                          • SetCurrentDirectoryW.KERNEL32(?,007F52F8,?,?,?), ref: 0076D2B9
                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,007E4260,007F52F8,?,?,?), ref: 0076D33F
                                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 0076D346
                                            • Part of subcall function 00733A46: GetSysColorBrush.USER32(0000000F), ref: 00733A50
                                            • Part of subcall function 00733A46: LoadCursorW.USER32(00000000,00007F00), ref: 00733A5F
                                            • Part of subcall function 00733A46: LoadIconW.USER32(00000063), ref: 00733A76
                                            • Part of subcall function 00733A46: LoadIconW.USER32(000000A4), ref: 00733A88
                                            • Part of subcall function 00733A46: LoadIconW.USER32(000000A2), ref: 00733A9A
                                            • Part of subcall function 00733A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00733AC0
                                            • Part of subcall function 00733A46: RegisterClassExW.USER32(?), ref: 00733B16
                                            • Part of subcall function 007339D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00733A03
                                            • Part of subcall function 007339D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00733A24
                                            • Part of subcall function 007339D5: ShowWindow.USER32(00000000,?,?), ref: 00733A38
                                            • Part of subcall function 007339D5: ShowWindow.USER32(00000000,?,?), ref: 00733A41
                                            • Part of subcall function 0073434A: _memset.LIBCMT ref: 00734370
                                            • Part of subcall function 0073434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00734415
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                          • String ID: This is a third-party compiled AutoIt script.$runas$%|
                                          • API String ID: 529118366-4059233762
                                          • Opcode ID: 84780bc5579f330327e21ca1d68ad4816f3dfdfc6947099b0442dce79dd8e024
                                          • Instruction ID: 4ee4fcf1469e152b6b83780822831f1cc4c97776ebbbd4c4869449543cded38c
                                          • Opcode Fuzzy Hash: 84780bc5579f330327e21ca1d68ad4816f3dfdfc6947099b0442dce79dd8e024
                                          • Instruction Fuzzy Hash: D051D6B1E08148EEEB25EBB4DC09EFD7B78BF04700F008165F651A62A3DA7C5645CB25

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 998 7349a0-734a00 call 737667 GetVersionExW call 737bcc 1003 734a06 998->1003 1004 734b0b-734b0d 998->1004 1006 734a09-734a0e 1003->1006 1005 76d767-76d773 1004->1005 1007 76d774-76d778 1005->1007 1008 734b12-734b13 1006->1008 1009 734a14 1006->1009 1011 76d77a 1007->1011 1012 76d77b-76d787 1007->1012 1010 734a15-734a4c call 737d2c call 737726 1008->1010 1009->1010 1020 734a52-734a53 1010->1020 1021 76d864-76d867 1010->1021 1011->1012 1012->1007 1014 76d789-76d78e 1012->1014 1014->1006 1016 76d794-76d79b 1014->1016 1016->1005 1018 76d79d 1016->1018 1022 76d7a2-76d7a5 1018->1022 1020->1022 1023 734a59-734a64 1020->1023 1024 76d880-76d884 1021->1024 1025 76d869 1021->1025 1026 734a93-734aaa GetCurrentProcess IsWow64Process 1022->1026 1027 76d7ab-76d7c9 1022->1027 1028 734a6a-734a6c 1023->1028 1029 76d7ea-76d7f0 1023->1029 1032 76d886-76d88f 1024->1032 1033 76d86f-76d878 1024->1033 1030 76d86c 1025->1030 1034 734aaf-734ac0 1026->1034 1035 734aac 1026->1035 1027->1026 1031 76d7cf-76d7d5 1027->1031 1036 734a72-734a75 1028->1036 1037 76d805-76d811 1028->1037 1040 76d7f2-76d7f5 1029->1040 1041 76d7fa-76d800 1029->1041 1030->1033 1038 76d7d7-76d7da 1031->1038 1039 76d7df-76d7e5 1031->1039 1032->1030 1042 76d891-76d894 1032->1042 1033->1024 1043 734ac2-734ad2 call 734b37 1034->1043 1044 734b2b-734b35 GetSystemInfo 1034->1044 1035->1034 1045 76d831-76d834 1036->1045 1046 734a7b-734a8a 1036->1046 1048 76d813-76d816 1037->1048 1049 76d81b-76d821 1037->1049 1038->1026 1039->1026 1040->1026 1041->1026 1042->1033 1055 734ad4-734ae1 call 734b37 1043->1055 1056 734b1f-734b29 GetSystemInfo 1043->1056 1047 734af8-734b08 1044->1047 1045->1026 1054 76d83a-76d84f 1045->1054 1051 76d826-76d82c 1046->1051 1052 734a90 1046->1052 1048->1026 1049->1026 1051->1026 1052->1026 1057 76d851-76d854 1054->1057 1058 76d859-76d85f 1054->1058 1063 734ae3-734ae7 GetNativeSystemInfo 1055->1063 1064 734b18-734b1d 1055->1064 1059 734ae9-734aed 1056->1059 1057->1026 1058->1026 1059->1047 1062 734aef-734af2 FreeLibrary 1059->1062 1062->1047 1063->1059 1064->1063
                                          APIs
                                          • GetVersionExW.KERNEL32(?), ref: 007349CD
                                            • Part of subcall function 00737BCC: _memmove.LIBCMT ref: 00737C06
                                          • GetCurrentProcess.KERNEL32(?,007BFAEC,00000000,00000000,?), ref: 00734A9A
                                          • IsWow64Process.KERNEL32(00000000), ref: 00734AA1
                                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00734AE7
                                          • FreeLibrary.KERNEL32(00000000), ref: 00734AF2
                                          • GetSystemInfo.KERNEL32(00000000), ref: 00734B23
                                          • GetSystemInfo.KERNEL32(00000000), ref: 00734B2F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                          • String ID:
                                          • API String ID: 1986165174-0
                                          • Opcode ID: 1a369436e848a6ccf17ab6d8f710f81d526d5367b7dc2fcc5897b0f0152dc619
                                          • Instruction ID: daa41986e9e997ff34f2491e37883bc0259a331607a4edfb3fa5a0c4812e31e0
                                          • Opcode Fuzzy Hash: 1a369436e848a6ccf17ab6d8f710f81d526d5367b7dc2fcc5897b0f0152dc619
                                          • Instruction Fuzzy Hash: 6E91D5319897C5DED735CB7888545AAFFF5AF2A300F448A6DD0C793A02D228B908C75E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1065 734e89-734ea1 CreateStreamOnHGlobal 1066 734ea3-734eba FindResourceExW 1065->1066 1067 734ec1-734ec6 1065->1067 1068 734ec0 1066->1068 1069 76d933-76d942 LoadResource 1066->1069 1068->1067 1069->1068 1070 76d948-76d956 SizeofResource 1069->1070 1070->1068 1071 76d95c-76d967 LockResource 1070->1071 1071->1068 1072 76d96d-76d98b 1071->1072 1072->1068
                                          APIs
                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00734D8E,?,?,00000000,00000000), ref: 00734E99
                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00734D8E,?,?,00000000,00000000), ref: 00734EB0
                                          • LoadResource.KERNEL32(?,00000000,?,?,00734D8E,?,?,00000000,00000000,?,?,?,?,?,?,00734E2F), ref: 0076D937
                                          • SizeofResource.KERNEL32(?,00000000,?,?,00734D8E,?,?,00000000,00000000,?,?,?,?,?,?,00734E2F), ref: 0076D94C
                                          • LockResource.KERNEL32(00734D8E,?,?,00734D8E,?,?,00000000,00000000,?,?,?,?,?,?,00734E2F,00000000), ref: 0076D95F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                          • String ID: SCRIPT
                                          • API String ID: 3051347437-3967369404
                                          • Opcode ID: 76f2c0ba266d409222d2fde68e72076d2d3bd64928ddc47726a45e6bc5ddf446
                                          • Instruction ID: e6cd226906c83dd49a3b76b505fe0eb70ff76f8c75abe106e960c9d183459876
                                          • Opcode Fuzzy Hash: 76f2c0ba266d409222d2fde68e72076d2d3bd64928ddc47726a45e6bc5ddf446
                                          • Instruction Fuzzy Hash: 04115A75240700BFE7258B65EC48F6B7BBAFBC5B11F208268F446D6250DB65EC008A60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: BuffCharUpper
                                          • String ID: %|
                                          • API String ID: 3964851224-1433500012
                                          • Opcode ID: b95b9f29338596e6ddf1316f50ef309862d7c81a3ceffb6a5ee535d5697ee3ff
                                          • Instruction ID: b5a3855b11b49a50fb4dbef646338667867b080ccd3e60c4d60a36e455faf11a
                                          • Opcode Fuzzy Hash: b95b9f29338596e6ddf1316f50ef309862d7c81a3ceffb6a5ee535d5697ee3ff
                                          • Instruction Fuzzy Hash: D6928B70608341DFDB20DF24C484B2AB7E1BF85344F15892DE99A9B362D779EC45CB92
                                          APIs
                                          • GetFileAttributesW.KERNELBASE(?,0076E398), ref: 0079446A
                                          • FindFirstFileW.KERNELBASE(?,?), ref: 0079447B
                                          • FindClose.KERNEL32(00000000), ref: 0079448B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FileFind$AttributesCloseFirst
                                          • String ID:
                                          • API String ID: 48322524-0
                                          • Opcode ID: fc9edaf2b44ec5e4ab54139f53209fb8a7a34054a3d3e8c450b5dc3401948bda
                                          • Instruction ID: 2864c79e184326cf04cce318691af1e78c2b1528eba020070064c3574d34baa5
                                          • Opcode Fuzzy Hash: fc9edaf2b44ec5e4ab54139f53209fb8a7a34054a3d3e8c450b5dc3401948bda
                                          • Instruction Fuzzy Hash: 58E0D8324105406746146B38FC0DDED779CAE05735F104715F835C21E0E77C59009599
                                          Strings
                                          • Variable must be of type 'Object'., xrefs: 00773E62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Variable must be of type 'Object'.
                                          • API String ID: 0-109567571
                                          • Opcode ID: 1d34956795ed5167a1491f3d352dec15b515401e685df036a19f447e5dfed000
                                          • Instruction ID: 61ce73050e7a82a97ca77de7868ebd425e34ea814586d545800a1bac6a4fb96c
                                          • Opcode Fuzzy Hash: 1d34956795ed5167a1491f3d352dec15b515401e685df036a19f447e5dfed000
                                          • Instruction Fuzzy Hash: 85A27D75A00209CFEB24CF58C484ABEB7B1FF58310F248469E945AB392D779ED42CB91
                                          APIs
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00740A5B
                                          • timeGetTime.WINMM ref: 00740D16
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00740E53
                                          • Sleep.KERNEL32(0000000A), ref: 00740E61
                                          • LockWindowUpdate.USER32(00000000,?,?), ref: 00740EFA
                                          • DestroyWindow.USER32 ref: 00740F06
                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00740F20
                                          • Sleep.KERNEL32(0000000A,?,?), ref: 00774E83
                                          • TranslateMessage.USER32(?), ref: 00775C60
                                          • DispatchMessageW.USER32(?), ref: 00775C6E
                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00775C82
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                          • API String ID: 4212290369-3242690629
                                          • Opcode ID: 5da7e9e482c888109cd5e90bd44a5e26ce27c570d7220a4dd319aeff6ae165e6
                                          • Instruction ID: f360fb86dcf8e6fbe11a38e614185a65bd879b16ca91cb6cfcb9f6c30f65f8a3
                                          • Opcode Fuzzy Hash: 5da7e9e482c888109cd5e90bd44a5e26ce27c570d7220a4dd319aeff6ae165e6
                                          • Instruction Fuzzy Hash: F3B2C370608741DFDB24DF24C888BAAB7E4BF84344F14891DE699972A1D7BDE844CB92

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00798F5F: __time64.LIBCMT ref: 00798F69
                                            • Part of subcall function 00734EE5: _fseek.LIBCMT ref: 00734EFD
                                          • __wsplitpath.LIBCMT ref: 00799234
                                            • Part of subcall function 007540FB: __wsplitpath_helper.LIBCMT ref: 0075413B
                                          • _wcscpy.LIBCMT ref: 00799247
                                          • _wcscat.LIBCMT ref: 0079925A
                                          • __wsplitpath.LIBCMT ref: 0079927F
                                          • _wcscat.LIBCMT ref: 00799295
                                          • _wcscat.LIBCMT ref: 007992A8
                                            • Part of subcall function 00798FA5: _memmove.LIBCMT ref: 00798FDE
                                            • Part of subcall function 00798FA5: _memmove.LIBCMT ref: 00798FED
                                          • _wcscmp.LIBCMT ref: 007991EF
                                            • Part of subcall function 00799734: _wcscmp.LIBCMT ref: 00799824
                                            • Part of subcall function 00799734: _wcscmp.LIBCMT ref: 00799837
                                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00799452
                                          • _wcsncpy.LIBCMT ref: 007994C5
                                          • DeleteFileW.KERNEL32(?,?), ref: 007994FB
                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00799511
                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00799522
                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00799534
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                          • String ID:
                                          • API String ID: 1500180987-0
                                          • Opcode ID: 5c375b77bc38907ee236a8156609a9d330a74a440082aa93b4951e5b88c79f29
                                          • Instruction ID: 0c9418dd9c8d4391f2296c10e146bb2966ed02ce8f040d97e43839c9d6eadc96
                                          • Opcode Fuzzy Hash: 5c375b77bc38907ee236a8156609a9d330a74a440082aa93b4951e5b88c79f29
                                          • Instruction Fuzzy Hash: 4DC15DB1D00219ABEF21DF94DC89EDEB7BDEF45300F0040AAF609E6151EB749A848F65

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 00733074
                                          • RegisterClassExW.USER32(00000030), ref: 0073309E
                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007330AF
                                          • InitCommonControlsEx.COMCTL32(?), ref: 007330CC
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007330DC
                                          • LoadIconW.USER32(000000A9), ref: 007330F2
                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00733101
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                          • API String ID: 2914291525-1005189915
                                          • Opcode ID: 3a49fdd8c91009eeb27a3baf028b96266578e303df6985a1a20dff3b6d634459
                                          • Instruction ID: 2f8480eacb6208317be211d33dfc3d1a1cdf015783a9a179487e3537f77a7bef
                                          • Opcode Fuzzy Hash: 3a49fdd8c91009eeb27a3baf028b96266578e303df6985a1a20dff3b6d634459
                                          • Instruction Fuzzy Hash: 953129B1901308AFDB10DFA4DC89BEDBBF4FB09710F14826AE650E62A1D7B94541CF95

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 00733074
                                          • RegisterClassExW.USER32(00000030), ref: 0073309E
                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007330AF
                                          • InitCommonControlsEx.COMCTL32(?), ref: 007330CC
                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007330DC
                                          • LoadIconW.USER32(000000A9), ref: 007330F2
                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00733101
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                          • API String ID: 2914291525-1005189915
                                          • Opcode ID: 2acf3671d7f7d23660ab7ba297e48101cbfa73437cbc763b3dcf686aac4155f6
                                          • Instruction ID: d69d749a4a4edd458731d491deb017ac037f5e4aa45c50f6bdea9b7b13775d51
                                          • Opcode Fuzzy Hash: 2acf3671d7f7d23660ab7ba297e48101cbfa73437cbc763b3dcf686aac4155f6
                                          • Instruction Fuzzy Hash: D021C9B1911618AFDB00DF94EC49BDDBBF4FB08B50F10822AF610A62A0D7B94544CF99

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00734706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,007F52F8,?,007337AE,?), ref: 00734724
                                            • Part of subcall function 0075050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00737165), ref: 0075052D
                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 007371A8
                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0076E8C8
                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0076E909
                                          • RegCloseKey.ADVAPI32(?), ref: 0076E947
                                          • _wcscat.LIBCMT ref: 0076E9A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                          • API String ID: 2673923337-2727554177
                                          • Opcode ID: f56760e28046642796120812055a3c81e8a4eb5d00e9c7ada510d8882cd25573
                                          • Instruction ID: 5745e9cf9f6d63dd0b5f267f6fc5abdb9953587ab6c9209bd1f76a04b6ea55f6
                                          • Opcode Fuzzy Hash: f56760e28046642796120812055a3c81e8a4eb5d00e9c7ada510d8882cd25573
                                          • Instruction Fuzzy Hash: 8971AFB1108301DED314EF29EC459ABBBF8FF94310F40852EF445872A1EB79A949CB66

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 762 733633-733681 764 733683-733686 762->764 765 7336e1-7336e3 762->765 767 7336e7 764->767 768 733688-73368f 764->768 765->764 766 7336e5 765->766 769 7336ca-7336d2 DefWindowProcW 766->769 770 76d0cc-76d0fa call 741070 call 741093 767->770 771 7336ed-7336f0 767->771 772 733695-73369a 768->772 773 73374b-733753 PostQuitMessage 768->773 775 7336d8-7336de 769->775 805 76d0ff-76d106 770->805 776 7336f2-7336f3 771->776 777 733715-73373c SetTimer RegisterWindowMessageW 771->777 779 76d154-76d168 call 792527 772->779 780 7336a0-7336a2 772->780 774 733711-733713 773->774 774->775 785 76d06f-76d072 776->785 786 7336f9-73370c KillTimer call 73443a call 733114 776->786 777->774 781 73373e-733749 CreatePopupMenu 777->781 779->774 799 76d16e 779->799 782 733755-73375f call 7344a0 780->782 783 7336a8-7336ad 780->783 781->774 800 733764 782->800 789 7336b3-7336b8 783->789 790 76d139-76d140 783->790 793 76d074-76d076 785->793 794 76d0a8-76d0c7 MoveWindow 785->794 786->774 797 76d124-76d134 call 792d36 789->797 798 7336be-7336c4 789->798 790->769 804 76d146-76d14f call 787c36 790->804 801 76d097-76d0a3 SetFocus 793->801 802 76d078-76d07b 793->802 794->774 797->774 798->769 798->805 799->769 800->774 801->774 802->798 806 76d081-76d092 call 741070 802->806 804->769 805->769 810 76d10c-76d11f call 73443a call 73434a 805->810 806->774 810->769
                                          APIs
                                          • DefWindowProcW.USER32(?,?,?,?), ref: 007336D2
                                          • KillTimer.USER32(?,00000001), ref: 007336FC
                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0073371F
                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0073372A
                                          • CreatePopupMenu.USER32 ref: 0073373E
                                          • PostQuitMessage.USER32(00000000), ref: 0073374D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                          • String ID: TaskbarCreated$%|
                                          • API String ID: 129472671-294584353
                                          • Opcode ID: 788e1df648c14f21ff9dbe25d28cc4368202920fc293f1f5f8d896ca95f86883
                                          • Instruction ID: 951e36c618eb766b8a16f3bea5b65d762c107707ae8cfe0ddb92f7b6cd8ffd02
                                          • Opcode Fuzzy Hash: 788e1df648c14f21ff9dbe25d28cc4368202920fc293f1f5f8d896ca95f86883
                                          • Instruction Fuzzy Hash: FE4125B2600509FFFB346F68DC4EB793B55EB00740F504235FA02962A3DA6DAE40D769

                                          Control-flow Graph

                                          APIs
                                          • GetSysColorBrush.USER32(0000000F), ref: 00733A50
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00733A5F
                                          • LoadIconW.USER32(00000063), ref: 00733A76
                                          • LoadIconW.USER32(000000A4), ref: 00733A88
                                          • LoadIconW.USER32(000000A2), ref: 00733A9A
                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00733AC0
                                          • RegisterClassExW.USER32(?), ref: 00733B16
                                            • Part of subcall function 00733041: GetSysColorBrush.USER32(0000000F), ref: 00733074
                                            • Part of subcall function 00733041: RegisterClassExW.USER32(00000030), ref: 0073309E
                                            • Part of subcall function 00733041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007330AF
                                            • Part of subcall function 00733041: InitCommonControlsEx.COMCTL32(?), ref: 007330CC
                                            • Part of subcall function 00733041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007330DC
                                            • Part of subcall function 00733041: LoadIconW.USER32(000000A9), ref: 007330F2
                                            • Part of subcall function 00733041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00733101
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                          • String ID: #$0$AutoIt v3
                                          • API String ID: 423443420-4155596026
                                          • Opcode ID: eefa84feec9aeea464c5241ca8b57bbe48d8c8ebdd5b14d0e970c5550a0bcf38
                                          • Instruction ID: cee7380fe8bbf73c6ae710d9c7968228c07b48ccc2b04a8bb30bc6f5b911908e
                                          • Opcode Fuzzy Hash: eefa84feec9aeea464c5241ca8b57bbe48d8c8ebdd5b14d0e970c5550a0bcf38
                                          • Instruction Fuzzy Hash: 83214DB1D10704AFEB10DFA4EC09BAD7FB1FB08721F108269F604A62A1D7B95640CF88

                                          Control-flow Graph

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                          • API String ID: 1825951767-3513169116
                                          • Opcode ID: 98b30ad1d65104e4b828d52cddc1d85634453d07e3f91d85b70f8d1c958a8a38
                                          • Instruction ID: 0237a18ba30cc735b89125b77b3bd694034af072599dc992612d066a9d6b5d4d
                                          • Opcode Fuzzy Hash: 98b30ad1d65104e4b828d52cddc1d85634453d07e3f91d85b70f8d1c958a8a38
                                          • Instruction Fuzzy Hash: B3A18EB291021DDAEB14EBA0DC99AEEB778BF15300F440129F516B7192DF7C6A08CB61

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 944 1538318-15383c6 call 1535d48 947 15383cd-15383f3 call 1539228 CreateFileW 944->947 950 15383f5 947->950 951 15383fa-153840a 947->951 952 1538545-1538549 950->952 956 1538411-153842b VirtualAlloc 951->956 957 153840c 951->957 954 153858b-153858e 952->954 955 153854b-153854f 952->955 958 1538591-1538598 954->958 959 1538551-1538554 955->959 960 153855b-153855f 955->960 963 1538432-1538449 ReadFile 956->963 964 153842d 956->964 957->952 965 153859a-15385a5 958->965 966 15385ed-1538602 958->966 959->960 961 1538561-153856b 960->961 962 153856f-1538573 960->962 961->962 969 1538583 962->969 970 1538575-153857f 962->970 971 1538450-1538490 VirtualAlloc 963->971 972 153844b 963->972 964->952 973 15385a7 965->973 974 15385a9-15385b5 965->974 967 1538612-153861a 966->967 968 1538604-153860f VirtualFree 966->968 968->967 969->954 970->969 975 1538492 971->975 976 1538497-15384b2 call 1539478 971->976 972->952 973->966 977 15385b7-15385c7 974->977 978 15385c9-15385d5 974->978 975->952 984 15384bd-15384c7 976->984 982 15385eb 977->982 979 15385e2-15385e8 978->979 980 15385d7-15385e0 978->980 979->982 980->982 982->958 985 15384fa-153850e call 1539288 984->985 986 15384c9-15384f8 call 1539478 984->986 992 1538512-1538516 985->992 993 1538510 985->993 986->984 994 1538522-1538526 992->994 995 1538518-153851c CloseHandle 992->995 993->952 996 1538536-153853f 994->996 997 1538528-1538533 VirtualFree 994->997 995->994 996->947 996->952 997->996
                                          APIs
                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 015383E9
                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0153860F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1334462787.0000000001535000.00000040.00000020.00020000.00000000.sdmp, Offset: 01535000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1535000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CreateFileFreeVirtual
                                          • String ID:
                                          • API String ID: 204039940-0
                                          • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                          • Instruction ID: dd6e0f1e765681bdabfac4169b9ae2a569adea84ce8ef1ef0d45b0699ecf08ac
                                          • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                          • Instruction Fuzzy Hash: A5A10974E00209EBDB18CFA4C894BEEBBB5BF88304F208659E515BB285D7759A41CF54

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1075 7339d5-733a45 CreateWindowExW * 2 ShowWindow * 2
                                          APIs
                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00733A03
                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00733A24
                                          • ShowWindow.USER32(00000000,?,?), ref: 00733A38
                                          • ShowWindow.USER32(00000000,?,?), ref: 00733A41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$CreateShow
                                          • String ID: AutoIt v3$edit
                                          • API String ID: 1584632944-3779509399
                                          • Opcode ID: 2e628192487c3c7d6f6ed3fcfc30e1711d6b5f9e2c13c302230a6e8c5b7c2a91
                                          • Instruction ID: 909e2f28a68e0054fcf7565d0fa8ca7cfba62df7b2a89e1879bf737220f7417e
                                          • Opcode Fuzzy Hash: 2e628192487c3c7d6f6ed3fcfc30e1711d6b5f9e2c13c302230a6e8c5b7c2a91
                                          • Instruction Fuzzy Hash: 98F030B05006907EEA305717AC0CF772F7DE7C7F60B018229FA00A2170C5691800CA78

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1076 15380f8-1538211 call 1535d48 call 1537fe8 CreateFileW 1083 1538213 1076->1083 1084 1538218-1538228 1076->1084 1085 15382c8-15382cd 1083->1085 1087 153822a 1084->1087 1088 153822f-1538249 VirtualAlloc 1084->1088 1087->1085 1089 153824b 1088->1089 1090 153824d-1538264 ReadFile 1088->1090 1089->1085 1091 1538266 1090->1091 1092 1538268-15382a2 call 1538028 call 1536fe8 1090->1092 1091->1085 1097 15382a4-15382b9 call 1538078 1092->1097 1098 15382be-15382c6 ExitProcess 1092->1098 1097->1098 1098->1085
                                          APIs
                                            • Part of subcall function 01537FE8: Sleep.KERNELBASE(000001F4), ref: 01537FF9
                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01538207
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1334462787.0000000001535000.00000040.00000020.00020000.00000000.sdmp, Offset: 01535000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1535000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CreateFileSleep
                                          • String ID: XGFFQLD3867FJSVU
                                          • API String ID: 2694422964-1738369515
                                          • Opcode ID: d5396248304ae33c74726d1bff1476c603060684d06ebcf387fd72ff3a2c52cb
                                          • Instruction ID: e62119145ac5ce19204eb99ae5d9b6a147a065e31c6351a04190ce532d2c6052
                                          • Opcode Fuzzy Hash: d5396248304ae33c74726d1bff1476c603060684d06ebcf387fd72ff3a2c52cb
                                          • Instruction Fuzzy Hash: A4518370D04249EBEF15DBA4C848BEEBBB5AF55300F004699F608BB2C0D7794B45CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1100 73407c-734092 1101 734098-7340ad call 737a16 1100->1101 1102 73416f-734173 1100->1102 1105 7340b3-7340d3 call 737bcc 1101->1105 1106 76d3c8-76d3d7 LoadStringW 1101->1106 1109 76d3e2-76d3fa call 737b2e call 736fe3 1105->1109 1110 7340d9-7340dd 1105->1110 1106->1109 1119 7340ed-73416a call 752de0 call 73454e call 752dbc Shell_NotifyIconW call 735904 1109->1119 1122 76d400-76d41e call 737cab call 736fe3 call 737cab 1109->1122 1112 7340e3-7340e8 call 737b2e 1110->1112 1113 734174-73417d call 738047 1110->1113 1112->1119 1113->1119 1119->1102 1122->1119
                                          APIs
                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0076D3D7
                                            • Part of subcall function 00737BCC: _memmove.LIBCMT ref: 00737C06
                                          • _memset.LIBCMT ref: 007340FC
                                          • _wcscpy.LIBCMT ref: 00734150
                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00734160
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                          • String ID: Line:
                                          • API String ID: 3942752672-1585850449
                                          • Opcode ID: 3e416425d47a86f6cbb717cf61dec1640650c05a87e558f7222374ae6bb19c67
                                          • Instruction ID: 86561360f8da8476b253cf3722da0ffb51a035ab2566892004c1dc54ac2c3516
                                          • Opcode Fuzzy Hash: 3e416425d47a86f6cbb717cf61dec1640650c05a87e558f7222374ae6bb19c67
                                          • Instruction Fuzzy Hash: 1631C8B1108705EBE338EB50DC49FEB77D8AF44300F10461AF68592192DB7CA648CB96

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1487 75541d-755436 1488 755453 1487->1488 1489 755438-75543d 1487->1489 1491 755455-75545b 1488->1491 1489->1488 1490 75543f-755441 1489->1490 1492 755443-755448 call 758b28 1490->1492 1493 75545c-755461 1490->1493 1504 75544e call 758db6 1492->1504 1495 755463-75546d 1493->1495 1496 75546f-755473 1493->1496 1495->1496 1498 755493-7554a2 1495->1498 1499 755475-755480 call 752de0 1496->1499 1500 755483-755485 1496->1500 1502 7554a4-7554a7 1498->1502 1503 7554a9 1498->1503 1499->1500 1500->1492 1501 755487-755491 1500->1501 1501->1492 1501->1498 1506 7554ae-7554b3 1502->1506 1503->1506 1504->1488 1509 75559c-75559f 1506->1509 1510 7554b9-7554c0 1506->1510 1509->1491 1511 755501-755503 1510->1511 1512 7554c2-7554ca 1510->1512 1514 755505-755507 1511->1514 1515 75556d-75556e call 760ba7 1511->1515 1512->1511 1513 7554cc 1512->1513 1519 7554d2-7554d4 1513->1519 1520 7555ca 1513->1520 1516 755509-755511 1514->1516 1517 75552b-755536 1514->1517 1523 755573-755577 1515->1523 1521 755521-755525 1516->1521 1522 755513-75551f 1516->1522 1524 755538 1517->1524 1525 75553a-75553d 1517->1525 1526 7554d6-7554d8 1519->1526 1527 7554db-7554e0 1519->1527 1528 7555ce-7555d7 1520->1528 1529 755527-755529 1521->1529 1522->1529 1523->1528 1530 755579-75557e 1523->1530 1524->1525 1531 7555a4-7555a8 1525->1531 1532 75553f-75554b call 7546e6 call 760e5b 1525->1532 1526->1527 1527->1531 1533 7554e6-7554ff call 760cc8 1527->1533 1528->1491 1529->1525 1530->1531 1534 755580-755591 1530->1534 1535 7555ba-7555c5 call 758b28 1531->1535 1536 7555aa-7555b7 call 752de0 1531->1536 1548 755550-755555 1532->1548 1547 755562-75556b 1533->1547 1539 755594-755596 1534->1539 1535->1504 1536->1535 1539->1509 1539->1510 1547->1539 1549 7555dc-7555e0 1548->1549 1550 75555b-75555e 1548->1550 1549->1528 1550->1520 1551 755560 1550->1551 1551->1547
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                          • String ID:
                                          • API String ID: 1559183368-0
                                          • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                          • Instruction ID: a318876de7c011548fbc557cde9c504a427d2fe6e47c41b6394e910e13c789f9
                                          • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                          • Instruction Fuzzy Hash: E351D670A00B45DBCB248F69D8545EE77B7AF40323F248729FC25962D0E7F99D688B40
                                          APIs
                                            • Part of subcall function 00734DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007F52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00734E0F
                                          • _free.LIBCMT ref: 0076E263
                                          • _free.LIBCMT ref: 0076E2AA
                                            • Part of subcall function 00736A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00736BAD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _free$CurrentDirectoryLibraryLoad
                                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                          • API String ID: 2861923089-1757145024
                                          • Opcode ID: 3adf0d571fd691587c5e9a20dd4492267a1a41442311f0353fbb30b75f3ebb76
                                          • Instruction ID: dc29025f084de95a7d4622a23b90eed383eb482b0faf35840415b559aed94233
                                          • Opcode Fuzzy Hash: 3adf0d571fd691587c5e9a20dd4492267a1a41442311f0353fbb30b75f3ebb76
                                          • Instruction Fuzzy Hash: E5919275A10219EFDF08EFA4CC959EDB7B4FF05310F144429F816AB2A2DB79A905CB60
                                          APIs
                                            • Part of subcall function 00750162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00750193
                                            • Part of subcall function 00750162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0075019B
                                            • Part of subcall function 00750162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 007501A6
                                            • Part of subcall function 00750162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 007501B1
                                            • Part of subcall function 00750162: MapVirtualKeyW.USER32(00000011,00000000), ref: 007501B9
                                            • Part of subcall function 00750162: MapVirtualKeyW.USER32(00000012,00000000), ref: 007501C1
                                            • Part of subcall function 007460F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0073F930), ref: 00746154
                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0073F9CD
                                          • OleInitialize.OLE32(00000000), ref: 0073FA4A
                                          • CloseHandle.KERNEL32(00000000), ref: 007745C8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                          • String ID: %|
                                          • API String ID: 1986988660-1433500012
                                          • Opcode ID: 3f17bc0a400b932dde0519debd0f06916e1ef3d8b8142d2ac7b23ac2f05886f8
                                          • Instruction ID: 0fbe969670b9a3ffc436611f8ead095fcc8b0675795e86e056bcc066368dcdd3
                                          • Opcode Fuzzy Hash: 3f17bc0a400b932dde0519debd0f06916e1ef3d8b8142d2ac7b23ac2f05886f8
                                          • Instruction Fuzzy Hash: BA819BB0915E84CFC384EF29E845A397BE5AB4830A791C13AD619CB362E77C4484CF29
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,007335A1,SwapMouseButtons,00000004,?), ref: 007335D4
                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,007335A1,SwapMouseButtons,00000004,?,?,?,?,00732754), ref: 007335F5
                                          • RegCloseKey.KERNELBASE(00000000,?,?,007335A1,SwapMouseButtons,00000004,?,?,?,?,00732754), ref: 00733617
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CloseOpenQueryValue
                                          • String ID: Control Panel\Mouse
                                          • API String ID: 3677997916-824357125
                                          • Opcode ID: 05e6251a586c14b09c5f235020eafd7f466abfb63131be83b5b47f3a795d92d3
                                          • Instruction ID: a3985f676528810f9861c7a59d4efa6509986989c0c33b9b7bb9745496ab2acf
                                          • Opcode Fuzzy Hash: 05e6251a586c14b09c5f235020eafd7f466abfb63131be83b5b47f3a795d92d3
                                          • Instruction Fuzzy Hash: 7C115771A10208FFEB209F64DC81EAEBBBCEF04740F008669F805D7221E2759F409BA4
                                          APIs
                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 01537815
                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01537839
                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0153785B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1334462787.0000000001535000.00000040.00000020.00020000.00000000.sdmp, Offset: 01535000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1535000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                          • String ID:
                                          • API String ID: 2438371351-0
                                          • Opcode ID: a1064bca5dd4e59baeb4dd15c17425526c3ac906ac097e7eb484fd7342f8cad6
                                          • Instruction ID: 0d6318cf84aca90e07ce78036d088cfc26e4d3d54ca3c9f15f82d20cc0a4ec5e
                                          • Opcode Fuzzy Hash: a1064bca5dd4e59baeb4dd15c17425526c3ac906ac097e7eb484fd7342f8cad6
                                          • Instruction Fuzzy Hash: 2462FA70E142589BEB24CFA4C850BDEB772FF98300F1095A9D20DEB290E7759E81CB59
                                          APIs
                                            • Part of subcall function 00734EE5: _fseek.LIBCMT ref: 00734EFD
                                            • Part of subcall function 00799734: _wcscmp.LIBCMT ref: 00799824
                                            • Part of subcall function 00799734: _wcscmp.LIBCMT ref: 00799837
                                          • _free.LIBCMT ref: 007996A2
                                          • _free.LIBCMT ref: 007996A9
                                          • _free.LIBCMT ref: 00799714
                                            • Part of subcall function 00752D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00759A24), ref: 00752D69
                                            • Part of subcall function 00752D55: GetLastError.KERNEL32(00000000,?,00759A24), ref: 00752D7B
                                          • _free.LIBCMT ref: 0079971C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                          • String ID:
                                          • API String ID: 1552873950-0
                                          • Opcode ID: 6cef8eb787e4e551deb87a41cfcc5f328edab007a71f9a3129ff1eb0514b26a6
                                          • Instruction ID: 4dc0692f9e1242ca9d0aaa62499deb6ca15ef73016feeba491d81b5b656d644b
                                          • Opcode Fuzzy Hash: 6cef8eb787e4e551deb87a41cfcc5f328edab007a71f9a3129ff1eb0514b26a6
                                          • Instruction Fuzzy Hash: A1515FB1E04218EFEF249FA4DC85A9EBB79EF48300F14049EF609A3241DB755A81CF59
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                          • String ID:
                                          • API String ID: 2782032738-0
                                          • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                          • Instruction ID: 0af55ec90a8728e6c917e43a03c35434df9ffc16254d883af7776a65aa77085f
                                          • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                          • Instruction Fuzzy Hash: 4E41E634A00745ABDB188F69C8849EE77A5EF4536AB24857DEC1587640E7F8EDC88B40
                                          APIs
                                          • _memset.LIBCMT ref: 007344CF
                                            • Part of subcall function 0073407C: _memset.LIBCMT ref: 007340FC
                                            • Part of subcall function 0073407C: _wcscpy.LIBCMT ref: 00734150
                                            • Part of subcall function 0073407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00734160
                                          • KillTimer.USER32(?,00000001,?,?), ref: 00734524
                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00734533
                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0076D4B9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                          • String ID:
                                          • API String ID: 1378193009-0
                                          • Opcode ID: b6e6077cdbebfe4c04b196f4a9cef674027f7e09962b1fbe3a1c4b806ad40cfc
                                          • Instruction ID: fd28014858da87e45b48057056c9bffa418b16a38f14a40b579b99d4e5c689f3
                                          • Opcode Fuzzy Hash: b6e6077cdbebfe4c04b196f4a9cef674027f7e09962b1fbe3a1c4b806ad40cfc
                                          • Instruction Fuzzy Hash: D621C8709047949FF7328B24CC55BE6BFECAF05315F04409EEB9A96142C7786D84CB55
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID: AU3!P/|$EA06
                                          • API String ID: 4104443479-648605970
                                          • Opcode ID: 378c77459991dedceea1418cf8368fbd5a8dadd78bd897143b7b6f49b466ef29
                                          • Instruction ID: 0eea257e7319e8e69e70134efe4a9b76b0f8b994c542a9a4bd921b78c54013b5
                                          • Opcode Fuzzy Hash: 378c77459991dedceea1418cf8368fbd5a8dadd78bd897143b7b6f49b466ef29
                                          • Instruction Fuzzy Hash: FB418B22B1415CABFF299B648C557BE7FB2DB45300F684075EE829B283D62CBD4483A1
                                          APIs
                                          • _memset.LIBCMT ref: 0076EA39
                                          • GetOpenFileNameW.COMDLG32(?), ref: 0076EA83
                                            • Part of subcall function 00734750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00734743,?,?,007337AE,?), ref: 00734770
                                            • Part of subcall function 00750791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007507B0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Name$Path$FileFullLongOpen_memset
                                          • String ID: X
                                          • API String ID: 3777226403-3081909835
                                          • Opcode ID: db920ed172235915b1e53eeda5074f31f195c7713dd6b21e89275c5848c84fff
                                          • Instruction ID: f0c76c34501d5618abf6ccf342934ebc26e50587f4d5efa68d65236443c751d2
                                          • Opcode Fuzzy Hash: db920ed172235915b1e53eeda5074f31f195c7713dd6b21e89275c5848c84fff
                                          • Instruction Fuzzy Hash: C321D471A102889BDB559F94CC49BEE7BF8AF08710F048019E908B7242DBBC5949CFA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __fread_nolock_memmove
                                          • String ID: EA06
                                          • API String ID: 1988441806-3962188686
                                          • Opcode ID: 4d2106bb227df6715ba18c082a33093bbdd990b21d0ed12f687082eefe6db9c4
                                          • Instruction ID: 275f6a80bb87dad074220a965a4b6724e9250142242f0fb0fe4b94be2ebf2469
                                          • Opcode Fuzzy Hash: 4d2106bb227df6715ba18c082a33093bbdd990b21d0ed12f687082eefe6db9c4
                                          • Instruction Fuzzy Hash: 2401F971D04258BEDF58CAA8C81AEEE7BF8DB15301F00419EF552D2181E8B8E60887A0
                                          APIs
                                          • GetTempPathW.KERNEL32(00000104,?), ref: 007998F8
                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0079990F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Temp$FileNamePath
                                          • String ID: aut
                                          • API String ID: 3285503233-3010740371
                                          • Opcode ID: f50c60c6aa8a8a612e8c57782b258d8bc74710a326cdbd59dfe4941489898573
                                          • Instruction ID: 4e7a648b4b2de8b954e38f5ce8d0a41c4b28eb3ad062fd29d6147d2aa7368a91
                                          • Opcode Fuzzy Hash: f50c60c6aa8a8a612e8c57782b258d8bc74710a326cdbd59dfe4941489898573
                                          • Instruction Fuzzy Hash: ACD05E7954030DABDB50ABA4DC0EFDA773CEB04B00F0043B1FF54D11A1EAB595988B95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5b33169b887f2d6c94988654582cc4944353b29625adfe0bdb76488a992f90fb
                                          • Instruction ID: 0b2be41dd47ea9b718df9f378556f3a6bffe1a08a674d14efef74ae0a90e78fa
                                          • Opcode Fuzzy Hash: 5b33169b887f2d6c94988654582cc4944353b29625adfe0bdb76488a992f90fb
                                          • Instruction Fuzzy Hash: 0CF11771608301EFC715DF28C484A6ABBE5BFC9314F14892EF8999B251D774E945CF82
                                          APIs
                                          • _memset.LIBCMT ref: 00734370
                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00734415
                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00734432
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: IconNotifyShell_$_memset
                                          • String ID:
                                          • API String ID: 1505330794-0
                                          • Opcode ID: 4e28471b91f25d694d84c0a91de0bb1b5d8f5efba2a3476c6cc0803c49e4b949
                                          • Instruction ID: c46655f402d32250eae4d1483512582470dae2f1c9d55935d1efc092435f036d
                                          • Opcode Fuzzy Hash: 4e28471b91f25d694d84c0a91de0bb1b5d8f5efba2a3476c6cc0803c49e4b949
                                          • Instruction Fuzzy Hash: E33184B0505701DFD724DF24D8846ABBBF8FB48309F004A2EF69A93252D7796944CB56
                                          APIs
                                          • __FF_MSGBANNER.LIBCMT ref: 00755733
                                            • Part of subcall function 0075A16B: __NMSG_WRITE.LIBCMT ref: 0075A192
                                            • Part of subcall function 0075A16B: __NMSG_WRITE.LIBCMT ref: 0075A19C
                                          • __NMSG_WRITE.LIBCMT ref: 0075573A
                                            • Part of subcall function 0075A1C8: GetModuleFileNameW.KERNEL32(00000000,007F33BA,00000104,?,00000001,00000000), ref: 0075A25A
                                            • Part of subcall function 0075A1C8: ___crtMessageBoxW.LIBCMT ref: 0075A308
                                            • Part of subcall function 0075309F: ___crtCorExitProcess.LIBCMT ref: 007530A5
                                            • Part of subcall function 0075309F: ExitProcess.KERNEL32 ref: 007530AE
                                            • Part of subcall function 00758B28: __getptd_noexit.LIBCMT ref: 00758B28
                                          • RtlAllocateHeap.NTDLL(013E0000,00000000,00000001,00000000,?,?,?,00750DD3,?), ref: 0075575F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                          • String ID:
                                          • API String ID: 1372826849-0
                                          • Opcode ID: c54ab0b06ef43182e7d39d0ea313bb0da2227d23e8a539eef3d53fb40bb161dc
                                          • Instruction ID: 33d469520091da521757a886471928bb6fc4b60fb4744fc3b3e7c8d402fe98cd
                                          • Opcode Fuzzy Hash: c54ab0b06ef43182e7d39d0ea313bb0da2227d23e8a539eef3d53fb40bb161dc
                                          • Instruction Fuzzy Hash: 3801F571200B05DBE6102738EC6AAEE775C9B46763F100935FC05AB1D1DEFC9C088665
                                          APIs
                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00799548,?,?,?,?,?,00000004), ref: 007998BB
                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00799548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 007998D1
                                          • CloseHandle.KERNEL32(00000000,?,00799548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007998D8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: File$CloseCreateHandleTime
                                          • String ID:
                                          • API String ID: 3397143404-0
                                          • Opcode ID: 86cbcc497fc3662fa005bc09da8b67915182bb4a6198412a9de12136dbbb21eb
                                          • Instruction ID: 9078a6e41166507debc6c51121ee4e2d63373497ef95866636e6fde8873ce0da
                                          • Opcode Fuzzy Hash: 86cbcc497fc3662fa005bc09da8b67915182bb4a6198412a9de12136dbbb21eb
                                          • Instruction Fuzzy Hash: 2DE0863214021CB7EB211B58EC09FCA7F59AB06B60F148220FB14790E087B51511979C
                                          APIs
                                          • _free.LIBCMT ref: 00798D1B
                                            • Part of subcall function 00752D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00759A24), ref: 00752D69
                                            • Part of subcall function 00752D55: GetLastError.KERNEL32(00000000,?,00759A24), ref: 00752D7B
                                          • _free.LIBCMT ref: 00798D2C
                                          • _free.LIBCMT ref: 00798D3E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: e92dce40d9500f9ac2a34e83b90a716ef22a9282606ba49fbfd8bfa905bb999e
                                          • Instruction ID: e7b9d2f4a5abf7a7d509edee1ffb1dd91fd556f4605fbf508437552c38cf3668
                                          • Opcode Fuzzy Hash: e92dce40d9500f9ac2a34e83b90a716ef22a9282606ba49fbfd8bfa905bb999e
                                          • Instruction Fuzzy Hash: 33E012A170170186CF64A578B944AD313EC4F5E393B14091EB80DD71C7CEACF8478124
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: CALL
                                          • API String ID: 0-4196123274
                                          • Opcode ID: 09f8ffbec22c8ea09c50aaaf30a7078cffc2014bb285895d2be840858cb5005f
                                          • Instruction ID: 4194a0165b7e25e887bab9cc12e0ecfa8ce0c47943578d443d8bc989abb617df
                                          • Opcode Fuzzy Hash: 09f8ffbec22c8ea09c50aaaf30a7078cffc2014bb285895d2be840858cb5005f
                                          • Instruction Fuzzy Hash: 10227B70608301DFEB24DF24C495B6AB7E1BF84300F15896DE98A8B362D779EC45CB82
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID:
                                          • API String ID: 4104443479-0
                                          • Opcode ID: 059574cf47bda8725b60555c6bc87727ac0702e8c5106250e102d0fb1eb030cd
                                          • Instruction ID: b88caa2464b2ee18e0631ae6532baeb316dfa8014e87ef79b7a6d42078b288aa
                                          • Opcode Fuzzy Hash: 059574cf47bda8725b60555c6bc87727ac0702e8c5106250e102d0fb1eb030cd
                                          • Instruction Fuzzy Hash: 0041F571918305DBDF04EFA8E889DBAB7B8EF49300F244459E58597342DB7D9C05CBA0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID:
                                          • API String ID: 4104443479-0
                                          • Opcode ID: aa52f996f6a1e8cebf2e93e85435818c4b1739226e09e342898e130c21d93d86
                                          • Instruction ID: fbba5ce7faf0d68249344bed4da5f5755bf3ec3b664024d2e7e39a89e2656359
                                          • Opcode Fuzzy Hash: aa52f996f6a1e8cebf2e93e85435818c4b1739226e09e342898e130c21d93d86
                                          • Instruction Fuzzy Hash: 073184F1604606AFD718DF68C8D1D69F3A5FF48310B15C629E919CB392EB74E910CB90
                                          APIs
                                          • IsThemeActive.UXTHEME ref: 00734834
                                            • Part of subcall function 0075336C: __lock.LIBCMT ref: 00753372
                                            • Part of subcall function 0075336C: DecodePointer.KERNEL32(00000001,?,00734849,00787C74), ref: 0075337E
                                            • Part of subcall function 0075336C: EncodePointer.KERNEL32(?,?,00734849,00787C74), ref: 00753389
                                            • Part of subcall function 007348FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00734915
                                            • Part of subcall function 007348FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0073492A
                                            • Part of subcall function 00733B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00733B68
                                            • Part of subcall function 00733B3A: IsDebuggerPresent.KERNEL32 ref: 00733B7A
                                            • Part of subcall function 00733B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,007F52F8,007F52E0,?,?), ref: 00733BEB
                                            • Part of subcall function 00733B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00733C6F
                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00734874
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                          • String ID:
                                          • API String ID: 1438897964-0
                                          • Opcode ID: 586b49ef8d1e42b9c84abe6c0bdad5256e1b9f7304476d24af3590faa18269a5
                                          • Instruction ID: a841c8b4612c7f55a9fca1f143f259c11c83f6ea4873deab1bce302f9c23db3b
                                          • Opcode Fuzzy Hash: 586b49ef8d1e42b9c84abe6c0bdad5256e1b9f7304476d24af3590faa18269a5
                                          • Instruction Fuzzy Hash: C6118EB19143419BD700EF28EC0996AFFE8FB85750F10861AF54087272DBB89648CB95
                                          APIs
                                            • Part of subcall function 0075571C: __FF_MSGBANNER.LIBCMT ref: 00755733
                                            • Part of subcall function 0075571C: __NMSG_WRITE.LIBCMT ref: 0075573A
                                            • Part of subcall function 0075571C: RtlAllocateHeap.NTDLL(013E0000,00000000,00000001,00000000,?,?,?,00750DD3,?), ref: 0075575F
                                          • std::exception::exception.LIBCMT ref: 00750DEC
                                          • __CxxThrowException@8.LIBCMT ref: 00750E01
                                            • Part of subcall function 0075859B: RaiseException.KERNEL32(?,?,?,007E9E78,00000000,?,?,?,?,00750E06,?,007E9E78,?,00000001), ref: 007585F0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                          • String ID:
                                          • API String ID: 3902256705-0
                                          • Opcode ID: 915744403485590d1841cdacd4b8a560bdb07e6b45687461e22d40173235481a
                                          • Instruction ID: e928f498cb364b8aee9aea06eeefb75f26e8677f78b13bda3bb71e2148ec6064
                                          • Opcode Fuzzy Hash: 915744403485590d1841cdacd4b8a560bdb07e6b45687461e22d40173235481a
                                          • Instruction Fuzzy Hash: DBF0A93260031EA6DB10BAA4DC05ADE77AC9F15352F10042DFD04A6151DFF99A59C5D1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __lock_file_memset
                                          • String ID:
                                          • API String ID: 26237723-0
                                          • Opcode ID: fb5d91a592b2d00a27ece324fe065bce8e0aa5238931bff695eac6c27b9b645c
                                          • Instruction ID: 7337b716dc849e75f715cb44dc2177696cc9496c1900865576d2aa31ead02d34
                                          • Opcode Fuzzy Hash: fb5d91a592b2d00a27ece324fe065bce8e0aa5238931bff695eac6c27b9b645c
                                          • Instruction Fuzzy Hash: 3D01D471C00A48EBCF12AF648C0A4DE7B61EF51723F544115FC242B191EBB98A19DF92
                                          APIs
                                            • Part of subcall function 00758B28: __getptd_noexit.LIBCMT ref: 00758B28
                                          • __lock_file.LIBCMT ref: 007553EB
                                            • Part of subcall function 00756C11: __lock.LIBCMT ref: 00756C34
                                          • __fclose_nolock.LIBCMT ref: 007553F6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                          • String ID:
                                          • API String ID: 2800547568-0
                                          • Opcode ID: 525e83df65a2d2b9e007b6719c3d74ca7d119817de9755fb88c4ca76f6d9af43
                                          • Instruction ID: 5e4d23572956bdf7caacc780a14394d1f724377762d084297196a2466c9d2d9a
                                          • Opcode Fuzzy Hash: 525e83df65a2d2b9e007b6719c3d74ca7d119817de9755fb88c4ca76f6d9af43
                                          • Instruction Fuzzy Hash: 5FF0F671800A04DBD750AB65880A7ED77E06F0137BF208108AC28BB1C1DBFC59099B52
                                          APIs
                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 01537815
                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01537839
                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0153785B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1334462787.0000000001535000.00000040.00000020.00020000.00000000.sdmp, Offset: 01535000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1535000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                          • String ID:
                                          • API String ID: 2438371351-0
                                          • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                          • Instruction ID: 780dbe3e9742bcf13eb2fa3a724ffcd18ac2d0ec6f245c33064155ac211b67d5
                                          • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                          • Instruction Fuzzy Hash: 9112CC24E24658C6EB24DF64D8507DEB332FF68300F1094E9910DEB7A5E77A4E81CB5A
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                          • Instruction ID: 27affe0e5970bdb97655de1882fe829816a08dfb1deff79a4cb008ec3f5cf47b
                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                          • Instruction Fuzzy Hash: 6131D470A001059BC718DF58C4849E9F7A6FB5A302B6887A5E80ACF351D7B5EDC5DBE0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ClearVariant
                                          • String ID:
                                          • API String ID: 1473721057-0
                                          • Opcode ID: 1deec32989db87ab94523a8051f32e091d67ffd716426d4eea1d4b084cea5539
                                          • Instruction ID: 9b9aa0b027401d0f9217bfbc69f2ba760acb90053103a75aa75548aa0e4052da
                                          • Opcode Fuzzy Hash: 1deec32989db87ab94523a8051f32e091d67ffd716426d4eea1d4b084cea5539
                                          • Instruction Fuzzy Hash: B0412774604341DFEB14DF24C448B1ABBE0BF45318F1988ACE9998B362C37AE845CF92
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID:
                                          • API String ID: 4104443479-0
                                          • Opcode ID: 5705deba3f61ee9e21b86f78b9917aaa66316ff56d314e732433376a0aabc38e
                                          • Instruction ID: ed3c387b0be8ea2e81c5fb1a4ce607aef8b5b148d3784e966804958f52b9bb3c
                                          • Opcode Fuzzy Hash: 5705deba3f61ee9e21b86f78b9917aaa66316ff56d314e732433376a0aabc38e
                                          • Instruction Fuzzy Hash: FF214BB2604A49EBDB244F25E8817A9BBB4FF14350F20C42DED86C9191EB3880D0D765
                                          APIs
                                            • Part of subcall function 00734BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00734BEF
                                            • Part of subcall function 0075525B: __wfsopen.LIBCMT ref: 00755266
                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007F52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00734E0F
                                            • Part of subcall function 00734B6A: FreeLibrary.KERNEL32(00000000), ref: 00734BA4
                                            • Part of subcall function 00734C70: _memmove.LIBCMT ref: 00734CBA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Library$Free$Load__wfsopen_memmove
                                          • String ID:
                                          • API String ID: 1396898556-0
                                          • Opcode ID: fc4bcb29687c607ad0c0c7879601e081512a50c1f8cedbf863db62c5ccee82b6
                                          • Instruction ID: 1656d2d93e6f12eeeda67b1801785e332f7233468fa04733c0cbc1dbc2723b46
                                          • Opcode Fuzzy Hash: fc4bcb29687c607ad0c0c7879601e081512a50c1f8cedbf863db62c5ccee82b6
                                          • Instruction Fuzzy Hash: B511E731640206EBEF28AF70CC1AFAD77A4EF44710F108429F942A7182DA7DAD009751
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ClearVariant
                                          • String ID:
                                          • API String ID: 1473721057-0
                                          • Opcode ID: dbc07f02255c6862fc9fe31bcf539a753dab73970d9e2320f64f8ec79c270c52
                                          • Instruction ID: 6876e2bc2aa11bc02448a5306c78545dbdefee19c671c5a5b1a2dcf562e643b8
                                          • Opcode Fuzzy Hash: dbc07f02255c6862fc9fe31bcf539a753dab73970d9e2320f64f8ec79c270c52
                                          • Instruction Fuzzy Hash: 9B2124B4608341DFDB14DF64C445B5ABBE0BF88315F05896CF98A57722D739E809CBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1f885bf3ff7540f0353aeec10980ece588b8686fe2755ff5c12391e4638d39f9
                                          • Instruction ID: 8e8fab61316d5629795f1ed936f513083e726b9919eb47b991bb65e6bb4ce943
                                          • Opcode Fuzzy Hash: 1f885bf3ff7540f0353aeec10980ece588b8686fe2755ff5c12391e4638d39f9
                                          • Instruction Fuzzy Hash: E70149724051245FEF314A24AC42AEAB7D8EF88333F10896FFC0896810D6E87C4C8EE0
                                          APIs
                                          • __lock_file.LIBCMT ref: 007548A6
                                            • Part of subcall function 00758B28: __getptd_noexit.LIBCMT ref: 00758B28
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __getptd_noexit__lock_file
                                          • String ID:
                                          • API String ID: 2597487223-0
                                          • Opcode ID: d867cfd4c3dd5225be65a08f278051ef9419bb9d41ccc175879e037ef8c75525
                                          • Instruction ID: 3f681ffc1d35e56a6db371be6db54ed430aaa41d7392ab296110bf518ddb7dd0
                                          • Opcode Fuzzy Hash: d867cfd4c3dd5225be65a08f278051ef9419bb9d41ccc175879e037ef8c75525
                                          • Instruction Fuzzy Hash: 6DF0C871901645EBDF51AF748C0A7EE36A0AF0032BF154414FC24A6191DBFCA999DF52
                                          APIs
                                          • FreeLibrary.KERNEL32(?,?,007F52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00734E7E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FreeLibrary
                                          • String ID:
                                          • API String ID: 3664257935-0
                                          • Opcode ID: f19675f23d36996fa5747c916e68426c6b04d45c9af0e5bc80921a66573f4afd
                                          • Instruction ID: 5a186b1c5c0b2c31ba60893919b85f6f21fc684fadb528e4677e2614daf86262
                                          • Opcode Fuzzy Hash: f19675f23d36996fa5747c916e68426c6b04d45c9af0e5bc80921a66573f4afd
                                          • Instruction Fuzzy Hash: 82F06D71541711DFEB389F64E894812BBF1FF1432A7208A7EE1DB82622C77AA844DF40
                                          APIs
                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007507B0
                                            • Part of subcall function 00737BCC: _memmove.LIBCMT ref: 00737C06
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: LongNamePath_memmove
                                          • String ID:
                                          • API String ID: 2514874351-0
                                          • Opcode ID: 10e5cebc954a87b6eaa36b04703d8e422fbe8ee81643c24d13674c6ba5a0a7d9
                                          • Instruction ID: 739da40a0c30952a9a585af1d3ad0355396a1a940d76587a5f2b48aa5729db89
                                          • Opcode Fuzzy Hash: 10e5cebc954a87b6eaa36b04703d8e422fbe8ee81643c24d13674c6ba5a0a7d9
                                          • Instruction Fuzzy Hash: 7EE0CD7690422857C720D6689C09FEAB7EDDF887A0F0441B6FC0CD7305D964AC8086D0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __fread_nolock
                                          • String ID:
                                          • API String ID: 2638373210-0
                                          • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                          • Instruction ID: e57e266172cbeab3a41b32f03ed1b4e811104b262a8f1716f2f7e69ec018b090
                                          • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                          • Instruction Fuzzy Hash: D2E092B0104B009BDB388A24D810BE373E1AB06305F04095DF6AAC3241EBA67845C759
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __wfsopen
                                          • String ID:
                                          • API String ID: 197181222-0
                                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                          • Instruction ID: 39242536a454a70c0947ec4f3782b4e3e086a8c595f4292ac212938f150a919e
                                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                          • Instruction Fuzzy Hash: 34B092B644020CB7CE012A82EC02A893B19AB41764F408020FF0C18162A6B7A6689A8A
                                          APIs
                                          • Sleep.KERNELBASE(000001F4), ref: 01537FF9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1334462787.0000000001535000.00000040.00000020.00020000.00000000.sdmp, Offset: 01535000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1535000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Sleep
                                          • String ID:
                                          • API String ID: 3472027048-0
                                          • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                          • Instruction ID: 7baaea33893649e0ee1d15f64d24361c45ce9cb1d698c5a4bb5a946b189f5694
                                          • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                          • Instruction Fuzzy Hash: 55E0BF7494010DEFDB10DFA4D5496DD7BB4FF04311F1006A1FD05D7691DB309E549A62
                                          APIs
                                          • Sleep.KERNELBASE(000001F4), ref: 01537FF9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1334462787.0000000001535000.00000040.00000020.00020000.00000000.sdmp, Offset: 01535000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1535000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Sleep
                                          • String ID:
                                          • API String ID: 3472027048-0
                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                          • Instruction ID: e9e3d65abe510b9af99e835f1cdf18a13a4b8267675fca8cb80eeb73b188454c
                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                          • Instruction Fuzzy Hash: E8E0E67494010DDFDB00DFB4D54969D7BB4FF04301F100261FD01D2281D6309E509A72
                                          APIs
                                            • Part of subcall function 00732612: GetWindowLongW.USER32(?,000000EB), ref: 00732623
                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 007BCB37
                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007BCB95
                                          • GetWindowLongW.USER32(?,000000F0), ref: 007BCBD6
                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007BCC00
                                          • SendMessageW.USER32 ref: 007BCC29
                                          • _wcsncpy.LIBCMT ref: 007BCC95
                                          • GetKeyState.USER32(00000011), ref: 007BCCB6
                                          • GetKeyState.USER32(00000009), ref: 007BCCC3
                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007BCCD9
                                          • GetKeyState.USER32(00000010), ref: 007BCCE3
                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007BCD0C
                                          • SendMessageW.USER32 ref: 007BCD33
                                          • SendMessageW.USER32(?,00001030,?,007BB348), ref: 007BCE37
                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 007BCE4D
                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 007BCE60
                                          • SetCapture.USER32(?), ref: 007BCE69
                                          • ClientToScreen.USER32(?,?), ref: 007BCECE
                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 007BCEDB
                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007BCEF5
                                          • ReleaseCapture.USER32 ref: 007BCF00
                                          • GetCursorPos.USER32(?), ref: 007BCF3A
                                          • ScreenToClient.USER32(?,?), ref: 007BCF47
                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 007BCFA3
                                          • SendMessageW.USER32 ref: 007BCFD1
                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 007BD00E
                                          • SendMessageW.USER32 ref: 007BD03D
                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 007BD05E
                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 007BD06D
                                          • GetCursorPos.USER32(?), ref: 007BD08D
                                          • ScreenToClient.USER32(?,?), ref: 007BD09A
                                          • GetParent.USER32(?), ref: 007BD0BA
                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 007BD123
                                          • SendMessageW.USER32 ref: 007BD154
                                          • ClientToScreen.USER32(?,?), ref: 007BD1B2
                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 007BD1E2
                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 007BD20C
                                          • SendMessageW.USER32 ref: 007BD22F
                                          • ClientToScreen.USER32(?,?), ref: 007BD281
                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 007BD2B5
                                            • Part of subcall function 007325DB: GetWindowLongW.USER32(?,000000EB), ref: 007325EC
                                          • GetWindowLongW.USER32(?,000000F0), ref: 007BD351
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                          • String ID: @GUI_DRAGID$F
                                          • API String ID: 3977979337-4164748364
                                          • Opcode ID: a66f730f99a1778731220442ea848e23ea56cc64a79c6e04c08e3a4fd181d57a
                                          • Instruction ID: a876f9703e95ca014ced21ee2e0c49c52451578e1096cd15a90415aba6bd25db
                                          • Opcode Fuzzy Hash: a66f730f99a1778731220442ea848e23ea56cc64a79c6e04c08e3a4fd181d57a
                                          • Instruction Fuzzy Hash: 3542AB74204681EFD721CF28C848FAABFE5FF48710F148629F6558B2A1D739D850DB56
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove$_memset
                                          • String ID: ]~$3ct$DEFINE$P\~$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_t
                                          • API String ID: 1357608183-102268661
                                          • Opcode ID: cd60f42cd002709cd244167a335d2c91fa9d39b38ccc90483d493b57bdec8e34
                                          • Instruction ID: 720b60511503ebe1574ca25d20be84b3926f0ac4746d903c84cf2bc6235ea4df
                                          • Opcode Fuzzy Hash: cd60f42cd002709cd244167a335d2c91fa9d39b38ccc90483d493b57bdec8e34
                                          • Instruction Fuzzy Hash: CB93B371E40219DFDB28DF58C885BADB7B1FF48710F24816AE945EB281E7789D82CB50
                                          APIs
                                          • GetForegroundWindow.USER32(00000000,?), ref: 007348DF
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0076D665
                                          • IsIconic.USER32(?), ref: 0076D66E
                                          • ShowWindow.USER32(?,00000009), ref: 0076D67B
                                          • SetForegroundWindow.USER32(?), ref: 0076D685
                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0076D69B
                                          • GetCurrentThreadId.KERNEL32 ref: 0076D6A2
                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0076D6AE
                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0076D6BF
                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0076D6C7
                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 0076D6CF
                                          • SetForegroundWindow.USER32(?), ref: 0076D6D2
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0076D6E7
                                          • keybd_event.USER32(00000012,00000000), ref: 0076D6F2
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0076D6FC
                                          • keybd_event.USER32(00000012,00000000), ref: 0076D701
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0076D70A
                                          • keybd_event.USER32(00000012,00000000), ref: 0076D70F
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0076D719
                                          • keybd_event.USER32(00000012,00000000), ref: 0076D71E
                                          • SetForegroundWindow.USER32(?), ref: 0076D721
                                          • AttachThreadInput.USER32(?,?,00000000), ref: 0076D748
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 4125248594-2988720461
                                          • Opcode ID: 6d63d9e7d9f416f0682318729a5719bc329777bb300b0f0f52768eb703e579bc
                                          • Instruction ID: effc9667f7da3fadd078131c7ba06e52129b28ae26a166147756a3fbfad40ba6
                                          • Opcode Fuzzy Hash: 6d63d9e7d9f416f0682318729a5719bc329777bb300b0f0f52768eb703e579bc
                                          • Instruction Fuzzy Hash: E8319271A40318BAEB302F659C49FBF3F6CEB44F50F108125FE05EA1D1CAB85D11AAA5
                                          APIs
                                            • Part of subcall function 007887E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0078882B
                                            • Part of subcall function 007887E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00788858
                                            • Part of subcall function 007887E1: GetLastError.KERNEL32 ref: 00788865
                                          • _memset.LIBCMT ref: 00788353
                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 007883A5
                                          • CloseHandle.KERNEL32(?), ref: 007883B6
                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007883CD
                                          • GetProcessWindowStation.USER32 ref: 007883E6
                                          • SetProcessWindowStation.USER32(00000000), ref: 007883F0
                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0078840A
                                            • Part of subcall function 007881CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00788309), ref: 007881E0
                                            • Part of subcall function 007881CB: CloseHandle.KERNEL32(?,?,00788309), ref: 007881F2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                          • String ID: $default$winsta0
                                          • API String ID: 2063423040-1027155976
                                          • Opcode ID: 09a47aba32d7dffc3439be216388a3aad3dc97d93edd32011151e684b91c5145
                                          • Instruction ID: bd0f450dc709b8098fafdcbc58d6e3912279f849dc79846f04d4c168655b6f6b
                                          • Opcode Fuzzy Hash: 09a47aba32d7dffc3439be216388a3aad3dc97d93edd32011151e684b91c5145
                                          • Instruction Fuzzy Hash: BE817DB1940209AFDF51EFA4CC49EEE7BB9FF04704F648169F810A6161DB398E25DB21
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 0079C78D
                                          • FindClose.KERNEL32(00000000), ref: 0079C7E1
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0079C806
                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0079C81D
                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0079C844
                                          • __swprintf.LIBCMT ref: 0079C890
                                          • __swprintf.LIBCMT ref: 0079C8D3
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                          • __swprintf.LIBCMT ref: 0079C927
                                            • Part of subcall function 00753698: __woutput_l.LIBCMT ref: 007536F1
                                          • __swprintf.LIBCMT ref: 0079C975
                                            • Part of subcall function 00753698: __flsbuf.LIBCMT ref: 00753713
                                            • Part of subcall function 00753698: __flsbuf.LIBCMT ref: 0075372B
                                          • __swprintf.LIBCMT ref: 0079C9C4
                                          • __swprintf.LIBCMT ref: 0079CA13
                                          • __swprintf.LIBCMT ref: 0079CA62
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                          • API String ID: 3953360268-2428617273
                                          • Opcode ID: a58699bf71fa258149d33e61f4d21c268c9030e90a213e38757bf6fc1336f801
                                          • Instruction ID: a7b51382396677ba540ca9b2079f408c11d88b0a14bde7b69bd60d35de982ecd
                                          • Opcode Fuzzy Hash: a58699bf71fa258149d33e61f4d21c268c9030e90a213e38757bf6fc1336f801
                                          • Instruction Fuzzy Hash: C4A13EB1508304EBD755EFA4C889DAFB7ECFF94700F404919F585C6192EA78EA08CB62
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0079EFB6
                                          • _wcscmp.LIBCMT ref: 0079EFCB
                                          • _wcscmp.LIBCMT ref: 0079EFE2
                                          • GetFileAttributesW.KERNEL32(?), ref: 0079EFF4
                                          • SetFileAttributesW.KERNEL32(?,?), ref: 0079F00E
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0079F026
                                          • FindClose.KERNEL32(00000000), ref: 0079F031
                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0079F04D
                                          • _wcscmp.LIBCMT ref: 0079F074
                                          • _wcscmp.LIBCMT ref: 0079F08B
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0079F09D
                                          • SetCurrentDirectoryW.KERNEL32(007E8920), ref: 0079F0BB
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0079F0C5
                                          • FindClose.KERNEL32(00000000), ref: 0079F0D2
                                          • FindClose.KERNEL32(00000000), ref: 0079F0E4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                          • String ID: *.*
                                          • API String ID: 1803514871-438819550
                                          • Opcode ID: 71a614ed263ee15bed54fb3ffdc934e2ac12922979e5834860b68efed3ec8866
                                          • Instruction ID: 3b62a6b63d3c4c8bc520ff2e650deb69c1a01cf5e5f29bdbb6bc82785954833c
                                          • Opcode Fuzzy Hash: 71a614ed263ee15bed54fb3ffdc934e2ac12922979e5834860b68efed3ec8866
                                          • Instruction Fuzzy Hash: 2731C5329012186ADF14DBB8EC49FEE77ACAF48761F144176E804D30A1EB78DA44CB65
                                          APIs
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007B0953
                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,007BF910,00000000,?,00000000,?,?), ref: 007B09C1
                                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 007B0A09
                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 007B0A92
                                          • RegCloseKey.ADVAPI32(?), ref: 007B0DB2
                                          • RegCloseKey.ADVAPI32(00000000), ref: 007B0DBF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Close$ConnectCreateRegistryValue
                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                          • API String ID: 536824911-966354055
                                          • Opcode ID: 9f0b669197bf3ccacc9a5c23e32389b2947153bbf56608c7753a99a30663a6aa
                                          • Instruction ID: e014a48ce59b164332241c186fbc018a22ba166cecec39c660a39bb6a458f5b5
                                          • Opcode Fuzzy Hash: 9f0b669197bf3ccacc9a5c23e32389b2947153bbf56608c7753a99a30663a6aa
                                          • Instruction Fuzzy Hash: 63024875600601DFDB14EF18C899EAAB7E5EF89710F04855CF9899B3A2DB78ED01CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0D}$0E}$0F}$3ct$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pG}$_t
                                          • API String ID: 0-2392564138
                                          • Opcode ID: 7031770e69356b912e1c5587ee896d51a89800b512ef8d123bab18a8a95a40f3
                                          • Instruction ID: a69f5dbc4fc47603cd3ebb106f8d37bef1dea652c752343ee1d9ca85fa60fdb0
                                          • Opcode Fuzzy Hash: 7031770e69356b912e1c5587ee896d51a89800b512ef8d123bab18a8a95a40f3
                                          • Instruction Fuzzy Hash: 0E7283B5E00219DBDB14DF59C8807EEB7B5FF49310F64816AE909EB290E7389D81CB91
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0079F113
                                          • _wcscmp.LIBCMT ref: 0079F128
                                          • _wcscmp.LIBCMT ref: 0079F13F
                                            • Part of subcall function 00794385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007943A0
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0079F16E
                                          • FindClose.KERNEL32(00000000), ref: 0079F179
                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0079F195
                                          • _wcscmp.LIBCMT ref: 0079F1BC
                                          • _wcscmp.LIBCMT ref: 0079F1D3
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0079F1E5
                                          • SetCurrentDirectoryW.KERNEL32(007E8920), ref: 0079F203
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0079F20D
                                          • FindClose.KERNEL32(00000000), ref: 0079F21A
                                          • FindClose.KERNEL32(00000000), ref: 0079F22C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                          • String ID: *.*
                                          • API String ID: 1824444939-438819550
                                          • Opcode ID: 25d81f61b8d698ae35271d402891780054606a50de13f6f73277d98325f0e081
                                          • Instruction ID: 07333d0e6fe631dfb1206323b65292f3af25064e47497f8a729cdef1bc841ce2
                                          • Opcode Fuzzy Hash: 25d81f61b8d698ae35271d402891780054606a50de13f6f73277d98325f0e081
                                          • Instruction Fuzzy Hash: F831F336901619AADF149FB4FC49FEE77ACAF49360F144275E804E20A0DB38DE45CA68
                                          APIs
                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0079A20F
                                          • __swprintf.LIBCMT ref: 0079A231
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0079A26E
                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0079A293
                                          • _memset.LIBCMT ref: 0079A2B2
                                          • _wcsncpy.LIBCMT ref: 0079A2EE
                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0079A323
                                          • CloseHandle.KERNEL32(00000000), ref: 0079A32E
                                          • RemoveDirectoryW.KERNEL32(?), ref: 0079A337
                                          • CloseHandle.KERNEL32(00000000), ref: 0079A341
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                          • String ID: :$\$\??\%s
                                          • API String ID: 2733774712-3457252023
                                          • Opcode ID: 5a3a1e6af4602321e0857a2e5abd5ac664f506deca148b0c8528e91feca57b54
                                          • Instruction ID: 632abf09cf773bda0b1e0d82cbc632073100b97da24f0e40aacb85fa6327e1dd
                                          • Opcode Fuzzy Hash: 5a3a1e6af4602321e0857a2e5abd5ac664f506deca148b0c8528e91feca57b54
                                          • Instruction Fuzzy Hash: B93190B2904209BBDB219FA0DC49FEB37BCEF89741F1041B6F909D2160EB7896458B65
                                          APIs
                                          • GetKeyboardState.USER32(?), ref: 00790097
                                          • SetKeyboardState.USER32(?), ref: 00790102
                                          • GetAsyncKeyState.USER32(000000A0), ref: 00790122
                                          • GetKeyState.USER32(000000A0), ref: 00790139
                                          • GetAsyncKeyState.USER32(000000A1), ref: 00790168
                                          • GetKeyState.USER32(000000A1), ref: 00790179
                                          • GetAsyncKeyState.USER32(00000011), ref: 007901A5
                                          • GetKeyState.USER32(00000011), ref: 007901B3
                                          • GetAsyncKeyState.USER32(00000012), ref: 007901DC
                                          • GetKeyState.USER32(00000012), ref: 007901EA
                                          • GetAsyncKeyState.USER32(0000005B), ref: 00790213
                                          • GetKeyState.USER32(0000005B), ref: 00790221
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: State$Async$Keyboard
                                          • String ID:
                                          • API String ID: 541375521-0
                                          • Opcode ID: 103e8c7efab31782658a43db80fe724d7b1b40e8f7a76c5b6aa30b12199b1d66
                                          • Instruction ID: 89719e3d76f692d17b6a08fc12e44d9a6926fc5596ef9c2633f2d2834e3cc6a4
                                          • Opcode Fuzzy Hash: 103e8c7efab31782658a43db80fe724d7b1b40e8f7a76c5b6aa30b12199b1d66
                                          • Instruction Fuzzy Hash: 7351E8209147886DFF35DBA4A8547FABFB49F01380F08459AD9C2565C2DAAC9B8CC7E1
                                          APIs
                                            • Part of subcall function 007B0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007AFDAD,?,?), ref: 007B0E31
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007B04AC
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 007B054B
                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007B05E3
                                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 007B0822
                                          • RegCloseKey.ADVAPI32(00000000), ref: 007B082F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                          • String ID:
                                          • API String ID: 1240663315-0
                                          • Opcode ID: bbc548700455997b5721965fad1148fcc007d462321880f1e68cc41281beb4b3
                                          • Instruction ID: 7a15b26813cd4a570337959c96bbcaa5393a47393147c3ad5974592568d63070
                                          • Opcode Fuzzy Hash: bbc548700455997b5721965fad1148fcc007d462321880f1e68cc41281beb4b3
                                          • Instruction Fuzzy Hash: 92E14B71604200EFCB14DF28C895E6BBBE4FF89714F04896DF94ADB262DA35E901CB91
                                          APIs
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                          • CoInitialize.OLE32 ref: 007A8403
                                          • CoUninitialize.OLE32 ref: 007A840E
                                          • CoCreateInstance.OLE32(?,00000000,00000017,007C2BEC,?), ref: 007A846E
                                          • IIDFromString.OLE32(?,?), ref: 007A84E1
                                          • VariantInit.OLEAUT32(?), ref: 007A857B
                                          • VariantClear.OLEAUT32(?), ref: 007A85DC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                          • API String ID: 834269672-1287834457
                                          • Opcode ID: 9d3c60258b5bcc98da1f89019c03ed17cc1b902e3692d3e1f4df038d94d02e05
                                          • Instruction ID: 222075a1d59858cbf4f2f9363835ddacfe3fed15375fbe5124f6f42dbe2691ff
                                          • Opcode Fuzzy Hash: 9d3c60258b5bcc98da1f89019c03ed17cc1b902e3692d3e1f4df038d94d02e05
                                          • Instruction Fuzzy Hash: 3F61EF70608312EFD750DF14C848F5ABBE8AF8A714F044A19F9859B291CB78ED44CB93
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                          • String ID:
                                          • API String ID: 1737998785-0
                                          • Opcode ID: ffd3fb47b438a9818a14f6a2e20b82b8661f2b4bf92545fd7d28b982703580fa
                                          • Instruction ID: e7803d2286cef01636f4b4be83aa1430a68e5cd559c94d9ada1e0472e539f65f
                                          • Opcode Fuzzy Hash: ffd3fb47b438a9818a14f6a2e20b82b8661f2b4bf92545fd7d28b982703580fa
                                          • Instruction Fuzzy Hash: 0B216035200214DFDB10AF64DC49F6D7BA8FF85715F108126F945DB2A1DBB9AC01CB58
                                          APIs
                                            • Part of subcall function 00734750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00734743,?,?,007337AE,?), ref: 00734770
                                            • Part of subcall function 00794A31: GetFileAttributesW.KERNEL32(?,0079370B), ref: 00794A32
                                          • FindFirstFileW.KERNEL32(?,?), ref: 007938A3
                                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0079394B
                                          • MoveFileW.KERNEL32(?,?), ref: 0079395E
                                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0079397B
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0079399D
                                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 007939B9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                          • String ID: \*.*
                                          • API String ID: 4002782344-1173974218
                                          • Opcode ID: 9c15f7373b7ca19e5e2c4554c34bad7c02a83fa03c5a6dfa2f83a417893da35c
                                          • Instruction ID: 10a6142c66490f1f34ec0b58a3ea87d2a0b0cdcded7a7fdc802f660dc290c87a
                                          • Opcode Fuzzy Hash: 9c15f7373b7ca19e5e2c4554c34bad7c02a83fa03c5a6dfa2f83a417893da35c
                                          • Instruction Fuzzy Hash: 4251AB7180014CEADF15EBA0EA96EFDB778AF10314F604169E406B7192EF386F09CB61
                                          APIs
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0079F440
                                          • Sleep.KERNEL32(0000000A), ref: 0079F470
                                          • _wcscmp.LIBCMT ref: 0079F484
                                          • _wcscmp.LIBCMT ref: 0079F49F
                                          • FindNextFileW.KERNEL32(?,?), ref: 0079F53D
                                          • FindClose.KERNEL32(00000000), ref: 0079F553
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                          • String ID: *.*
                                          • API String ID: 713712311-438819550
                                          • Opcode ID: 66bd1320a90b19ee5ad85be1925e94b3d74f960e09247a6e2b80517fd75b6e6f
                                          • Instruction ID: b9c0ed551b4450819c03dcc6885a162b0aa064d52f6d9d186ba540e074afa53a
                                          • Opcode Fuzzy Hash: 66bd1320a90b19ee5ad85be1925e94b3d74f960e09247a6e2b80517fd75b6e6f
                                          • Instruction Fuzzy Hash: 34417C7190021AEFDF14EF64DC49AEEBBB8FF05310F144566E815A31A1EB38AA54CF61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __itow__swprintf
                                          • String ID: 3ct$_t
                                          • API String ID: 674341424-1670605766
                                          • Opcode ID: afb5b73058b863b3ef1fb43067667b9c03f39a7f0f3999871a17d4f9d32febf4
                                          • Instruction ID: 7231af76fb75c6ca739ac6cfefccff75cbfcae0a00337cb7304a95a1bc01e13e
                                          • Opcode Fuzzy Hash: afb5b73058b863b3ef1fb43067667b9c03f39a7f0f3999871a17d4f9d32febf4
                                          • Instruction Fuzzy Hash: 9922BE71608740DFDB24DF14C885BAEB7E4BF84710F10892DF99A97292DB79E904CB92
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID:
                                          • API String ID: 4104443479-0
                                          • Opcode ID: 223ca53b60c8b55b2f8132be7a5d5c2f2534fcc58858a066dd85a5c60da72826
                                          • Instruction ID: d63c3f37626aabeea488798ce9b4f00be0e5a3075f96fcf8a174457688eb78e8
                                          • Opcode Fuzzy Hash: 223ca53b60c8b55b2f8132be7a5d5c2f2534fcc58858a066dd85a5c60da72826
                                          • Instruction Fuzzy Hash: F1129C70A00609DFDF04DFA5D985AEEB7F5FF48310F104529E846A7292EB3AAD14CB91
                                          APIs
                                            • Part of subcall function 00734750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00734743,?,?,007337AE,?), ref: 00734770
                                            • Part of subcall function 00794A31: GetFileAttributesW.KERNEL32(?,0079370B), ref: 00794A32
                                          • FindFirstFileW.KERNEL32(?,?), ref: 00793B89
                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00793BD9
                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00793BEA
                                          • FindClose.KERNEL32(00000000), ref: 00793C01
                                          • FindClose.KERNEL32(00000000), ref: 00793C0A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                          • String ID: \*.*
                                          • API String ID: 2649000838-1173974218
                                          • Opcode ID: c8db73b1265a2bdfbe39ed026cb033625ef390d2fd1777c075ad2573b24e5029
                                          • Instruction ID: 42c9163276a593256e3894048b386a0076ad637c6ca49b5d11c2a1c24f18f6c3
                                          • Opcode Fuzzy Hash: c8db73b1265a2bdfbe39ed026cb033625ef390d2fd1777c075ad2573b24e5029
                                          • Instruction Fuzzy Hash: 5A319E71008384DBD704EF24D895DAFB7E8BE95304F444E2DF4D593192EB289A08CB67
                                          APIs
                                            • Part of subcall function 007887E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0078882B
                                            • Part of subcall function 007887E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00788858
                                            • Part of subcall function 007887E1: GetLastError.KERNEL32 ref: 00788865
                                          • ExitWindowsEx.USER32(?,00000000), ref: 007951F9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                          • String ID: $@$SeShutdownPrivilege
                                          • API String ID: 2234035333-194228
                                          • Opcode ID: e119566831419139dfa79ef5397ab04e5ebed3be4a30007e9fde636b0043e21f
                                          • Instruction ID: 3926f58d10215689d10878c502230accf2e86630e835450a2020044fd96b3cbe
                                          • Opcode Fuzzy Hash: e119566831419139dfa79ef5397ab04e5ebed3be4a30007e9fde636b0043e21f
                                          • Instruction Fuzzy Hash: 6F01F7B17956256BEF296378BC8EFBA7258FB05B40F200525F913E20D2D96D1C008794
                                          APIs
                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 007A62DC
                                          • WSAGetLastError.WSOCK32(00000000), ref: 007A62EB
                                          • bind.WSOCK32(00000000,?,00000010), ref: 007A6307
                                          • listen.WSOCK32(00000000,00000005), ref: 007A6316
                                          • WSAGetLastError.WSOCK32(00000000), ref: 007A6330
                                          • closesocket.WSOCK32(00000000), ref: 007A6344
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorLast$bindclosesocketlistensocket
                                          • String ID:
                                          • API String ID: 1279440585-0
                                          • Opcode ID: 7f6f4db5656628607b697b7a94347c7a98a0753b191b6559a6410b8c7e741530
                                          • Instruction ID: 783d942eb17490ebeae4e264c0394adabf43323dfd95171776baddc9644ca60d
                                          • Opcode Fuzzy Hash: 7f6f4db5656628607b697b7a94347c7a98a0753b191b6559a6410b8c7e741530
                                          • Instruction Fuzzy Hash: 4221D230600200DFDB00EF64CC89F6EB7E9EF85720F148258E956A7392CB78AC01CB51
                                          APIs
                                            • Part of subcall function 00750DB6: std::exception::exception.LIBCMT ref: 00750DEC
                                            • Part of subcall function 00750DB6: __CxxThrowException@8.LIBCMT ref: 00750E01
                                          • _memmove.LIBCMT ref: 00780258
                                          • _memmove.LIBCMT ref: 0078036D
                                          • _memmove.LIBCMT ref: 00780414
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove$Exception@8Throwstd::exception::exception
                                          • String ID:
                                          • API String ID: 1300846289-0
                                          • Opcode ID: 87c5cc021a4789c98113af9b32252428d5648633223d0a33f840778d56366fe5
                                          • Instruction ID: 94d1c0db24df33b05b37b5c2de103931d645a911e4d2fc13c6c624df19cbfbe3
                                          • Opcode Fuzzy Hash: 87c5cc021a4789c98113af9b32252428d5648633223d0a33f840778d56366fe5
                                          • Instruction Fuzzy Hash: 0E02E3B0A00209DFDF04EF64D985AAEBBB5FF44310F148069E80ADB252EB79DD54CB91
                                          APIs
                                            • Part of subcall function 00732612: GetWindowLongW.USER32(?,000000EB), ref: 00732623
                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 007319FA
                                          • GetSysColor.USER32(0000000F), ref: 00731A4E
                                          • SetBkColor.GDI32(?,00000000), ref: 00731A61
                                            • Part of subcall function 00731290: DefDlgProcW.USER32(?,00000020,?), ref: 007312D8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ColorProc$LongWindow
                                          • String ID:
                                          • API String ID: 3744519093-0
                                          • Opcode ID: 00601867e1f29fe8bf762125750687ca25dfb8b3ac0ea590c43374df07801e23
                                          • Instruction ID: 3149659e3feee202d39dc9dbae2b47ada66f7f7a1bd95b27d91b039f23afaa14
                                          • Opcode Fuzzy Hash: 00601867e1f29fe8bf762125750687ca25dfb8b3ac0ea590c43374df07801e23
                                          • Instruction Fuzzy Hash: A4A12971106584FAF628AB388C49EBF375CDF42342F94821AF903D6193DB2DAD41D6B6
                                          APIs
                                            • Part of subcall function 007A7D8B: inet_addr.WSOCK32(00000000), ref: 007A7DB6
                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 007A679E
                                          • WSAGetLastError.WSOCK32(00000000), ref: 007A67C7
                                          • bind.WSOCK32(00000000,?,00000010), ref: 007A6800
                                          • WSAGetLastError.WSOCK32(00000000), ref: 007A680D
                                          • closesocket.WSOCK32(00000000), ref: 007A6821
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                          • String ID:
                                          • API String ID: 99427753-0
                                          • Opcode ID: 2aec502f36a7c7086972b42914b2e26dc7e3941f0a2f95107a48279a03be9e0d
                                          • Instruction ID: 2f8ec65a2195d628b2db0559e2c5663934dd19f96a10c28f2b125afd3d7d8b65
                                          • Opcode Fuzzy Hash: 2aec502f36a7c7086972b42914b2e26dc7e3941f0a2f95107a48279a03be9e0d
                                          • Instruction Fuzzy Hash: 7F41C375B00210AFEB50BF248C8AF6E77E8DB49714F048558FA55AB3C3CAB89D008B91
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                          • String ID:
                                          • API String ID: 292994002-0
                                          • Opcode ID: da1fcf9b43105c191429f79d9cb722f907a9f10876e58c228ca49fd214febeb5
                                          • Instruction ID: f3aae2c7d214a484b51158871cb1a336c1e6d66c2f41dcb269d3554ea8cf8fe4
                                          • Opcode Fuzzy Hash: da1fcf9b43105c191429f79d9cb722f907a9f10876e58c228ca49fd214febeb5
                                          • Instruction Fuzzy Hash: 2411C831700511AFEB216F26DC48F9EBBD9EF447A5B548029F945D3341DBBCDC018AA4
                                          APIs
                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007880C0
                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007880CA
                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007880D9
                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007880E0
                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007880F6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 44706859-0
                                          • Opcode ID: 9f3022fad60866f5459e2363d0935be75f25ac91c6ea98e9051c1dc4907cee98
                                          • Instruction ID: 1004b00ae8defe0b1a8ba2ea7d50ed4ff0dc7920ecb91c575c200190569ec617
                                          • Opcode Fuzzy Hash: 9f3022fad60866f5459e2363d0935be75f25ac91c6ea98e9051c1dc4907cee98
                                          • Instruction Fuzzy Hash: E0F0C270240209BFEB102FA9EC8CF673BACEF49B54B504129F905C2160CF689C01DB61
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00734AD0), ref: 00734B45
                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00734B57
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                          • API String ID: 2574300362-192647395
                                          • Opcode ID: b0d2f0b2831a4593b4d1d8faa5dc6b2b14552a57bc3a5abc0bb166ac7a829cd7
                                          • Instruction ID: 10f40af41d10a7a8fe5da2a10e99a5f75f0e775bb98c6935785973c495937b03
                                          • Opcode Fuzzy Hash: b0d2f0b2831a4593b4d1d8faa5dc6b2b14552a57bc3a5abc0bb166ac7a829cd7
                                          • Instruction Fuzzy Hash: B1D08CB0A1071ADFD7208B39DC28B42B2D4AF00B40B10C839D481C2150D77CE480C618
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 007AEE3D
                                          • Process32FirstW.KERNEL32(00000000,?), ref: 007AEE4B
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                          • Process32NextW.KERNEL32(00000000,?), ref: 007AEF0B
                                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 007AEF1A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                          • String ID:
                                          • API String ID: 2576544623-0
                                          • Opcode ID: ef1791ad477893948d6f7279ea4d2213c92b0137e92069a602423bbfd7bb306b
                                          • Instruction ID: 55ad41128bdfa8762ee6e69292cc9f47a7223efdc827c83e894785edc3adc573
                                          • Opcode Fuzzy Hash: ef1791ad477893948d6f7279ea4d2213c92b0137e92069a602423bbfd7bb306b
                                          • Instruction Fuzzy Hash: E251A171508314EFE320EF24DC85E6BB7E8EF89710F00492DF595972A2EB74A904CB92
                                          APIs
                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0078E628
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: lstrlen
                                          • String ID: ($|
                                          • API String ID: 1659193697-1631851259
                                          • Opcode ID: 2a14ce0c474bb8d5ff91996132e502872468de83005b12c9f3a65bf86293ed81
                                          • Instruction ID: a148265e8b3811faa3cb98f2d068a9bf6ac7fdece5c279df54cba16004ea3a07
                                          • Opcode Fuzzy Hash: 2a14ce0c474bb8d5ff91996132e502872468de83005b12c9f3a65bf86293ed81
                                          • Instruction Fuzzy Hash: 95321375A407059FDB28DF19C481AAAB7F0FF48320B15C56EE89ADB3A1E774E941CB40
                                          APIs
                                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,007A180A,00000000), ref: 007A23E1
                                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 007A2418
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Internet$AvailableDataFileQueryRead
                                          • String ID:
                                          • API String ID: 599397726-0
                                          • Opcode ID: aff0c6108e932dd12433c618950e46ad33d76ad15653bc9d1003acee998e2c6f
                                          • Instruction ID: 837c3e720b39d5074ea4333a70ee20e5b7c5695f9416ef14eecf203aa2497a08
                                          • Opcode Fuzzy Hash: aff0c6108e932dd12433c618950e46ad33d76ad15653bc9d1003acee998e2c6f
                                          • Instruction Fuzzy Hash: 25412871504209FFEF10DE99DC85FBB77BCEB86314F10416EFA01A6142DA7D9E429650
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0079B343
                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0079B39D
                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0079B3EA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DiskFreeSpace
                                          • String ID:
                                          • API String ID: 1682464887-0
                                          • Opcode ID: a7442b24b454e0056c7745f7bc33e79b570dde52befb90fc7b0e53fba2310127
                                          • Instruction ID: 41b3675f39e969bd41d7d40a0cef27f0c6ba1edf5a0166d01b4f31e12e2d86bb
                                          • Opcode Fuzzy Hash: a7442b24b454e0056c7745f7bc33e79b570dde52befb90fc7b0e53fba2310127
                                          • Instruction Fuzzy Hash: AA215E35A00108EFDB00EFA5E885EEDBBB8FF49310F1480A9E905AB351CB35A915CB55
                                          APIs
                                            • Part of subcall function 00750DB6: std::exception::exception.LIBCMT ref: 00750DEC
                                            • Part of subcall function 00750DB6: __CxxThrowException@8.LIBCMT ref: 00750E01
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0078882B
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00788858
                                          • GetLastError.KERNEL32 ref: 00788865
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                          • String ID:
                                          • API String ID: 1922334811-0
                                          • Opcode ID: 96cdcd5e80f002f1c1a155091f33030ee0d48352f3450e11db68f33a77324d1b
                                          • Instruction ID: cbfca0b8a947ade2b2a64299f7b6d83b0f7a9fa93f1f0d2c70622c22edcd70cf
                                          • Opcode Fuzzy Hash: 96cdcd5e80f002f1c1a155091f33030ee0d48352f3450e11db68f33a77324d1b
                                          • Instruction Fuzzy Hash: 1E11BFB2514305AFE718EFA4DC85D6BB7F8EB04711B60862EF45593211EB74BC008B60
                                          APIs
                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00788774
                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0078878B
                                          • FreeSid.ADVAPI32(?), ref: 0078879B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                          • String ID:
                                          • API String ID: 3429775523-0
                                          • Opcode ID: 5ff3722d45f094f2b74436ab960ff82df198831647c8c78a931af2829d5ff410
                                          • Instruction ID: b788b78f6bd5a1ff81445e25c26c76b085d4bc6e68778acb0aea473c0d1c5492
                                          • Opcode Fuzzy Hash: 5ff3722d45f094f2b74436ab960ff82df198831647c8c78a931af2829d5ff410
                                          • Instruction Fuzzy Hash: 90F04975A5130CBFDF00EFF4DC89EAEBBBCEF08601F5085A9E901E2191E6756A048B54
                                          APIs
                                          • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00794CB3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: mouse_event
                                          • String ID: DOWN
                                          • API String ID: 2434400541-711622031
                                          • Opcode ID: 76e51fd45270f5ef5ad030bd6af25ae9a0986b5543ad51ac3658379cf16cc577
                                          • Instruction ID: 8a455139d15bc493042cbd227f7cfc396504cec45ed85ef412b6cb471e2c24ba
                                          • Opcode Fuzzy Hash: 76e51fd45270f5ef5ad030bd6af25ae9a0986b5543ad51ac3658379cf16cc577
                                          • Instruction Fuzzy Hash: F3E08C7219E7213CBD042919BC0BEF7038C8B17732B500206FC10E50C2ED8C2C8764B8
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?), ref: 0079C6FB
                                          • FindClose.KERNEL32(00000000), ref: 0079C72B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileFirst
                                          • String ID:
                                          • API String ID: 2295610775-0
                                          • Opcode ID: a0722f80d8043763773c0f82edf13d904e2942529467786f95939c2a3b6b5e74
                                          • Instruction ID: cc4011fe42fde1306c72aedbd8c95e1b75b70aa55676c3a5077ad5eb43e3e751
                                          • Opcode Fuzzy Hash: a0722f80d8043763773c0f82edf13d904e2942529467786f95939c2a3b6b5e74
                                          • Instruction Fuzzy Hash: 6411A1726002009FDB10EF29D889A6AF7E9FF85320F00861DF9A9C7291DB74AC01CF81
                                          APIs
                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,007A9468,?,007BFB84,?), ref: 0079A097
                                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,007A9468,?,007BFB84,?), ref: 0079A0A9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorFormatLastMessage
                                          • String ID:
                                          • API String ID: 3479602957-0
                                          • Opcode ID: effc9300582ddb4ecd670fc48ca3847c08e444c92bcb464ede337510ed2075e6
                                          • Instruction ID: 0fade32a1c2722dac27d4cb4d68489008869c276f908ccd9687527339e62020b
                                          • Opcode Fuzzy Hash: effc9300582ddb4ecd670fc48ca3847c08e444c92bcb464ede337510ed2075e6
                                          • Instruction Fuzzy Hash: A2F0823510522DBBDB21AFA8DC4CFEA776CBF08761F008265F909D7181D6349944CBE1
                                          APIs
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00788309), ref: 007881E0
                                          • CloseHandle.KERNEL32(?,?,00788309), ref: 007881F2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AdjustCloseHandlePrivilegesToken
                                          • String ID:
                                          • API String ID: 81990902-0
                                          • Opcode ID: 9a5a3da1064ff08a1fef9e3383f97e49ac8841a65f2820b8969309135e60da8c
                                          • Instruction ID: 85a5da2e23c94b2a1c41a96c573ca20bab099324349c59c282979dc70b1de24e
                                          • Opcode Fuzzy Hash: 9a5a3da1064ff08a1fef9e3383f97e49ac8841a65f2820b8969309135e60da8c
                                          • Instruction Fuzzy Hash: 6CE0EC72010611EFE7253B74EC09EB77BEAEF04311724C92DF8A684470DB66AC91DB54
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00758D57,?,?,?,00000001), ref: 0075A15A
                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0075A163
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: eda1d0809941c7a52235831e9a209927083fb1ce432bcf344ade53782394d206
                                          • Instruction ID: c79a09ea4873e3d384f3035ce4eb85ea600843cbebf55fd9bea24fb691b523eb
                                          • Opcode Fuzzy Hash: eda1d0809941c7a52235831e9a209927083fb1ce432bcf344ade53782394d206
                                          • Instruction Fuzzy Hash: 24B09231054208ABCA002B91EC09F883FA8EB44EA2F40C120F60E86060CB6654508A99
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9d838e02ae2c1b421526942a75e9a8bdf703a6af4e896f9fd2e2627cc66560ff
                                          • Instruction ID: c3cf2bfbfc6995c05de46902f919100520e3490413310a694c869a7bb718fc3a
                                          • Opcode Fuzzy Hash: 9d838e02ae2c1b421526942a75e9a8bdf703a6af4e896f9fd2e2627cc66560ff
                                          • Instruction Fuzzy Hash: BE32F061D29F414DD7279A34C832326A349AFB73C5F15D73BEC1AB59A6EF2C98838104
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 35315e05ed32673dabd4031bca82af3e9fd4d280a511298af042ecac552b3334
                                          • Instruction ID: 8b501f4f82efa0d4231cfa73963f7ab3e761ff4c07ac52592fe171f65d9dfb86
                                          • Opcode Fuzzy Hash: 35315e05ed32673dabd4031bca82af3e9fd4d280a511298af042ecac552b3334
                                          • Instruction Fuzzy Hash: BDB1F120D2AF854DD32396398835336BB5CAFBB2CAF51D71BFC2670D22EB2985834145
                                          APIs
                                          • __time64.LIBCMT ref: 0079889B
                                            • Part of subcall function 0075520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00798F6E,00000000,?,?,?,?,0079911F,00000000,?), ref: 00755213
                                            • Part of subcall function 0075520A: __aulldiv.LIBCMT ref: 00755233
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Time$FileSystem__aulldiv__time64
                                          • String ID:
                                          • API String ID: 2893107130-0
                                          • Opcode ID: 9d794261135c17e5d72c008cf909c06f5fb28c608b8e0e7ec411563a08b07f05
                                          • Instruction ID: d06449c92d12783cc69b21b7b357154d8f7e157135947fdb62032e886e6c5cf4
                                          • Opcode Fuzzy Hash: 9d794261135c17e5d72c008cf909c06f5fb28c608b8e0e7ec411563a08b07f05
                                          • Instruction Fuzzy Hash: 6B21B472635510CBC729CF25D841A62B3E1EFA5311B688E6CD1F5CF2D0CA78B905CB54
                                          APIs
                                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00788389), ref: 007887D1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: LogonUser
                                          • String ID:
                                          • API String ID: 1244722697-0
                                          • Opcode ID: 272fcdbcb9f44b570fbaf3e6310251950ce9b5895d34a0aba746a4db042fb093
                                          • Instruction ID: b96c463106a268822caf3d28d23ad4e6c9a69a122c92d166ee039201768ef986
                                          • Opcode Fuzzy Hash: 272fcdbcb9f44b570fbaf3e6310251950ce9b5895d34a0aba746a4db042fb093
                                          • Instruction Fuzzy Hash: C1D05E3226050EABEF019EA4DC02EAE3B69EB04B01F408111FE15C50A1C775D835AB60
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0075A12A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: fc83450ad8e4b9ad6e8f8c2c539a091694dcd79032cfed2ec480597bf7ff47e0
                                          • Instruction ID: 77eb02f5768379fd3b641c61d9c8ac366e738e6eb60ff829c90bbfe50c446bc3
                                          • Opcode Fuzzy Hash: fc83450ad8e4b9ad6e8f8c2c539a091694dcd79032cfed2ec480597bf7ff47e0
                                          • Instruction Fuzzy Hash: 5FA0113000020CAB8A002B82EC08888BFACEA00AA0B00C020F80E820228B32A8208A88
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eb383fae0df335f7f113c2508b543408ae9f6c9f3a322935bc3fce7e4050bea4
                                          • Instruction ID: 4b113dd6449ef9956be9d86c99567850c2febfc610cd0e539264b83b254b9ee2
                                          • Opcode Fuzzy Hash: eb383fae0df335f7f113c2508b543408ae9f6c9f3a322935bc3fce7e4050bea4
                                          • Instruction Fuzzy Hash: 2B223530A0494ECBDF789A24C89477D77A1FF02344F28856BD9528B592EBBCAD91C743
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                          • Instruction ID: 411935b401c489fa27d053f8b60e053b7080a24d185eef5df3b248a6ff2b269a
                                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                          • Instruction Fuzzy Hash: 14C1A5322051930AEF2D463984341BEBAA15EA37B375A075DDCB3CB4D5FE58C92ED620
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                          • Instruction ID: 52805f53d9fcf556706d94e1eba2546e59bd8258c84cddb46b4acabc357376fd
                                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                          • Instruction Fuzzy Hash: E4C1E63220519309EF2D4639C4341BEBAA15EA37B331A076DDCB2DB5C5EE58D92DD620
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                          • Instruction ID: c6051f23a7851f7c86e8bde8751141637ae8447236834a312f5a74845d5c1a35
                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                          • Instruction Fuzzy Hash: 9FC1853230519309EF2D463984742BEBBA15EA27B335A075DDCB3CB5C4EE58C96DD620
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1334462787.0000000001535000.00000040.00000020.00020000.00000000.sdmp, Offset: 01535000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1535000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                          • Instruction ID: 6d5955a263932406c96ecbcbfe7b74a13cc313b940347a5e6b691fc1ce1729a0
                                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                          • Instruction Fuzzy Hash: 8041D5B1D1051CDBCF48CFADC991AEEBBF1AF88201F548299D516AB345D730AB41DB40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1334462787.0000000001535000.00000040.00000020.00020000.00000000.sdmp, Offset: 01535000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1535000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                          • Instruction ID: fdd1e9a1966b4e44708b24ff3b9abf6567acd6a21c6638eee1aee9a2186f1892
                                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                          • Instruction Fuzzy Hash: 7D019278A00109EFCB44DF98C5909AEF7F5FB88314F208599E819AB305D730AE41DB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1334462787.0000000001535000.00000040.00000020.00020000.00000000.sdmp, Offset: 01535000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1535000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                          • Instruction ID: 336ea922623dd1dd0d2a81be692770aa2ddccc0155c5042fbd7082c35331f439
                                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                          • Instruction Fuzzy Hash: 9601D2B8A05209EFCB44DF98C5809AEF7F5FB88310F208599E809AB705D730AE41CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1334462787.0000000001535000.00000040.00000020.00020000.00000000.sdmp, Offset: 01535000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_1535000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                          APIs
                                          • DeleteObject.GDI32(00000000), ref: 007A785B
                                          • DeleteObject.GDI32(00000000), ref: 007A786D
                                          • DestroyWindow.USER32 ref: 007A787B
                                          • GetDesktopWindow.USER32 ref: 007A7895
                                          • GetWindowRect.USER32(00000000), ref: 007A789C
                                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 007A79DD
                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 007A79ED
                                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007A7A35
                                          • GetClientRect.USER32(00000000,?), ref: 007A7A41
                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 007A7A7B
                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007A7A9D
                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007A7AB0
                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007A7ABB
                                          • GlobalLock.KERNEL32(00000000), ref: 007A7AC4
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007A7AD3
                                          • GlobalUnlock.KERNEL32(00000000), ref: 007A7ADC
                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007A7AE3
                                          • GlobalFree.KERNEL32(00000000), ref: 007A7AEE
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007A7B00
                                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,007C2CAC,00000000), ref: 007A7B16
                                          • GlobalFree.KERNEL32(00000000), ref: 007A7B26
                                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 007A7B4C
                                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 007A7B6B
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007A7B8D
                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 007A7D7A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                          • String ID: $AutoIt v3$DISPLAY$static
                                          • API String ID: 2211948467-2373415609
                                          • Opcode ID: 178e87ebbf7d531c3ead5e653ecb53a3ff3aa6bd4199d88a8ce7f5e29df058ba
                                          • Instruction ID: 3b69c0124a42c8dbbb7ee150c1163557a499c2e971f725a8d8915db9b6af80b6
                                          • Opcode Fuzzy Hash: 178e87ebbf7d531c3ead5e653ecb53a3ff3aa6bd4199d88a8ce7f5e29df058ba
                                          • Instruction Fuzzy Hash: 0F028371A00115EFDB14DFA8DC89EAE7BB9FF49710F108259F905AB2A1C778AD01CB64
                                          APIs
                                          • CharUpperBuffW.USER32(?,?,007BF910), ref: 007B3627
                                          • IsWindowVisible.USER32(?), ref: 007B364B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: BuffCharUpperVisibleWindow
                                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                          • API String ID: 4105515805-45149045
                                          • Opcode ID: 9cd1e83bc7a72e34246c239e70dab553b8802b4c86b1192e7e64c043abaa2a87
                                          • Instruction ID: c305e6746f94890ec0b51337e21c6b4b3e330e5fbfe09f228f645649191320ed
                                          • Opcode Fuzzy Hash: 9cd1e83bc7a72e34246c239e70dab553b8802b4c86b1192e7e64c043abaa2a87
                                          • Instruction Fuzzy Hash: B7D19371204301DBCB14EF10C459BAEB7A1AF95344F148468FD855B3A3DB79EE4ACB91
                                          APIs
                                          • SetTextColor.GDI32(?,00000000), ref: 007BA630
                                          • GetSysColorBrush.USER32(0000000F), ref: 007BA661
                                          • GetSysColor.USER32(0000000F), ref: 007BA66D
                                          • SetBkColor.GDI32(?,000000FF), ref: 007BA687
                                          • SelectObject.GDI32(?,00000000), ref: 007BA696
                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 007BA6C1
                                          • GetSysColor.USER32(00000010), ref: 007BA6C9
                                          • CreateSolidBrush.GDI32(00000000), ref: 007BA6D0
                                          • FrameRect.USER32(?,?,00000000), ref: 007BA6DF
                                          • DeleteObject.GDI32(00000000), ref: 007BA6E6
                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 007BA731
                                          • FillRect.USER32(?,?,00000000), ref: 007BA763
                                          • GetWindowLongW.USER32(?,000000F0), ref: 007BA78E
                                            • Part of subcall function 007BA8CA: GetSysColor.USER32(00000012), ref: 007BA903
                                            • Part of subcall function 007BA8CA: SetTextColor.GDI32(?,?), ref: 007BA907
                                            • Part of subcall function 007BA8CA: GetSysColorBrush.USER32(0000000F), ref: 007BA91D
                                            • Part of subcall function 007BA8CA: GetSysColor.USER32(0000000F), ref: 007BA928
                                            • Part of subcall function 007BA8CA: GetSysColor.USER32(00000011), ref: 007BA945
                                            • Part of subcall function 007BA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 007BA953
                                            • Part of subcall function 007BA8CA: SelectObject.GDI32(?,00000000), ref: 007BA964
                                            • Part of subcall function 007BA8CA: SetBkColor.GDI32(?,00000000), ref: 007BA96D
                                            • Part of subcall function 007BA8CA: SelectObject.GDI32(?,?), ref: 007BA97A
                                            • Part of subcall function 007BA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 007BA999
                                            • Part of subcall function 007BA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007BA9B0
                                            • Part of subcall function 007BA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 007BA9C5
                                            • Part of subcall function 007BA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007BA9ED
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                          • String ID:
                                          • API String ID: 3521893082-0
                                          • Opcode ID: f40b98435b53740e4a87785b1a8d9ec08355193cab8c3cf1574c39ca0f15654a
                                          • Instruction ID: d3f31198478e4f5f8f5105062ba43e3e92b502460951de084ec2e07c2d43721c
                                          • Opcode Fuzzy Hash: f40b98435b53740e4a87785b1a8d9ec08355193cab8c3cf1574c39ca0f15654a
                                          • Instruction Fuzzy Hash: 62915972408305FFC711AF64DC08F9A7BA9FF88721F108B29F962961A0DB79D9448B56
                                          APIs
                                          • DestroyWindow.USER32(?,?,?), ref: 00732CA2
                                          • DeleteObject.GDI32(00000000), ref: 00732CE8
                                          • DeleteObject.GDI32(00000000), ref: 00732CF3
                                          • DestroyIcon.USER32(00000000,?,?,?), ref: 00732CFE
                                          • DestroyWindow.USER32(00000000,?,?,?), ref: 00732D09
                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 0076C43B
                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0076C474
                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0076C89D
                                            • Part of subcall function 00731B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00732036,?,00000000,?,?,?,?,007316CB,00000000,?), ref: 00731B9A
                                          • SendMessageW.USER32(?,00001053), ref: 0076C8DA
                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0076C8F1
                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0076C907
                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0076C912
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                          • String ID: 0
                                          • API String ID: 464785882-4108050209
                                          • Opcode ID: d2a0d00db23a34bfc52b5f4fad333dc5fd571676f5917e9f6eb87789c0755f45
                                          • Instruction ID: ba0060c6ca58629247eed290b82dd12354f160cfd88a423792e215c37a7d7ea2
                                          • Opcode Fuzzy Hash: d2a0d00db23a34bfc52b5f4fad333dc5fd571676f5917e9f6eb87789c0755f45
                                          • Instruction Fuzzy Hash: 69127030604201EFDB26CF24C888BB9B7E5BF45310F548569E996DB663C739EC52CBA1
                                          APIs
                                          • DestroyWindow.USER32(00000000), ref: 007A74DE
                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 007A759D
                                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 007A75DB
                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 007A75ED
                                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 007A7633
                                          • GetClientRect.USER32(00000000,?), ref: 007A763F
                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 007A7683
                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 007A7692
                                          • GetStockObject.GDI32(00000011), ref: 007A76A2
                                          • SelectObject.GDI32(00000000,00000000), ref: 007A76A6
                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 007A76B6
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007A76BF
                                          • DeleteDC.GDI32(00000000), ref: 007A76C8
                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007A76F4
                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 007A770B
                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 007A7746
                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 007A775A
                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 007A776B
                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 007A779B
                                          • GetStockObject.GDI32(00000011), ref: 007A77A6
                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 007A77B1
                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 007A77BB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                          • API String ID: 2910397461-517079104
                                          • Opcode ID: a63300465e235c4751fc20e280504fc617bb186c9acaf79905bb6ce8c2a8f09b
                                          • Instruction ID: 136239ce0b304dfea54c11c2a672c094c9105553adf61f79f3e3b50cbb505f81
                                          • Opcode Fuzzy Hash: a63300465e235c4751fc20e280504fc617bb186c9acaf79905bb6ce8c2a8f09b
                                          • Instruction Fuzzy Hash: D6A166B1A40615BFEB14DF68DC4AFAE7B79EB45710F008214FA15A72E1D778AD00CB64
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0079AD1E
                                          • GetDriveTypeW.KERNEL32(?,007BFAC0,?,\\.\,007BF910), ref: 0079ADFB
                                          • SetErrorMode.KERNEL32(00000000,007BFAC0,?,\\.\,007BF910), ref: 0079AF59
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorMode$DriveType
                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                          • API String ID: 2907320926-4222207086
                                          • Opcode ID: 9022fae61b7ea719e7de6c1860b25e8d649663da67adf69929dc909c729821b8
                                          • Instruction ID: 30cfdce953f09387c9904297c74d9f08c4ded57536a49fae3cbd99d71736b39c
                                          • Opcode Fuzzy Hash: 9022fae61b7ea719e7de6c1860b25e8d649663da67adf69929dc909c729821b8
                                          • Instruction Fuzzy Hash: AC51A2F0646249FBCF54DB15E986CBD73A2EB4C700B208066E80BA7691DA7DDD41DB83
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __wcsnicmp
                                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                          • API String ID: 1038674560-86951937
                                          • Opcode ID: a5298590ae7cd10187bac1c84ef24bae6af68f6671defa7e408542fec3658859
                                          • Instruction ID: d7eb3c350c9aadfa087d43b2646035193f901693ab36674d055935a5490e1af1
                                          • Opcode Fuzzy Hash: a5298590ae7cd10187bac1c84ef24bae6af68f6671defa7e408542fec3658859
                                          • Instruction Fuzzy Hash: 8A81E8F0640205FAEB21AA61DC86FEF3768AF05750F048029FD056B197EBADDE45C6A1
                                          APIs
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 007B9AD2
                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 007B9B8B
                                          • SendMessageW.USER32(?,00001102,00000002,?), ref: 007B9BA7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window
                                          • String ID: 0
                                          • API String ID: 2326795674-4108050209
                                          • Opcode ID: ef668a74e59adc9bd82df6fecfec980ab6807139d9d7c53747951d90be5d28c4
                                          • Instruction ID: 8c2f9b4f29c11545fc68879086a8d0fe7ad7ae0c0c17bded484a69f41b3052d9
                                          • Opcode Fuzzy Hash: ef668a74e59adc9bd82df6fecfec980ab6807139d9d7c53747951d90be5d28c4
                                          • Instruction Fuzzy Hash: FD02AC31108201AFD725CF24C849FEABBE5FF49714F04862DFBA5962A1D778D944CB52
                                          APIs
                                          • GetSysColor.USER32(00000012), ref: 007BA903
                                          • SetTextColor.GDI32(?,?), ref: 007BA907
                                          • GetSysColorBrush.USER32(0000000F), ref: 007BA91D
                                          • GetSysColor.USER32(0000000F), ref: 007BA928
                                          • CreateSolidBrush.GDI32(?), ref: 007BA92D
                                          • GetSysColor.USER32(00000011), ref: 007BA945
                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 007BA953
                                          • SelectObject.GDI32(?,00000000), ref: 007BA964
                                          • SetBkColor.GDI32(?,00000000), ref: 007BA96D
                                          • SelectObject.GDI32(?,?), ref: 007BA97A
                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 007BA999
                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007BA9B0
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 007BA9C5
                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 007BA9ED
                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 007BAA14
                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 007BAA32
                                          • DrawFocusRect.USER32(?,?), ref: 007BAA3D
                                          • GetSysColor.USER32(00000011), ref: 007BAA4B
                                          • SetTextColor.GDI32(?,00000000), ref: 007BAA53
                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 007BAA67
                                          • SelectObject.GDI32(?,007BA5FA), ref: 007BAA7E
                                          • DeleteObject.GDI32(?), ref: 007BAA89
                                          • SelectObject.GDI32(?,?), ref: 007BAA8F
                                          • DeleteObject.GDI32(?), ref: 007BAA94
                                          • SetTextColor.GDI32(?,?), ref: 007BAA9A
                                          • SetBkColor.GDI32(?,?), ref: 007BAAA4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                          • String ID:
                                          • API String ID: 1996641542-0
                                          • Opcode ID: 0ed2b89f27714ac4afcc2f06a75565d1c112812832d0cd6ec2fae54df6d9e047
                                          • Instruction ID: 265e12ba4c391a931a5e06c15cf4688513a7d5b40a5bdf5be3ae626648b056d1
                                          • Opcode Fuzzy Hash: 0ed2b89f27714ac4afcc2f06a75565d1c112812832d0cd6ec2fae54df6d9e047
                                          • Instruction Fuzzy Hash: D1510C71900208FFDB11AFA8DC48FEE7B79EF48720F118625F911AB2A1D6799940DF94
                                          APIs
                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 007B8AC1
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007B8AD2
                                          • CharNextW.USER32(0000014E), ref: 007B8B01
                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 007B8B42
                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 007B8B58
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007B8B69
                                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 007B8B86
                                          • SetWindowTextW.USER32(?,0000014E), ref: 007B8BD8
                                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 007B8BEE
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 007B8C1F
                                          • _memset.LIBCMT ref: 007B8C44
                                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 007B8C8D
                                          • _memset.LIBCMT ref: 007B8CEC
                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 007B8D16
                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 007B8D6E
                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 007B8E1B
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 007B8E3D
                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007B8E87
                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007B8EB4
                                          • DrawMenuBar.USER32(?), ref: 007B8EC3
                                          • SetWindowTextW.USER32(?,0000014E), ref: 007B8EEB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                          • String ID: 0
                                          • API String ID: 1073566785-4108050209
                                          • Opcode ID: 9076a60c9a256f2fab79ae3cfabdf269bf37fc4741f344492b3fd65f50df3414
                                          • Instruction ID: 3a23cd276b796268b7d4e11e54cf02a9a05561787a8aba5e894421d3fc7687fc
                                          • Opcode Fuzzy Hash: 9076a60c9a256f2fab79ae3cfabdf269bf37fc4741f344492b3fd65f50df3414
                                          • Instruction Fuzzy Hash: 12E17F70900208EFDB609F64CC88FEE7B7DEF09710F14815AF925AA291DB788985DF61
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 007B49CA
                                          • GetDesktopWindow.USER32 ref: 007B49DF
                                          • GetWindowRect.USER32(00000000), ref: 007B49E6
                                          • GetWindowLongW.USER32(?,000000F0), ref: 007B4A48
                                          • DestroyWindow.USER32(?), ref: 007B4A74
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007B4A9D
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007B4ABB
                                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 007B4AE1
                                          • SendMessageW.USER32(?,00000421,?,?), ref: 007B4AF6
                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 007B4B09
                                          • IsWindowVisible.USER32(?), ref: 007B4B29
                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 007B4B44
                                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 007B4B58
                                          • GetWindowRect.USER32(?,?), ref: 007B4B70
                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 007B4B96
                                          • GetMonitorInfoW.USER32(00000000,?), ref: 007B4BB0
                                          • CopyRect.USER32(?,?), ref: 007B4BC7
                                          • SendMessageW.USER32(?,00000412,00000000), ref: 007B4C32
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                          • String ID: ($0$tooltips_class32
                                          • API String ID: 698492251-4156429822
                                          • Opcode ID: c836350f304ad7b428d8f5ce88572c8e1abc92c02f8c84909a8585e8643dd860
                                          • Instruction ID: 4e3fb791aecd1b3aa549d0eeac36456a7440df2ee0de87c1adacdc9bdd12f8ec
                                          • Opcode Fuzzy Hash: c836350f304ad7b428d8f5ce88572c8e1abc92c02f8c84909a8585e8643dd860
                                          • Instruction Fuzzy Hash: D0B16C71604340AFDB04DF64C888BAABBE4BF88714F008A1DF9999B292D779EC05CB55
                                          APIs
                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 007944AC
                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 007944D2
                                          • _wcscpy.LIBCMT ref: 00794500
                                          • _wcscmp.LIBCMT ref: 0079450B
                                          • _wcscat.LIBCMT ref: 00794521
                                          • _wcsstr.LIBCMT ref: 0079452C
                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00794548
                                          • _wcscat.LIBCMT ref: 00794591
                                          • _wcscat.LIBCMT ref: 00794598
                                          • _wcsncpy.LIBCMT ref: 007945C3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                          • API String ID: 699586101-1459072770
                                          • Opcode ID: 229f5fd34e188ee65ba79b0f2c5330b31e9448ada74fdcdf1da4dac8203de139
                                          • Instruction ID: d7c8e708865088b60f3b3f1cbba851187741347433fecf5e2b8d403ba840779d
                                          • Opcode Fuzzy Hash: 229f5fd34e188ee65ba79b0f2c5330b31e9448ada74fdcdf1da4dac8203de139
                                          • Instruction Fuzzy Hash: B741E572A00201BBEB14AB749C0BEFF777CDF46711F104069FD04A6182EE7D9A1696A9
                                          APIs
                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007328BC
                                          • GetSystemMetrics.USER32(00000007), ref: 007328C4
                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007328EF
                                          • GetSystemMetrics.USER32(00000008), ref: 007328F7
                                          • GetSystemMetrics.USER32(00000004), ref: 0073291C
                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00732939
                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00732949
                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0073297C
                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00732990
                                          • GetClientRect.USER32(00000000,000000FF), ref: 007329AE
                                          • GetStockObject.GDI32(00000011), ref: 007329CA
                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 007329D5
                                            • Part of subcall function 00732344: GetCursorPos.USER32(?), ref: 00732357
                                            • Part of subcall function 00732344: ScreenToClient.USER32(007F57B0,?), ref: 00732374
                                            • Part of subcall function 00732344: GetAsyncKeyState.USER32(00000001), ref: 00732399
                                            • Part of subcall function 00732344: GetAsyncKeyState.USER32(00000002), ref: 007323A7
                                          • SetTimer.USER32(00000000,00000000,00000028,00731256), ref: 007329FC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                          • String ID: AutoIt v3 GUI
                                          • API String ID: 1458621304-248962490
                                          • Opcode ID: 24df496561ad4771606ad38713a3d9f9103aad443357db0b3b2258c23428ec85
                                          • Instruction ID: 5d4aaa84ee58a1efe30f692630645795e19faed292fa1149d97e2548378d45dc
                                          • Opcode Fuzzy Hash: 24df496561ad4771606ad38713a3d9f9103aad443357db0b3b2258c23428ec85
                                          • Instruction Fuzzy Hash: 69B15F7160020AEFEB15DFA8DC45BED7BB4FB08710F108229FA15A7291DB78A851CB54
                                          APIs
                                          • GetClassNameW.USER32(?,?,00000100), ref: 0078A47A
                                          • __swprintf.LIBCMT ref: 0078A51B
                                          • _wcscmp.LIBCMT ref: 0078A52E
                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0078A583
                                          • _wcscmp.LIBCMT ref: 0078A5BF
                                          • GetClassNameW.USER32(?,?,00000400), ref: 0078A5F6
                                          • GetDlgCtrlID.USER32(?), ref: 0078A648
                                          • GetWindowRect.USER32(?,?), ref: 0078A67E
                                          • GetParent.USER32(?), ref: 0078A69C
                                          • ScreenToClient.USER32(00000000), ref: 0078A6A3
                                          • GetClassNameW.USER32(?,?,00000100), ref: 0078A71D
                                          • _wcscmp.LIBCMT ref: 0078A731
                                          • GetWindowTextW.USER32(?,?,00000400), ref: 0078A757
                                          • _wcscmp.LIBCMT ref: 0078A76B
                                            • Part of subcall function 0075362C: _iswctype.LIBCMT ref: 00753634
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                          • String ID: %s%u
                                          • API String ID: 3744389584-679674701
                                          • Opcode ID: 81f39d9108e7f4f3185da9cb2e7f088ee30803a28657a1eec95b374688b10dee
                                          • Instruction ID: 60591a8fec6c06175e701249c13f7ef58d2b622f494209e3bc475f055fbb396c
                                          • Opcode Fuzzy Hash: 81f39d9108e7f4f3185da9cb2e7f088ee30803a28657a1eec95b374688b10dee
                                          • Instruction Fuzzy Hash: C6A1B371244206FFE714EF64C888FAAB7E8FF44355F10862AF999C2150D738E955CB92
                                          APIs
                                          • GetClassNameW.USER32(00000008,?,00000400), ref: 0078AF18
                                          • _wcscmp.LIBCMT ref: 0078AF29
                                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 0078AF51
                                          • CharUpperBuffW.USER32(?,00000000), ref: 0078AF6E
                                          • _wcscmp.LIBCMT ref: 0078AF8C
                                          • _wcsstr.LIBCMT ref: 0078AF9D
                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 0078AFD5
                                          • _wcscmp.LIBCMT ref: 0078AFE5
                                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 0078B00C
                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 0078B055
                                          • _wcscmp.LIBCMT ref: 0078B065
                                          • GetClassNameW.USER32(00000010,?,00000400), ref: 0078B08D
                                          • GetWindowRect.USER32(00000004,?), ref: 0078B0F6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                          • String ID: @$ThumbnailClass
                                          • API String ID: 1788623398-1539354611
                                          • Opcode ID: e232edf851395b30ca99f295de0a0d5168269649d7fce1790c65d19e5297597f
                                          • Instruction ID: 833094549b5c905ebbe9195aa930e4862e6eacfb31ababf99086bc0193ae0f08
                                          • Opcode Fuzzy Hash: e232edf851395b30ca99f295de0a0d5168269649d7fce1790c65d19e5297597f
                                          • Instruction Fuzzy Hash: ED81C371148309EFEB05EF14C889FAA77D8EF44714F04856AFD858A0A6DB38DD49CB61
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __wcsnicmp
                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                          • API String ID: 1038674560-1810252412
                                          • Opcode ID: 651fdd9a86d7b27211450bffffae492347d0d57299a7f75c3b543fe53a588b9c
                                          • Instruction ID: 91f1138abfe7fcf343256242991d47a40934689ff645fa37a9869a51099e48c0
                                          • Opcode Fuzzy Hash: 651fdd9a86d7b27211450bffffae492347d0d57299a7f75c3b543fe53a588b9c
                                          • Instruction Fuzzy Hash: 2C31C4B0A88249F6EA18FA55DD4BEEE77A49F14711F60442AF801710D2EF5D6F04C762
                                          APIs
                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 007A5013
                                          • LoadCursorW.USER32(00000000,00007F00), ref: 007A501E
                                          • LoadCursorW.USER32(00000000,00007F03), ref: 007A5029
                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 007A5034
                                          • LoadCursorW.USER32(00000000,00007F01), ref: 007A503F
                                          • LoadCursorW.USER32(00000000,00007F81), ref: 007A504A
                                          • LoadCursorW.USER32(00000000,00007F88), ref: 007A5055
                                          • LoadCursorW.USER32(00000000,00007F80), ref: 007A5060
                                          • LoadCursorW.USER32(00000000,00007F86), ref: 007A506B
                                          • LoadCursorW.USER32(00000000,00007F83), ref: 007A5076
                                          • LoadCursorW.USER32(00000000,00007F85), ref: 007A5081
                                          • LoadCursorW.USER32(00000000,00007F82), ref: 007A508C
                                          • LoadCursorW.USER32(00000000,00007F84), ref: 007A5097
                                          • LoadCursorW.USER32(00000000,00007F04), ref: 007A50A2
                                          • LoadCursorW.USER32(00000000,00007F02), ref: 007A50AD
                                          • LoadCursorW.USER32(00000000,00007F89), ref: 007A50B8
                                          • GetCursorInfo.USER32(?), ref: 007A50C8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Cursor$Load$Info
                                          • String ID:
                                          • API String ID: 2577412497-0
                                          • Opcode ID: 44174dbd19f46ef9a52183b3b704060dd245de8705445bad60a35b4fba4845ff
                                          • Instruction ID: 6b5aba5be1b31715feb70bff0bc4fd4c7bbd7422d2325e570333ded84753f7ce
                                          • Opcode Fuzzy Hash: 44174dbd19f46ef9a52183b3b704060dd245de8705445bad60a35b4fba4845ff
                                          • Instruction Fuzzy Hash: 3331E1B1D4831DAADB109FB68C899AFBFE8FB44750F50452AA50DE7281DA78A5008E91
                                          APIs
                                          • _memset.LIBCMT ref: 007BA259
                                          • DestroyWindow.USER32(?,?), ref: 007BA2D3
                                            • Part of subcall function 00737BCC: _memmove.LIBCMT ref: 00737C06
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 007BA34D
                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 007BA36F
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007BA382
                                          • DestroyWindow.USER32(00000000), ref: 007BA3A4
                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00730000,00000000), ref: 007BA3DB
                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 007BA3F4
                                          • GetDesktopWindow.USER32 ref: 007BA40D
                                          • GetWindowRect.USER32(00000000), ref: 007BA414
                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 007BA42C
                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 007BA444
                                            • Part of subcall function 007325DB: GetWindowLongW.USER32(?,000000EB), ref: 007325EC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                          • String ID: 0$tooltips_class32
                                          • API String ID: 1297703922-3619404913
                                          • Opcode ID: 88f0c009c3d5d3c3e55acb85c2a9311dd0fd96f49a2c868ed85e12b85ffe0060
                                          • Instruction ID: 0cf3ac3f19e52cc1b076abce9a89dc0e293ea98ecdbc3c6f731cf5dbd1beddc2
                                          • Opcode Fuzzy Hash: 88f0c009c3d5d3c3e55acb85c2a9311dd0fd96f49a2c868ed85e12b85ffe0060
                                          • Instruction Fuzzy Hash: C871CD70140645BFE725DF28CC49FAA7BE5FB88704F04852DF985872A1DBB8E902CB56
                                          APIs
                                            • Part of subcall function 00732612: GetWindowLongW.USER32(?,000000EB), ref: 00732623
                                          • DragQueryPoint.SHELL32(?,?), ref: 007BC627
                                            • Part of subcall function 007BAB37: ClientToScreen.USER32(?,?), ref: 007BAB60
                                            • Part of subcall function 007BAB37: GetWindowRect.USER32(?,?), ref: 007BABD6
                                            • Part of subcall function 007BAB37: PtInRect.USER32(?,?,007BC014), ref: 007BABE6
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 007BC690
                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 007BC69B
                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 007BC6BE
                                          • _wcscat.LIBCMT ref: 007BC6EE
                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 007BC705
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 007BC71E
                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 007BC735
                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 007BC757
                                          • DragFinish.SHELL32(?), ref: 007BC75E
                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 007BC851
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                          • API String ID: 169749273-3440237614
                                          • Opcode ID: d2668ffe42db3c9dde564e5a3f7e531230a49f6369a8b58671e52efd5996feac
                                          • Instruction ID: d7bc2ae29efa0ee93b6cc6e19ad464fc3e8a78448e9f04a37b3b05add6438e2b
                                          • Opcode Fuzzy Hash: d2668ffe42db3c9dde564e5a3f7e531230a49f6369a8b58671e52efd5996feac
                                          • Instruction Fuzzy Hash: D5617271108300EFD701EF64CC89EAFBBE8EF88710F00492EF695961A1DB74A909CB56
                                          APIs
                                          • CharUpperBuffW.USER32(?,?), ref: 007B4424
                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007B446F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: BuffCharMessageSendUpper
                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                          • API String ID: 3974292440-4258414348
                                          • Opcode ID: 046511abf9e829a23223180ffcd29772fae70ea924a1a9d54c0253d39f32aa26
                                          • Instruction ID: 68c9cffa9bc6a2d8aa5c6051b397dd37c30574eeb314422f1047dc4a77393d97
                                          • Opcode Fuzzy Hash: 046511abf9e829a23223180ffcd29772fae70ea924a1a9d54c0253d39f32aa26
                                          • Instruction Fuzzy Hash: BD918A71200700DFDB14EF24C895AAEB7A1AF95354F04886CF9965B3A3CB79ED09CB81
                                          APIs
                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 007BB8B4
                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,007B91C2), ref: 007BB910
                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007BB949
                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 007BB98C
                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 007BB9C3
                                          • FreeLibrary.KERNEL32(?), ref: 007BB9CF
                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 007BB9DF
                                          • DestroyIcon.USER32(?,?,?,?,?,007B91C2), ref: 007BB9EE
                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 007BBA0B
                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 007BBA17
                                            • Part of subcall function 00752EFD: __wcsicmp_l.LIBCMT ref: 00752F86
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                          • String ID: .dll$.exe$.icl
                                          • API String ID: 1212759294-1154884017
                                          • Opcode ID: fdc10b39941451c3386324d64e12d8379c9035a90c5abfd6e7a7557f6840e15b
                                          • Instruction ID: 6d92645aaf8838290a0f5d40fb64bcb75471f14ae9fb32df3c53e67e60a49baf
                                          • Opcode Fuzzy Hash: fdc10b39941451c3386324d64e12d8379c9035a90c5abfd6e7a7557f6840e15b
                                          • Instruction Fuzzy Hash: 8761DEB1900209FAEB14DF64CC45FFE7BA8EB08B11F108215FE15D61C1DBB8A981DBA0
                                          APIs
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                          • CharLowerBuffW.USER32(?,?), ref: 0079A3CB
                                          • GetDriveTypeW.KERNEL32 ref: 0079A418
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0079A460
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0079A497
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0079A4C5
                                            • Part of subcall function 00737BCC: _memmove.LIBCMT ref: 00737C06
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                          • API String ID: 2698844021-4113822522
                                          • Opcode ID: 707bec6b5834581bf8d05f5ea734f6594f2ca91a117ad857c6f70bd9967bcaaa
                                          • Instruction ID: 6bb4329f7ae1ec9a957c07a9bee6b45daaefb65a9dfd31dca64c19fe7817e4bb
                                          • Opcode Fuzzy Hash: 707bec6b5834581bf8d05f5ea734f6594f2ca91a117ad857c6f70bd9967bcaaa
                                          • Instruction Fuzzy Hash: 8C518CB1104345DFD744EF25C88596AB3F8EF88718F00886CF88A57262DB79ED09CB82
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0076E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0078F8DF
                                          • LoadStringW.USER32(00000000,?,0076E029,00000001), ref: 0078F8E8
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0076E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0078F90A
                                          • LoadStringW.USER32(00000000,?,0076E029,00000001), ref: 0078F90D
                                          • __swprintf.LIBCMT ref: 0078F95D
                                          • __swprintf.LIBCMT ref: 0078F96E
                                          • _wprintf.LIBCMT ref: 0078FA17
                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0078FA2E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                          • API String ID: 984253442-2268648507
                                          • Opcode ID: c3cf60569da33ed404e4c14c141d5d2edd7ab2bb507b37092423ed1a4f7dda22
                                          • Instruction ID: 71426e728e1eec44087ef4552f783d03c557cab803214cf3be6176882e6390a0
                                          • Opcode Fuzzy Hash: c3cf60569da33ed404e4c14c141d5d2edd7ab2bb507b37092423ed1a4f7dda22
                                          • Instruction Fuzzy Hash: 2A4120B290410DEADB19FBE0DD4AEEEB778AF18310F504465F505B6092EA396F09CB61
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,007B9207,?,?), ref: 007BBA56
                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,007B9207,?,?,00000000,?), ref: 007BBA6D
                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,007B9207,?,?,00000000,?), ref: 007BBA78
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,007B9207,?,?,00000000,?), ref: 007BBA85
                                          • GlobalLock.KERNEL32(00000000), ref: 007BBA8E
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,007B9207,?,?,00000000,?), ref: 007BBA9D
                                          • GlobalUnlock.KERNEL32(00000000), ref: 007BBAA6
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,007B9207,?,?,00000000,?), ref: 007BBAAD
                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,007B9207,?,?,00000000,?), ref: 007BBABE
                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,007C2CAC,?), ref: 007BBAD7
                                          • GlobalFree.KERNEL32(00000000), ref: 007BBAE7
                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 007BBB0B
                                          • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 007BBB36
                                          • DeleteObject.GDI32(00000000), ref: 007BBB5E
                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 007BBB74
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                          • String ID:
                                          • API String ID: 3840717409-0
                                          • Opcode ID: 1f3ce5ed4f43b702eae3e9b05a448a423b3a43655e293143d0738c8705336230
                                          • Instruction ID: 2d50cb3272c7d77e53fdc750fb12fb22135ba935d69ade83365ca9df02acf432
                                          • Opcode Fuzzy Hash: 1f3ce5ed4f43b702eae3e9b05a448a423b3a43655e293143d0738c8705336230
                                          • Instruction Fuzzy Hash: 56410775600208EFDB119F69DC88FABBBB8FB89B11F108169F906D7260D7789D01CB64
                                          APIs
                                          • __wsplitpath.LIBCMT ref: 0079DA10
                                          • _wcscat.LIBCMT ref: 0079DA28
                                          • _wcscat.LIBCMT ref: 0079DA3A
                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0079DA4F
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0079DA63
                                          • GetFileAttributesW.KERNEL32(?), ref: 0079DA7B
                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 0079DA95
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0079DAA7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                          • String ID: *.*
                                          • API String ID: 34673085-438819550
                                          • Opcode ID: 0d6d8c88a57d9f1ef58d4fed549335093311797832a7d791c93f8815746d1b0d
                                          • Instruction ID: db0667e72addc43e5c88c3df2e012a2386b5c0d00254b955404f9666393deb09
                                          • Opcode Fuzzy Hash: 0d6d8c88a57d9f1ef58d4fed549335093311797832a7d791c93f8815746d1b0d
                                          • Instruction Fuzzy Hash: C7819FB15043419FCF34EF64D845AAAB7E8EF99320F14882AF889D7251E638ED45CB52
                                          APIs
                                            • Part of subcall function 00732612: GetWindowLongW.USER32(?,000000EB), ref: 00732623
                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007BC1FC
                                          • GetFocus.USER32 ref: 007BC20C
                                          • GetDlgCtrlID.USER32(00000000), ref: 007BC217
                                          • _memset.LIBCMT ref: 007BC342
                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 007BC36D
                                          • GetMenuItemCount.USER32(?), ref: 007BC38D
                                          • GetMenuItemID.USER32(?,00000000), ref: 007BC3A0
                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 007BC3D4
                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 007BC41C
                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007BC454
                                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 007BC489
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                          • String ID: 0
                                          • API String ID: 1296962147-4108050209
                                          • Opcode ID: c6f24078a35cf5ae4e672874b2e6d183b902b6e0001444fc6bd3f0a4b7f692e6
                                          • Instruction ID: 2f725f828ad088dcd3186c2d959beb3cd3cb25ce6944a3434f71af6a5ec5012b
                                          • Opcode Fuzzy Hash: c6f24078a35cf5ae4e672874b2e6d183b902b6e0001444fc6bd3f0a4b7f692e6
                                          • Instruction Fuzzy Hash: 8B815C70608341AFD711DF14C898BAABBE8FF88754F00892EFA9597291D778D905CB62
                                          APIs
                                          • GetDC.USER32(00000000), ref: 007A738F
                                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 007A739B
                                          • CreateCompatibleDC.GDI32(?), ref: 007A73A7
                                          • SelectObject.GDI32(00000000,?), ref: 007A73B4
                                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 007A7408
                                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 007A7444
                                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 007A7468
                                          • SelectObject.GDI32(00000006,?), ref: 007A7470
                                          • DeleteObject.GDI32(?), ref: 007A7479
                                          • DeleteDC.GDI32(00000006), ref: 007A7480
                                          • ReleaseDC.USER32(00000000,?), ref: 007A748B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                          • String ID: (
                                          • API String ID: 2598888154-3887548279
                                          • Opcode ID: a9e4e8459bc1e9a66d2489709bb127d8391566ffc0f5e1055ac0f529e996a4fb
                                          • Instruction ID: 06c1d45e8ad6858d460d9a566325fabaa051fc563e66727e92865f55f48a1cb7
                                          • Opcode Fuzzy Hash: a9e4e8459bc1e9a66d2489709bb127d8391566ffc0f5e1055ac0f529e996a4fb
                                          • Instruction Fuzzy Hash: 86516A71904309EFCB14CFA8CC85EAEBBB9EF89710F14862DF99997221C775A840CB50
                                          APIs
                                            • Part of subcall function 00750957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00736B0C,?,00008000), ref: 00750973
                                            • Part of subcall function 00734750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00734743,?,?,007337AE,?), ref: 00734770
                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00736BAD
                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00736CFA
                                            • Part of subcall function 0073586D: _wcscpy.LIBCMT ref: 007358A5
                                            • Part of subcall function 0075363D: _iswctype.LIBCMT ref: 00753645
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                          • API String ID: 537147316-1018226102
                                          • Opcode ID: 950ab3280ecf8207c5179aaab16cf65f44a579e9a91230c963086498556d351e
                                          • Instruction ID: f24d345859e09286ee50d8b2f3f7f0c8405f4b9705a0b933c64a4261eda1fbf2
                                          • Opcode Fuzzy Hash: 950ab3280ecf8207c5179aaab16cf65f44a579e9a91230c963086498556d351e
                                          • Instruction Fuzzy Hash: 0C029D74108341DFD724EF24C885AAFBBE5EF99314F10491DF886972A2DB38E949CB52
                                          APIs
                                          • _memset.LIBCMT ref: 00792D50
                                          • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00792DDD
                                          • GetMenuItemCount.USER32(007F5890), ref: 00792E66
                                          • DeleteMenu.USER32(007F5890,00000005,00000000,000000F5,?,?), ref: 00792EF6
                                          • DeleteMenu.USER32(007F5890,00000004,00000000), ref: 00792EFE
                                          • DeleteMenu.USER32(007F5890,00000006,00000000), ref: 00792F06
                                          • DeleteMenu.USER32(007F5890,00000003,00000000), ref: 00792F0E
                                          • GetMenuItemCount.USER32(007F5890), ref: 00792F16
                                          • SetMenuItemInfoW.USER32(007F5890,00000004,00000000,00000030), ref: 00792F4C
                                          • GetCursorPos.USER32(?), ref: 00792F56
                                          • SetForegroundWindow.USER32(00000000), ref: 00792F5F
                                          • TrackPopupMenuEx.USER32(007F5890,00000000,?,00000000,00000000,00000000), ref: 00792F72
                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00792F7E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                          • String ID:
                                          • API String ID: 3993528054-0
                                          • Opcode ID: cd3bdccfc49dfde73cf81c3a841c10daad7437cc48b7eae93fc2714a89d51881
                                          • Instruction ID: 095629983f9607dcf9f8116975519dbeb9f658cc976bf2152cd8ef53e0e3aac0
                                          • Opcode Fuzzy Hash: cd3bdccfc49dfde73cf81c3a841c10daad7437cc48b7eae93fc2714a89d51881
                                          • Instruction Fuzzy Hash: DC71F670640205BFEF21AF54EC89FAABF65FF04724F104216F625A61E2C7B96C21DB94
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 007A88D7
                                          • CoInitialize.OLE32(00000000), ref: 007A8904
                                          • CoUninitialize.OLE32 ref: 007A890E
                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 007A8A0E
                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 007A8B3B
                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,007C2C0C), ref: 007A8B6F
                                          • CoGetObject.OLE32(?,00000000,007C2C0C,?), ref: 007A8B92
                                          • SetErrorMode.KERNEL32(00000000), ref: 007A8BA5
                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 007A8C25
                                          • VariantClear.OLEAUT32(?), ref: 007A8C35
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                          • String ID: ,,|
                                          • API String ID: 2395222682-2928947247
                                          • Opcode ID: 5213ad74a5fdd4ace71019cc722dba93009c355ddbbe4c6a9cd7f43ee12aa9ca
                                          • Instruction ID: 5c1a53cfb9c1520ba0e72941183d024cb92a7ed4a65879ec9cc68be77e8d374c
                                          • Opcode Fuzzy Hash: 5213ad74a5fdd4ace71019cc722dba93009c355ddbbe4c6a9cd7f43ee12aa9ca
                                          • Instruction Fuzzy Hash: 7FC124B1608305AFD740DF28C88492BB7E9FF89748F004A5DF98A9B251DB75ED05CB62
                                          APIs
                                            • Part of subcall function 00737BCC: _memmove.LIBCMT ref: 00737C06
                                          • _memset.LIBCMT ref: 0078786B
                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007878A0
                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007878BC
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007878D8
                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00787902
                                          • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0078792A
                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00787935
                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0078793A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                          • API String ID: 1411258926-22481851
                                          • Opcode ID: d7070198c70ccc9678eb6cee4e8acb6dc30efd74719d16d049c1aff2cddc7ff7
                                          • Instruction ID: 857c1359f855f2ffc73eedb0dbe7d9f08ed2afd14fbd56f1b2c54d0331730564
                                          • Opcode Fuzzy Hash: d7070198c70ccc9678eb6cee4e8acb6dc30efd74719d16d049c1aff2cddc7ff7
                                          • Instruction Fuzzy Hash: B1410BB2C14229EBDF25EBA4DC59DEDB778FF04710F404529F805A3162EA389D04CB90
                                          APIs
                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,007AFDAD,?,?), ref: 007B0E31
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: BuffCharUpper
                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                          • API String ID: 3964851224-909552448
                                          • Opcode ID: d8ba491218e98b0c6186dcb3879557e806a94f5bab21fd5bbe22a29b24bfb9b4
                                          • Instruction ID: f1af55683cb22bce433311e2f6c02eb566a3788c92ab36d4916c709d6da95253
                                          • Opcode Fuzzy Hash: d8ba491218e98b0c6186dcb3879557e806a94f5bab21fd5bbe22a29b24bfb9b4
                                          • Instruction Fuzzy Hash: 2941167220028ACFDF20EE10D859AFF3764AF16304F144468FC555B292DB7CA91ACBA0
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0076E2A0,00000010,?,Bad directive syntax error,007BF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0078F7C2
                                          • LoadStringW.USER32(00000000,?,0076E2A0,00000010), ref: 0078F7C9
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                          • _wprintf.LIBCMT ref: 0078F7FC
                                          • __swprintf.LIBCMT ref: 0078F81E
                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0078F88D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                          • API String ID: 1506413516-4153970271
                                          • Opcode ID: 7124aa5391b03da96cb5a24c9d27d76ae994d16728126170fb25cba0868e1930
                                          • Instruction ID: 17876ea0817d87883e31a2dac73d285f7e023f28af5c4dbc0ace3b535947c5b6
                                          • Opcode Fuzzy Hash: 7124aa5391b03da96cb5a24c9d27d76ae994d16728126170fb25cba0868e1930
                                          • Instruction Fuzzy Hash: 4C217E7295021EEFDF16EF90CC4AEEE7739BF18300F044869F505660A2EA79A618DB51
                                          APIs
                                            • Part of subcall function 00737BCC: _memmove.LIBCMT ref: 00737C06
                                            • Part of subcall function 00737924: _memmove.LIBCMT ref: 007379AD
                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00795330
                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00795346
                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00795357
                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00795369
                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0079537A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: SendString$_memmove
                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                          • API String ID: 2279737902-1007645807
                                          • Opcode ID: eb6efccccc56cf85302ecf2b3f68ff6a7b5b73b240e34c41c8d401b91c486085
                                          • Instruction ID: 75051661ca5b7b007b184f784659784febcb53734f99babc59ec04263907b643
                                          • Opcode Fuzzy Hash: eb6efccccc56cf85302ecf2b3f68ff6a7b5b73b240e34c41c8d401b91c486085
                                          • Instruction Fuzzy Hash: 3D11EBB095116DB9EB64B7B2DC4EDFF7B7CEB95B44F000419B405920D2DEA81D44C671
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                          • String ID: 0.0.0.0
                                          • API String ID: 208665112-3771769585
                                          • Opcode ID: c4fecf46becd7b43c5c5a50da8adf656a22c09df3f1b6c21aa2cdecf797e8819
                                          • Instruction ID: c66986db7208b94a70922793feb0563fddc7ff9cc02fa1fe2102729f6699c2a2
                                          • Opcode Fuzzy Hash: c4fecf46becd7b43c5c5a50da8adf656a22c09df3f1b6c21aa2cdecf797e8819
                                          • Instruction Fuzzy Hash: 7111EB31500118BFDF10AB70AC4AFDA77BCEF06711F0442B5F44596151EFBD9E868A50
                                          APIs
                                          • timeGetTime.WINMM ref: 00794F7A
                                            • Part of subcall function 0075049F: timeGetTime.WINMM(?,75A4B400,00740E7B), ref: 007504A3
                                          • Sleep.KERNEL32(0000000A), ref: 00794FA6
                                          • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00794FCA
                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00794FEC
                                          • SetActiveWindow.USER32 ref: 0079500B
                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00795019
                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00795038
                                          • Sleep.KERNEL32(000000FA), ref: 00795043
                                          • IsWindow.USER32 ref: 0079504F
                                          • EndDialog.USER32(00000000), ref: 00795060
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                          • String ID: BUTTON
                                          • API String ID: 1194449130-3405671355
                                          • Opcode ID: 8ce1077630c1eabb2b194ecf7f9ee5180a2fd1393b92b9113750f151736826c4
                                          • Instruction ID: 4c8282b164e1545cd43f95f33b26582b0bc6caa708c16f6fbdfcc9c26e0bf70f
                                          • Opcode Fuzzy Hash: 8ce1077630c1eabb2b194ecf7f9ee5180a2fd1393b92b9113750f151736826c4
                                          • Instruction Fuzzy Hash: E121C3B0205605BFEB115F34FC89F363B6AEB08B55F089224F505921B1DB7D8D20C769
                                          APIs
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                          • CoInitialize.OLE32(00000000), ref: 0079D5EA
                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0079D67D
                                          • SHGetDesktopFolder.SHELL32(?), ref: 0079D691
                                          • CoCreateInstance.OLE32(007C2D7C,00000000,00000001,007E8C1C,?), ref: 0079D6DD
                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0079D74C
                                          • CoTaskMemFree.OLE32(?,?), ref: 0079D7A4
                                          • _memset.LIBCMT ref: 0079D7E1
                                          • SHBrowseForFolderW.SHELL32(?), ref: 0079D81D
                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0079D840
                                          • CoTaskMemFree.OLE32(00000000), ref: 0079D847
                                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0079D87E
                                          • CoUninitialize.OLE32(00000001,00000000), ref: 0079D880
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                          • String ID:
                                          • API String ID: 1246142700-0
                                          • Opcode ID: 9ccafec51354390512849a3ce403fac276e2fadc92cb1b0dc085b768f07b0cbe
                                          • Instruction ID: 569799b672aac9b3559634bdf8efb5f727826525d828b0d76b0b534f247bfa0c
                                          • Opcode Fuzzy Hash: 9ccafec51354390512849a3ce403fac276e2fadc92cb1b0dc085b768f07b0cbe
                                          • Instruction Fuzzy Hash: 01B10A75A00109EFDB14DFA4D888EAEBBB9FF48314F148569E909EB261DB34ED41CB50
                                          APIs
                                          • GetDlgItem.USER32(?,00000001), ref: 0078C283
                                          • GetWindowRect.USER32(00000000,?), ref: 0078C295
                                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0078C2F3
                                          • GetDlgItem.USER32(?,00000002), ref: 0078C2FE
                                          • GetWindowRect.USER32(00000000,?), ref: 0078C310
                                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0078C364
                                          • GetDlgItem.USER32(?,000003E9), ref: 0078C372
                                          • GetWindowRect.USER32(00000000,?), ref: 0078C383
                                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0078C3C6
                                          • GetDlgItem.USER32(?,000003EA), ref: 0078C3D4
                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0078C3F1
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0078C3FE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$ItemMoveRect$Invalidate
                                          • String ID:
                                          • API String ID: 3096461208-0
                                          • Opcode ID: 7472f3944eebff4ba670e6049831967441bcb2f02c0418d9b4ee2e3f31ece3ff
                                          • Instruction ID: 543f49549403ceddbacc04bc60a7ce4b81c757d9591b3109899dafc6192275b6
                                          • Opcode Fuzzy Hash: 7472f3944eebff4ba670e6049831967441bcb2f02c0418d9b4ee2e3f31ece3ff
                                          • Instruction Fuzzy Hash: F2515F71B00205ABDB18DFA9DD99FAEBBBAFB88710F14C22DF915D6290D7749D008B14
                                          APIs
                                            • Part of subcall function 00731B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00732036,?,00000000,?,?,?,?,007316CB,00000000,?), ref: 00731B9A
                                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 007320D3
                                          • KillTimer.USER32(-00000001,?,?,?,?,007316CB,00000000,?,?,00731AE2,?,?), ref: 0073216E
                                          • DestroyAcceleratorTable.USER32(00000000), ref: 0076BCA6
                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007316CB,00000000,?,?,00731AE2,?,?), ref: 0076BCD7
                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007316CB,00000000,?,?,00731AE2,?,?), ref: 0076BCEE
                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007316CB,00000000,?,?,00731AE2,?,?), ref: 0076BD0A
                                          • DeleteObject.GDI32(00000000), ref: 0076BD1C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                          • String ID:
                                          • API String ID: 641708696-0
                                          • Opcode ID: 9413c68435dc4d3e7521960350f725e9ce121a42b16b17af525714216b4e242b
                                          • Instruction ID: 0e32c403dcf5ba8eb4dca460fb9946353fb1ff7ce9a419d1bb9035ea7c344489
                                          • Opcode Fuzzy Hash: 9413c68435dc4d3e7521960350f725e9ce121a42b16b17af525714216b4e242b
                                          • Instruction Fuzzy Hash: 83617B31100A10DFEB39AF14DD48B29B7F1FF41712F508528EA428B972C77CA896DB94
                                          APIs
                                            • Part of subcall function 007325DB: GetWindowLongW.USER32(?,000000EB), ref: 007325EC
                                          • GetSysColor.USER32(0000000F), ref: 007321D3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ColorLongWindow
                                          • String ID:
                                          • API String ID: 259745315-0
                                          • Opcode ID: a1f4e337dc448d8ceba2d86b354a1f7cc888e785cc1b6aa31708fc604de5287d
                                          • Instruction ID: 0e66be8baf6f157d722779dc741cb2ddde75e92e3d17379ff9766f3b9306b34b
                                          • Opcode Fuzzy Hash: a1f4e337dc448d8ceba2d86b354a1f7cc888e785cc1b6aa31708fc604de5287d
                                          • Instruction Fuzzy Hash: F441A331100548EBEB215F28DC88BBA3B65FB06731F258365FE658A1E3C7398C42DB25
                                          APIs
                                          • CharLowerBuffW.USER32(?,?,007BF910), ref: 0079A90B
                                          • GetDriveTypeW.KERNEL32(00000061,007E89A0,00000061), ref: 0079A9D5
                                          • _wcscpy.LIBCMT ref: 0079A9FF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: BuffCharDriveLowerType_wcscpy
                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                          • API String ID: 2820617543-1000479233
                                          • Opcode ID: f389eacc625b7307269e8c527285ee23ed60c006d0a0c07fd279ebcafb9d3eb9
                                          • Instruction ID: e3d0722ee6c83dc697166d43678ca3be558c3766fca942caaf7fba2b443cc11c
                                          • Opcode Fuzzy Hash: f389eacc625b7307269e8c527285ee23ed60c006d0a0c07fd279ebcafb9d3eb9
                                          • Instruction Fuzzy Hash: B751DE31108300EFCB14EF14D896AAFB7A5FF84310F00882DF985572A2DB79A909CB93
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __i64tow__itow__swprintf
                                          • String ID: %.15g$0x%p$False$True
                                          • API String ID: 421087845-2263619337
                                          • Opcode ID: 7ac9c98ed89eab358a05804d9c7d53f1aeaaaac49650d94bfa1200877b18db98
                                          • Instruction ID: df69b95cbb9d312ac684079bbced998662dce5e23e55a0119eaec9ce74f02d6b
                                          • Opcode Fuzzy Hash: 7ac9c98ed89eab358a05804d9c7d53f1aeaaaac49650d94bfa1200877b18db98
                                          • Instruction Fuzzy Hash: A341B671604205EFEB24DF34D846EBA73E8FF45300F20446EEA4AD7293EAB99D458B11
                                          APIs
                                          • _memset.LIBCMT ref: 007B716A
                                          • CreateMenu.USER32 ref: 007B7185
                                          • SetMenu.USER32(?,00000000), ref: 007B7194
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007B7221
                                          • IsMenu.USER32(?), ref: 007B7237
                                          • CreatePopupMenu.USER32 ref: 007B7241
                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007B726E
                                          • DrawMenuBar.USER32 ref: 007B7276
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                          • String ID: 0$F
                                          • API String ID: 176399719-3044882817
                                          • Opcode ID: b9d9b9aaa12e6a136a1c0c54daddeae1d6d119b1b292196652067f3ae8cd95fd
                                          • Instruction ID: 54a5e1668cf6e46077d8cf055bdb77c87a60218de116c10e7ac59ef0f3a59817
                                          • Opcode Fuzzy Hash: b9d9b9aaa12e6a136a1c0c54daddeae1d6d119b1b292196652067f3ae8cd95fd
                                          • Instruction Fuzzy Hash: 6A416974A01209EFDB24DF64D988FDA7BB5FF88350F144128F906A7361D739A920CBA0
                                          APIs
                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 007B755E
                                          • CreateCompatibleDC.GDI32(00000000), ref: 007B7565
                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 007B7578
                                          • SelectObject.GDI32(00000000,00000000), ref: 007B7580
                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 007B758B
                                          • DeleteDC.GDI32(00000000), ref: 007B7594
                                          • GetWindowLongW.USER32(?,000000EC), ref: 007B759E
                                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 007B75B2
                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 007B75BE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                          • String ID: static
                                          • API String ID: 2559357485-2160076837
                                          • Opcode ID: 4c20b01a70c1df0a0e61454465468af58ec92268db90a63df179e650009989f3
                                          • Instruction ID: cf1f4e923164f60b499784a0c7d8d7d8dfa148871469c9cd693c35bd76de2fd8
                                          • Opcode Fuzzy Hash: 4c20b01a70c1df0a0e61454465468af58ec92268db90a63df179e650009989f3
                                          • Instruction Fuzzy Hash: 99316D72104218BBDF259F74DC08FEA3B69FF49720F114325FA15A61A0C739E821DBA4
                                          APIs
                                          • _memset.LIBCMT ref: 00756E3E
                                            • Part of subcall function 00758B28: __getptd_noexit.LIBCMT ref: 00758B28
                                          • __gmtime64_s.LIBCMT ref: 00756ED7
                                          • __gmtime64_s.LIBCMT ref: 00756F0D
                                          • __gmtime64_s.LIBCMT ref: 00756F2A
                                          • __allrem.LIBCMT ref: 00756F80
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00756F9C
                                          • __allrem.LIBCMT ref: 00756FB3
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00756FD1
                                          • __allrem.LIBCMT ref: 00756FE8
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00757006
                                          • __invoke_watson.LIBCMT ref: 00757077
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                          • String ID:
                                          • API String ID: 384356119-0
                                          • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                          • Instruction ID: 5bd3327c5a3caaf0f4210fb3bed57978a41179db1179bf90da07795e3d6fbf3a
                                          • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                          • Instruction Fuzzy Hash: 1C71F876A00716EBD714AE68DC46BAAB3E8BF04725F148229FC15D72C1E7B9DD04C790
                                          APIs
                                          • _memset.LIBCMT ref: 00792542
                                          • GetMenuItemInfoW.USER32(007F5890,000000FF,00000000,00000030), ref: 007925A3
                                          • SetMenuItemInfoW.USER32(007F5890,00000004,00000000,00000030), ref: 007925D9
                                          • Sleep.KERNEL32(000001F4), ref: 007925EB
                                          • GetMenuItemCount.USER32(?), ref: 0079262F
                                          • GetMenuItemID.USER32(?,00000000), ref: 0079264B
                                          • GetMenuItemID.USER32(?,-00000001), ref: 00792675
                                          • GetMenuItemID.USER32(?,?), ref: 007926BA
                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00792700
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00792714
                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00792735
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                          • String ID:
                                          • API String ID: 4176008265-0
                                          • Opcode ID: 0319e2aa05c27b45139add07cd8f085dae823421ff9e238327c8b285f2759787
                                          • Instruction ID: 33e23f3a8222175609ebb295099fa37a68933cc1ea7f24f4d5c3f627db25e224
                                          • Opcode Fuzzy Hash: 0319e2aa05c27b45139add07cd8f085dae823421ff9e238327c8b285f2759787
                                          • Instruction Fuzzy Hash: 5D618DB0900249BFDF21EFA4EC88EBE7BB9FB01344F144159E941A3652D739AD16DB60
                                          APIs
                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 007B6FA5
                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 007B6FA8
                                          • GetWindowLongW.USER32(?,000000F0), ref: 007B6FCC
                                          • _memset.LIBCMT ref: 007B6FDD
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007B6FEF
                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 007B7067
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$LongWindow_memset
                                          • String ID:
                                          • API String ID: 830647256-0
                                          • Opcode ID: 8b68c55d201f911e9f8a356ae138ec8348120f904e38a7ca517da079877eccf8
                                          • Instruction ID: 7e772f9d33427a72e139f5b7e46b207748b507c85c23f4b4323521d34f30067e
                                          • Opcode Fuzzy Hash: 8b68c55d201f911e9f8a356ae138ec8348120f904e38a7ca517da079877eccf8
                                          • Instruction Fuzzy Hash: 8E617971900208AFDB10DFA8CC85FEE77B8EF49710F10415AFA15AB2A1C779AD41CBA0
                                          APIs
                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00786BBF
                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00786C18
                                          • VariantInit.OLEAUT32(?), ref: 00786C2A
                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00786C4A
                                          • VariantCopy.OLEAUT32(?,?), ref: 00786C9D
                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00786CB1
                                          • VariantClear.OLEAUT32(?), ref: 00786CC6
                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00786CD3
                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00786CDC
                                          • VariantClear.OLEAUT32(?), ref: 00786CEE
                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00786CF9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                          • String ID:
                                          • API String ID: 2706829360-0
                                          • Opcode ID: f1c1513f87c2c74b828b5f2be3b9b2f1ceabea3b2fd850d892f610a38431e1d2
                                          • Instruction ID: 5b42551bc8a3b4a6e28233058fe8b43c6a14feb864efb815920f65b325ed1bdc
                                          • Opcode Fuzzy Hash: f1c1513f87c2c74b828b5f2be3b9b2f1ceabea3b2fd850d892f610a38431e1d2
                                          • Instruction Fuzzy Hash: 1F416271A00219EFCF00EF68DC48DAEBBB9EF08754F008165E955A7261CB78A945CBA0
                                          APIs
                                          • WSAStartup.WSOCK32(00000101,?), ref: 007A5793
                                          • inet_addr.WSOCK32(?), ref: 007A57D8
                                          • gethostbyname.WSOCK32(?), ref: 007A57E4
                                          • IcmpCreateFile.IPHLPAPI ref: 007A57F2
                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007A5862
                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007A5878
                                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 007A58ED
                                          • WSACleanup.WSOCK32 ref: 007A58F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                          • String ID: Ping
                                          • API String ID: 1028309954-2246546115
                                          • Opcode ID: c067256831944ad54b6b0bd77366de5ece4dd6a4927db5d766dcf773c5e41967
                                          • Instruction ID: a407d4cb35937c255a867e91467db4616ef430d8bab995aadd20a90062b48552
                                          • Opcode Fuzzy Hash: c067256831944ad54b6b0bd77366de5ece4dd6a4927db5d766dcf773c5e41967
                                          • Instruction Fuzzy Hash: 1C516F71604700DFD710AF24DC89B6AB7E4EF89710F048A69F956DB2A1DB7CE900DB42
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0079B4D0
                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0079B546
                                          • GetLastError.KERNEL32 ref: 0079B550
                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 0079B5BD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Error$Mode$DiskFreeLastSpace
                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                          • API String ID: 4194297153-14809454
                                          • Opcode ID: 31c58806dfeb82277960d23bcbf04289bd490b3c331fa46b6a9be22a8e5d1b76
                                          • Instruction ID: 14c668107e9bfd919f3bfd8169844c356205ae874cf0356656350665d0f1ee49
                                          • Opcode Fuzzy Hash: 31c58806dfeb82277960d23bcbf04289bd490b3c331fa46b6a9be22a8e5d1b76
                                          • Instruction Fuzzy Hash: 8F31AF75A00209EFDB00EF68ED89EAE7BB4FF08300F118125F505EB292DB789A11CB41
                                          APIs
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                            • Part of subcall function 0078AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0078AABC
                                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00789014
                                          • GetDlgCtrlID.USER32 ref: 0078901F
                                          • GetParent.USER32 ref: 0078903B
                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 0078903E
                                          • GetDlgCtrlID.USER32(?), ref: 00789047
                                          • GetParent.USER32(?), ref: 00789063
                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00789066
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 1536045017-1403004172
                                          • Opcode ID: 0621db6112d6141e0e8aa4f8fc76a70b5039aefeb6c90d5aa214d7ee910761b7
                                          • Instruction ID: a5060352fb290c6238ed39e01cd6dd6933f4c89a209b38246ffcaef7747eab5c
                                          • Opcode Fuzzy Hash: 0621db6112d6141e0e8aa4f8fc76a70b5039aefeb6c90d5aa214d7ee910761b7
                                          • Instruction Fuzzy Hash: ED21D370A40108FBDF08ABA0CC89EFEBB74EF59310F104216F921972A2DB7D9815DB21
                                          APIs
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                            • Part of subcall function 0078AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0078AABC
                                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 007890FD
                                          • GetDlgCtrlID.USER32 ref: 00789108
                                          • GetParent.USER32 ref: 00789124
                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00789127
                                          • GetDlgCtrlID.USER32(?), ref: 00789130
                                          • GetParent.USER32(?), ref: 0078914C
                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 0078914F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 1536045017-1403004172
                                          • Opcode ID: 6ad92bbe0e64690b189cd94e9062a94349087050cbfbd154e7f4ff172b2789fb
                                          • Instruction ID: b1e01a045efca8287e2783349a839619843cc94b14cf93751f655c33048020ba
                                          • Opcode Fuzzy Hash: 6ad92bbe0e64690b189cd94e9062a94349087050cbfbd154e7f4ff172b2789fb
                                          • Instruction Fuzzy Hash: 54219074A40109FBEF15ABA4CC89FFEBB64EB58300F144116FA11972A2DB7D5815DB21
                                          APIs
                                          • GetParent.USER32 ref: 0078916F
                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00789184
                                          • _wcscmp.LIBCMT ref: 00789196
                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00789211
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameParentSend_wcscmp
                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                          • API String ID: 1704125052-3381328864
                                          • Opcode ID: e518cc7b64868093e95ceb38814591311171f157c5eb35faaa9473977eb2d8a5
                                          • Instruction ID: e8facd49b2bf4814f8fc78ce20e1d0b2d66a29426dd20ae6c17c4e7eed6f1780
                                          • Opcode Fuzzy Hash: e518cc7b64868093e95ceb38814591311171f157c5eb35faaa9473977eb2d8a5
                                          • Instruction Fuzzy Hash: D911E77668C307F9FA153624EC0FDB7379CAF15721B200026FE00A40D2FEAD68525A54
                                          APIs
                                          • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00797A6C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ArraySafeVartype
                                          • String ID:
                                          • API String ID: 1725837607-0
                                          • Opcode ID: 9bbd09fe78f0a2c0edd554e2db21b344b44c864743cf2500fbb69ce3fa16741d
                                          • Instruction ID: fec4dffaa46c971644e3844a4c97cfb411b07ead8eaa3299ec33baf6beaf31b5
                                          • Opcode Fuzzy Hash: 9bbd09fe78f0a2c0edd554e2db21b344b44c864743cf2500fbb69ce3fa16741d
                                          • Instruction Fuzzy Hash: E1B16E7191421ADFDF04DFA4E885BBEB7B8EF09321F244429EA41E7251D778A941CBA0
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 007911F0
                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00790268,?,00000001), ref: 00791204
                                          • GetWindowThreadProcessId.USER32(00000000), ref: 0079120B
                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00790268,?,00000001), ref: 0079121A
                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0079122C
                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00790268,?,00000001), ref: 00791245
                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00790268,?,00000001), ref: 00791257
                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00790268,?,00000001), ref: 0079129C
                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00790268,?,00000001), ref: 007912B1
                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00790268,?,00000001), ref: 007912BC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                          • String ID:
                                          • API String ID: 2156557900-0
                                          • Opcode ID: 180a51ce0b7720833d35dfc27673cc80bdafa7ebfceea67d84e8efcedb43f483
                                          • Instruction ID: 294895dd391adbfcc6e57ed93128272846ae7fa3f6dbb12f43b7e01ccf5ca62c
                                          • Opcode Fuzzy Hash: 180a51ce0b7720833d35dfc27673cc80bdafa7ebfceea67d84e8efcedb43f483
                                          • Instruction Fuzzy Hash: BC317875640205BBEF10AF54FD88FA937A9BB59715F508225F900CA1A0D77C9940CB68
                                          APIs
                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0073FAA6
                                          • OleUninitialize.OLE32(?,00000000), ref: 0073FB45
                                          • UnregisterHotKey.USER32(?), ref: 0073FC9C
                                          • DestroyWindow.USER32(?), ref: 007745D6
                                          • FreeLibrary.KERNEL32(?), ref: 0077463B
                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00774668
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                          • String ID: close all
                                          • API String ID: 469580280-3243417748
                                          • Opcode ID: 81c83733b9aa477e11573f1805623aa8f29b0666c3078d6bff6f7a17571dfd19
                                          • Instruction ID: 2491ae13413fc5089a97ced5f801b74c3e3cf8400c4c6c451deefbf9906feeca
                                          • Opcode Fuzzy Hash: 81c83733b9aa477e11573f1805623aa8f29b0666c3078d6bff6f7a17571dfd19
                                          • Instruction Fuzzy Hash: 30A17070701212CFDB19EF14C998F69F364BF05750F5082ADE80AAB262DB38AD16CF90
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit$_memset
                                          • String ID: ,,|$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                          • API String ID: 2862541840-1977917988
                                          • Opcode ID: 1906bb205992c213ca0c681aab7868e7d651f577a1b1cc8edcebeba3a061a831
                                          • Instruction ID: f9217a55fd7d6b217b797a6c2c605fbc10593dcd53fe1173637b462ec8766a25
                                          • Opcode Fuzzy Hash: 1906bb205992c213ca0c681aab7868e7d651f577a1b1cc8edcebeba3a061a831
                                          • Instruction Fuzzy Hash: 01919271A00215EBDF24CF95C848FAEB7B8EF86710F108259F615AB280D7789915CBA0
                                          APIs
                                          • EnumChildWindows.USER32(?,0078A439), ref: 0078A377
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ChildEnumWindows
                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                          • API String ID: 3555792229-1603158881
                                          • Opcode ID: cbe0077235380aea78f83f6e1e689fe736ef1cbc2db7846e8e2c36e9a5b4a44b
                                          • Instruction ID: 2b69d71e29cd679f05cf290d4e9cabc35bf85858a820e203cdbd94351eac7706
                                          • Opcode Fuzzy Hash: cbe0077235380aea78f83f6e1e689fe736ef1cbc2db7846e8e2c36e9a5b4a44b
                                          • Instruction Fuzzy Hash: E391E531A40606FBEB18EFA0C44ABEDFB74BF04310F54811AE849A7152DF386999CBD1
                                          APIs
                                          • SetWindowLongW.USER32(?,000000EB), ref: 00732EAE
                                            • Part of subcall function 00731DB3: GetClientRect.USER32(?,?), ref: 00731DDC
                                            • Part of subcall function 00731DB3: GetWindowRect.USER32(?,?), ref: 00731E1D
                                            • Part of subcall function 00731DB3: ScreenToClient.USER32(?,?), ref: 00731E45
                                          • GetDC.USER32 ref: 0076CD32
                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0076CD45
                                          • SelectObject.GDI32(00000000,00000000), ref: 0076CD53
                                          • SelectObject.GDI32(00000000,00000000), ref: 0076CD68
                                          • ReleaseDC.USER32(?,00000000), ref: 0076CD70
                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0076CDFB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                          • String ID: U
                                          • API String ID: 4009187628-3372436214
                                          • Opcode ID: addcbc547fa9692d308ef20f58564db696af9cf2ccb41b4070a5d5c4ff142808
                                          • Instruction ID: c58ef859f0fa8becf47be07e325f6c920a7a5154f3095a85a78d7d7c3ef345d7
                                          • Opcode Fuzzy Hash: addcbc547fa9692d308ef20f58564db696af9cf2ccb41b4070a5d5c4ff142808
                                          • Instruction Fuzzy Hash: 3771D431500205DFDF229F64CC89AFA7BB5FF48354F14427AED965A2A6C7398C41DB60
                                          APIs
                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007A1A50
                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 007A1A7C
                                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 007A1ABE
                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 007A1AD3
                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007A1AE0
                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 007A1B10
                                          • InternetCloseHandle.WININET(00000000), ref: 007A1B57
                                            • Part of subcall function 007A2483: GetLastError.KERNEL32(?,?,007A1817,00000000,00000000,00000001), ref: 007A2498
                                            • Part of subcall function 007A2483: SetEvent.KERNEL32(?,?,007A1817,00000000,00000000,00000001), ref: 007A24AD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                          • String ID:
                                          • API String ID: 2603140658-3916222277
                                          • Opcode ID: 88befdbadb86d89a174f6151fa9796a7284a305e3d0ae944c3063f9cee1ee8c6
                                          • Instruction ID: f9332ca85acb249e35b83974ccbf4ef92a7f2e868a0d5f4b036c73f646c163ac
                                          • Opcode Fuzzy Hash: 88befdbadb86d89a174f6151fa9796a7284a305e3d0ae944c3063f9cee1ee8c6
                                          • Instruction Fuzzy Hash: 9741A1B1501218BFFB118F60CC89FFB7BACEF49750F408266F9059A141EB789E448BA4
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,007BF910), ref: 007A8D28
                                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,007BF910), ref: 007A8D5C
                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 007A8ED6
                                          • SysFreeString.OLEAUT32(?), ref: 007A8F00
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                          • String ID:
                                          • API String ID: 560350794-0
                                          • Opcode ID: f0fd82f39eadf6a464f76301c54089d5423613eccca94e6b8f135e2909e025b5
                                          • Instruction ID: 56b05cfd6e573278db734f5d0e380d9a62c7a730b09f4c9bf84a7bb9f7016a6f
                                          • Opcode Fuzzy Hash: f0fd82f39eadf6a464f76301c54089d5423613eccca94e6b8f135e2909e025b5
                                          • Instruction Fuzzy Hash: FCF15C71A00109EFDF44DF94C888EAEB7B9FF8A314F108698F905AB251DB35AE45CB51
                                          APIs
                                          • _memset.LIBCMT ref: 007AF6B5
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007AF848
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 007AF86C
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007AF8AC
                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 007AF8CE
                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007AFA4A
                                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 007AFA7C
                                          • CloseHandle.KERNEL32(?), ref: 007AFAAB
                                          • CloseHandle.KERNEL32(?), ref: 007AFB22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                          • String ID:
                                          • API String ID: 4090791747-0
                                          • Opcode ID: b1310cd7130c137417057474d2291b1ff233964a598e9abda78ee6fc800cd8e9
                                          • Instruction ID: 749468b19de5f160b7e5709e85cdbf7e558e8484539fd78f88523c240fcbbcbd
                                          • Opcode Fuzzy Hash: b1310cd7130c137417057474d2291b1ff233964a598e9abda78ee6fc800cd8e9
                                          • Instruction Fuzzy Hash: 2CE1B171604300DFD714EF74C885B6ABBE1AF86310F148A6DF8859B2A2DB79EC45CB52
                                          APIs
                                            • Part of subcall function 0079466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00793697,?), ref: 0079468B
                                            • Part of subcall function 0079466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00793697,?), ref: 007946A4
                                            • Part of subcall function 00794A31: GetFileAttributesW.KERNEL32(?,0079370B), ref: 00794A32
                                          • lstrcmpiW.KERNEL32(?,?), ref: 00794D40
                                          • _wcscmp.LIBCMT ref: 00794D5A
                                          • MoveFileW.KERNEL32(?,?), ref: 00794D75
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                          • String ID:
                                          • API String ID: 793581249-0
                                          • Opcode ID: e9ff2ff7ad8657f16e3f8fc051adc7a49cb72991cf4307cc020305732ec06de4
                                          • Instruction ID: eee6412692abfda4c2db2ea0ccdc4cfc827a6394217272db33dec14f1d2517cf
                                          • Opcode Fuzzy Hash: e9ff2ff7ad8657f16e3f8fc051adc7a49cb72991cf4307cc020305732ec06de4
                                          • Instruction Fuzzy Hash: 195172B21083859BDB24DB60D885DDFB3ECAF85351F00492EF689D3152EF78A189C766
                                          APIs
                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 007B86FF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: InvalidateRect
                                          • String ID:
                                          • API String ID: 634782764-0
                                          • Opcode ID: e669a522766729d9c73fded6e616683725ed560356f736c4b5793fe31f07e2ed
                                          • Instruction ID: 7f06efa70429ce685d314237080ad16f4666d7d4bc34d17033481ef8950f08a9
                                          • Opcode Fuzzy Hash: e669a522766729d9c73fded6e616683725ed560356f736c4b5793fe31f07e2ed
                                          • Instruction Fuzzy Hash: B2519130510244FFEB649F68CC89FE97B68FB05768F644215FA10E61A2CF79A980DB52
                                          APIs
                                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0076C2F7
                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0076C319
                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0076C331
                                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0076C34F
                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0076C370
                                          • DestroyIcon.USER32(00000000), ref: 0076C37F
                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0076C39C
                                          • DestroyIcon.USER32(?), ref: 0076C3AB
                                            • Part of subcall function 007BA4AF: DeleteObject.GDI32(00000000), ref: 007BA4E8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                          • String ID:
                                          • API String ID: 2819616528-0
                                          • Opcode ID: 87ab2dca6de1627cc18ea1ef1ec49c350c38ca864f5ae6b610c55cac6fc48d87
                                          • Instruction ID: 54f98ff5300acd0bcfea1c7fc22ed70111fa5340488fac8fddeab238e774b0c1
                                          • Opcode Fuzzy Hash: 87ab2dca6de1627cc18ea1ef1ec49c350c38ca864f5ae6b610c55cac6fc48d87
                                          • Instruction Fuzzy Hash: E3516B70600209EFEB20DF65CC45FAA7BB5FB58720F108628F94297292DB78ED51DB60
                                          APIs
                                            • Part of subcall function 0078A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0078A84C
                                            • Part of subcall function 0078A82C: GetCurrentThreadId.KERNEL32 ref: 0078A853
                                            • Part of subcall function 0078A82C: AttachThreadInput.USER32(00000000,?,00789683,?,00000001), ref: 0078A85A
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 0078968E
                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007896AB
                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 007896AE
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007896B7
                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 007896D5
                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 007896D8
                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 007896E1
                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 007896F8
                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 007896FB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                          • String ID:
                                          • API String ID: 2014098862-0
                                          • Opcode ID: bef90b1efab631cd965c648a3b95b122d05022d47e2b71d1ff6cae016fc6e2b0
                                          • Instruction ID: 383fc542707ae19262fd655df0f34cf3afa6e329cda3052cee0da0c58d33957f
                                          • Opcode Fuzzy Hash: bef90b1efab631cd965c648a3b95b122d05022d47e2b71d1ff6cae016fc6e2b0
                                          • Instruction Fuzzy Hash: 0911CEB1A50218FEF6106B649C89F6A3B2DEB4CB64F204525F744AB0A0C9F65C109BA8
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0078853C,00000B00,?,?), ref: 0078892A
                                          • HeapAlloc.KERNEL32(00000000,?,0078853C,00000B00,?,?), ref: 00788931
                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0078853C,00000B00,?,?), ref: 00788946
                                          • GetCurrentProcess.KERNEL32(?,00000000,?,0078853C,00000B00,?,?), ref: 0078894E
                                          • DuplicateHandle.KERNEL32(00000000,?,0078853C,00000B00,?,?), ref: 00788951
                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0078853C,00000B00,?,?), ref: 00788961
                                          • GetCurrentProcess.KERNEL32(0078853C,00000000,?,0078853C,00000B00,?,?), ref: 00788969
                                          • DuplicateHandle.KERNEL32(00000000,?,0078853C,00000B00,?,?), ref: 0078896C
                                          • CreateThread.KERNEL32(00000000,00000000,00788992,00000000,00000000,00000000), ref: 00788986
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                          • String ID:
                                          • API String ID: 1957940570-0
                                          • Opcode ID: ff650be6758b8d3d482ad523739c0e47c366f31921b37bb937615bf9a54a3856
                                          • Instruction ID: 17e69bb2678b1d455276dc4d36de556bf5c8b360f377d302608d2c60e400c4f5
                                          • Opcode Fuzzy Hash: ff650be6758b8d3d482ad523739c0e47c366f31921b37bb937615bf9a54a3856
                                          • Instruction Fuzzy Hash: 5301A8B524030CFFE610AFA9DC49F6B7BACEB89B11F408521FA05DB1A1CA749C008B25
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: NULL Pointer assignment$Not an Object type
                                          • API String ID: 0-572801152
                                          • Opcode ID: cdea0b67f0bfbe6bee839aa385853c304702428343a6c596c082369b1b24fda3
                                          • Instruction ID: 363ea66a066a4ed34600dd86c3a99e6cebe49c17a0d701595eb037e0cfe14704
                                          • Opcode Fuzzy Hash: cdea0b67f0bfbe6bee839aa385853c304702428343a6c596c082369b1b24fda3
                                          • Instruction Fuzzy Hash: FAC1C571A002099FDF10DF68C884BAEB7F5FF89314F148569EA05EB281E7789D51CBA0
                                          APIs
                                            • Part of subcall function 0078710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00787044,80070057,?,?,?,00787455), ref: 00787127
                                            • Part of subcall function 0078710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00787044,80070057,?,?), ref: 00787142
                                            • Part of subcall function 0078710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00787044,80070057,?,?), ref: 00787150
                                            • Part of subcall function 0078710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00787044,80070057,?), ref: 00787160
                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 007A9806
                                          • _memset.LIBCMT ref: 007A9813
                                          • _memset.LIBCMT ref: 007A9956
                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 007A9982
                                          • CoTaskMemFree.OLE32(?), ref: 007A998D
                                          Strings
                                          • NULL Pointer assignment, xrefs: 007A99DB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                          • String ID: NULL Pointer assignment
                                          • API String ID: 1300414916-2785691316
                                          • Opcode ID: 442f7e0d0074a4e660a425298a7f4ca47e3d9674964b88dea15df36ade025e9a
                                          • Instruction ID: 26bc13efb0ceb7a0bcfab90acda38e579b1846b5abc1db27b7115ada3b3eb624
                                          • Opcode Fuzzy Hash: 442f7e0d0074a4e660a425298a7f4ca47e3d9674964b88dea15df36ade025e9a
                                          • Instruction Fuzzy Hash: 3F915A71D00228EBDB10DFA4DC45EDEBBB9BF49310F20811AF519A7241DB75AA44CFA0
                                          APIs
                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 007B6E24
                                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 007B6E38
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 007B6E52
                                          • _wcscat.LIBCMT ref: 007B6EAD
                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 007B6EC4
                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 007B6EF2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window_wcscat
                                          • String ID: SysListView32
                                          • API String ID: 307300125-78025650
                                          • Opcode ID: 1ec6942bacc188bcb82206e589d9bd450550d0a1ebd1372c4ca1c14c3fcac263
                                          • Instruction ID: 3067d0e2963ab87aa56d0a28dde626b8224c6ef8214770f58dfc9dff2e92946b
                                          • Opcode Fuzzy Hash: 1ec6942bacc188bcb82206e589d9bd450550d0a1ebd1372c4ca1c14c3fcac263
                                          • Instruction Fuzzy Hash: E341A275A00348EFEF219F64CC89BEE77A8EF08754F10452AFA44E7291D6799D84CB60
                                          APIs
                                            • Part of subcall function 00793C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00793C7A
                                            • Part of subcall function 00793C55: Process32FirstW.KERNEL32(00000000,?), ref: 00793C88
                                            • Part of subcall function 00793C55: CloseHandle.KERNEL32(00000000), ref: 00793D52
                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007AE9A4
                                          • GetLastError.KERNEL32 ref: 007AE9B7
                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 007AE9E6
                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 007AEA63
                                          • GetLastError.KERNEL32(00000000), ref: 007AEA6E
                                          • CloseHandle.KERNEL32(00000000), ref: 007AEAA3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                          • String ID: SeDebugPrivilege
                                          • API String ID: 2533919879-2896544425
                                          • Opcode ID: 621145d9eaa4c6960be05c7a24cccb7a063597f70a9114f639852d97e1f4e4de
                                          • Instruction ID: 68f8cb50d088cf5ca31a3f31671a588b5f17506d2b27c8ad7b1fea7021491d7c
                                          • Opcode Fuzzy Hash: 621145d9eaa4c6960be05c7a24cccb7a063597f70a9114f639852d97e1f4e4de
                                          • Instruction Fuzzy Hash: C5419A71200200DFDB10EF28CCA9F6EB7A5AF85710F048518F9429B2D2CBB9AD04CB96
                                          APIs
                                          • LoadIconW.USER32(00000000,00007F03), ref: 00793033
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: IconLoad
                                          • String ID: blank$info$question$stop$warning
                                          • API String ID: 2457776203-404129466
                                          • Opcode ID: c859732d6a28caf2694d6ee20f5c8b5f37947379b739bd3fbc156a719022e5b7
                                          • Instruction ID: d1a93cb2d04d281e5c93156f4c62843af2700de18abbd5d23ff18498de22511d
                                          • Opcode Fuzzy Hash: c859732d6a28caf2694d6ee20f5c8b5f37947379b739bd3fbc156a719022e5b7
                                          • Instruction Fuzzy Hash: EE116D31348386BEDF149B5DEC47CAB779CDF1A360B10002AF90466182DFBC5F0556A5
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00794312
                                          • LoadStringW.USER32(00000000), ref: 00794319
                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0079432F
                                          • LoadStringW.USER32(00000000), ref: 00794336
                                          • _wprintf.LIBCMT ref: 0079435C
                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0079437A
                                          Strings
                                          • %s (%d) : ==> %s: %s %s, xrefs: 00794357
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: HandleLoadModuleString$Message_wprintf
                                          • String ID: %s (%d) : ==> %s: %s %s
                                          • API String ID: 3648134473-3128320259
                                          • Opcode ID: 6fd335964ae5f255db3c484396898e1d870615a1b98df178f617bea890de8bf6
                                          • Instruction ID: 56792fa2e75a58ea6e078374f01e3fdf15f6fa94a52586642e484d8099a770af
                                          • Opcode Fuzzy Hash: 6fd335964ae5f255db3c484396898e1d870615a1b98df178f617bea890de8bf6
                                          • Instruction Fuzzy Hash: E80162F290020CBFE75197A4DD89FE6776CEB08701F0045A1FB49E6051EA785E854B75
                                          APIs
                                            • Part of subcall function 00732612: GetWindowLongW.USER32(?,000000EB), ref: 00732623
                                          • GetSystemMetrics.USER32(0000000F), ref: 007BD47C
                                          • GetSystemMetrics.USER32(0000000F), ref: 007BD49C
                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 007BD6D7
                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 007BD6F5
                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 007BD716
                                          • ShowWindow.USER32(00000003,00000000), ref: 007BD735
                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 007BD75A
                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 007BD77D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                          • String ID:
                                          • API String ID: 1211466189-0
                                          • Opcode ID: 54c7071fcb3d47174c4108435e8741af49624cf348e5c9d33fc505091ed186e6
                                          • Instruction ID: a20f843988d14769cde1f44475c7203720aa1e7aeb006bbc368ab777efd0b402
                                          • Opcode Fuzzy Hash: 54c7071fcb3d47174c4108435e8741af49624cf348e5c9d33fc505091ed186e6
                                          • Instruction Fuzzy Hash: 13B19A71600215EBDF24CF68C9C9BE97BB1BF04715F08C169ED489B295EB38AD50CBA0
                                          APIs
                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0076C1C7,00000004,00000000,00000000,00000000), ref: 00732ACF
                                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0076C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00732B17
                                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0076C1C7,00000004,00000000,00000000,00000000), ref: 0076C21A
                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0076C1C7,00000004,00000000,00000000,00000000), ref: 0076C286
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ShowWindow
                                          • String ID:
                                          • API String ID: 1268545403-0
                                          • Opcode ID: 60ed5e7d993762ecb642fe8dbf9ac53159acf5896ed2f1292c1ad9b42f71263f
                                          • Instruction ID: eea7c2630870551f286c4229eaba10a91c08a8bdf8645a927e9a5ae97bf7fe7e
                                          • Opcode Fuzzy Hash: 60ed5e7d993762ecb642fe8dbf9ac53159acf5896ed2f1292c1ad9b42f71263f
                                          • Instruction Fuzzy Hash: 0A41F831204680AFE73A9B29CC9CB7A7B92BB45310F64C819ED8786563C67DA843D720
                                          APIs
                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 007970DD
                                            • Part of subcall function 00750DB6: std::exception::exception.LIBCMT ref: 00750DEC
                                            • Part of subcall function 00750DB6: __CxxThrowException@8.LIBCMT ref: 00750E01
                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00797114
                                          • EnterCriticalSection.KERNEL32(?), ref: 00797130
                                          • _memmove.LIBCMT ref: 0079717E
                                          • _memmove.LIBCMT ref: 0079719B
                                          • LeaveCriticalSection.KERNEL32(?), ref: 007971AA
                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 007971BF
                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 007971DE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                          • String ID:
                                          • API String ID: 256516436-0
                                          • Opcode ID: f47dc0b6d697840493b6101c059e74258863a5fe3d2139619bc63257d1d2e202
                                          • Instruction ID: f077e12a8fc531d51397f6015b7dfff1689450835f51340b3468f4c71b36a7f4
                                          • Opcode Fuzzy Hash: f47dc0b6d697840493b6101c059e74258863a5fe3d2139619bc63257d1d2e202
                                          • Instruction Fuzzy Hash: 7C315231A00209EBCF00EFA4DC89EAE7778FF45711F1481A5ED04AB256D7789E14CBA4
                                          APIs
                                          • DeleteObject.GDI32(00000000), ref: 007B61EB
                                          • GetDC.USER32(00000000), ref: 007B61F3
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007B61FE
                                          • ReleaseDC.USER32(00000000,00000000), ref: 007B620A
                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 007B6246
                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 007B6257
                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,007B902A,?,?,000000FF,00000000,?,000000FF,?), ref: 007B6291
                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007B62B1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                          • String ID:
                                          • API String ID: 3864802216-0
                                          • Opcode ID: 7696cf409ab009b55e9912145537ebcf8f4824b2991abf5df899774781dbe0bc
                                          • Instruction ID: 27ef5fe3394294c94806da0c4e3b9065b506b663bd809bbacef498be11689f1f
                                          • Opcode Fuzzy Hash: 7696cf409ab009b55e9912145537ebcf8f4824b2991abf5df899774781dbe0bc
                                          • Instruction Fuzzy Hash: C7314F72101214BFEB118F54CC8AFEA3BA9FF49765F044165FE089A191D6799C41CB64
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memcmp
                                          • String ID:
                                          • API String ID: 2931989736-0
                                          • Opcode ID: 7f2c627c7552f50284cd13bae2f1d48e7ce529fbef3dbb2c1dd88ac160644dc5
                                          • Instruction ID: b3b8c8c6ad68c3d40ff96b236572a74de7341655c3823fb4dbd098c759e997d8
                                          • Opcode Fuzzy Hash: 7f2c627c7552f50284cd13bae2f1d48e7ce529fbef3dbb2c1dd88ac160644dc5
                                          • Instruction Fuzzy Hash: 0521CFE1681305BBB21476219D46FFB7B5D9E10389F484028FD0596A43EBACDE1683B1
                                          APIs
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                            • Part of subcall function 0074FC86: _wcscpy.LIBCMT ref: 0074FCA9
                                          • _wcstok.LIBCMT ref: 0079EC94
                                          • _wcscpy.LIBCMT ref: 0079ED23
                                          • _memset.LIBCMT ref: 0079ED56
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                          • String ID: X
                                          • API String ID: 774024439-3081909835
                                          • Opcode ID: 561633eee07b8c43003af80ba61d7fcd285d744cbf8ea7e2b1021b7e5c43a5dd
                                          • Instruction ID: c0818e91cb66f8a0ad15cbd7fbafc4e5eadd01ccb7b804d459802872151b0b31
                                          • Opcode Fuzzy Hash: 561633eee07b8c43003af80ba61d7fcd285d744cbf8ea7e2b1021b7e5c43a5dd
                                          • Instruction Fuzzy Hash: 6CC19271608340DFDB64EF24D889A5AB7E4FF85310F00492DF999972A2DB78EC45CB42
                                          APIs
                                          • __WSAFDIsSet.WSOCK32(00000000,?), ref: 007A6C00
                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 007A6C21
                                          • WSAGetLastError.WSOCK32(00000000), ref: 007A6C34
                                          • htons.WSOCK32(?), ref: 007A6CEA
                                          • inet_ntoa.WSOCK32(?), ref: 007A6CA7
                                            • Part of subcall function 0078A7E9: _strlen.LIBCMT ref: 0078A7F3
                                            • Part of subcall function 0078A7E9: _memmove.LIBCMT ref: 0078A815
                                          • _strlen.LIBCMT ref: 007A6D44
                                          • _memmove.LIBCMT ref: 007A6DAD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                          • String ID:
                                          • API String ID: 3619996494-0
                                          • Opcode ID: 07fe4f48811a0f8dc529e48fe5aee18b487699187b5578e87ce3cdd6fde3c671
                                          • Instruction ID: 94928efb2247e764857447e4cc5435604710fe1c285519a650eb087f2d0f2592
                                          • Opcode Fuzzy Hash: 07fe4f48811a0f8dc529e48fe5aee18b487699187b5578e87ce3cdd6fde3c671
                                          • Instruction Fuzzy Hash: 2681D3B1204300EBD710EB24CC8AF6BB7A8AFC5714F184A1CF5559B292DB78ED04CB92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e4c748f79875f6b707158e92affc1b3f9174e52d2e8cc610b970b291ce4ebb8d
                                          • Instruction ID: 3f1e6e70c5e19346c85e02d93459c0a482105e944b24db5074438c83fb5f230d
                                          • Opcode Fuzzy Hash: e4c748f79875f6b707158e92affc1b3f9174e52d2e8cc610b970b291ce4ebb8d
                                          • Instruction Fuzzy Hash: 75716C30900149EFDB04DF98CC89EBEBB79FF85310F54C159F915AA252C738AA51CBA4
                                          APIs
                                          • IsWindow.USER32(013F4D98), ref: 007BB3EB
                                          • IsWindowEnabled.USER32(013F4D98), ref: 007BB3F7
                                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 007BB4DB
                                          • SendMessageW.USER32(013F4D98,000000B0,?,?), ref: 007BB512
                                          • IsDlgButtonChecked.USER32(?,?), ref: 007BB54F
                                          • GetWindowLongW.USER32(013F4D98,000000EC), ref: 007BB571
                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 007BB589
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                          • String ID:
                                          • API String ID: 4072528602-0
                                          • Opcode ID: e0fc058789072627763f5ffcda8cd3626c21224cbad756272642abcf488fd86f
                                          • Instruction ID: c91046d22ef660962edf6052f93e56a3623aba17c69171ceea4b7f3859ea016f
                                          • Opcode Fuzzy Hash: e0fc058789072627763f5ffcda8cd3626c21224cbad756272642abcf488fd86f
                                          • Instruction Fuzzy Hash: F3718E34604644EFDB249F94C894FFABBB9FF09300F148169FE45972A2C7B9A950CB50
                                          APIs
                                          • _memset.LIBCMT ref: 007AF448
                                          • _memset.LIBCMT ref: 007AF511
                                          • ShellExecuteExW.SHELL32(?), ref: 007AF556
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                            • Part of subcall function 0074FC86: _wcscpy.LIBCMT ref: 0074FCA9
                                          • GetProcessId.KERNEL32(00000000), ref: 007AF5CD
                                          • CloseHandle.KERNEL32(00000000), ref: 007AF5FC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                          • String ID: @
                                          • API String ID: 3522835683-2766056989
                                          • Opcode ID: 8709eeabdd708eeaf81c7562dad5db4fed1fb22969023b56845082163ea2d972
                                          • Instruction ID: 0539fed3ae308509c2a3b16de9de9d5f431547785b2c5fae382f94e2b044a356
                                          • Opcode Fuzzy Hash: 8709eeabdd708eeaf81c7562dad5db4fed1fb22969023b56845082163ea2d972
                                          • Instruction Fuzzy Hash: D761C175A00619DFCB04DFA8C8859AEBBF5FF89310F148169E855AB352CB38AD41CF90
                                          APIs
                                          • GetParent.USER32(?), ref: 00790F8C
                                          • GetKeyboardState.USER32(?), ref: 00790FA1
                                          • SetKeyboardState.USER32(?), ref: 00791002
                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00791030
                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 0079104F
                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00791095
                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007910B8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$Parent
                                          • String ID:
                                          • API String ID: 87235514-0
                                          • Opcode ID: ec4a5abc017da0447160f050412ffc42e2bb4257bbda507e355415cbda183960
                                          • Instruction ID: cac217d83763e86b7c1425b14d3931b073114f3cc196f9ebf101a9aeee402c29
                                          • Opcode Fuzzy Hash: ec4a5abc017da0447160f050412ffc42e2bb4257bbda507e355415cbda183960
                                          • Instruction Fuzzy Hash: 675124606447D67DFF3242389C09BBABEAA6B06304F088589E1D4458C3C2DDECE8D750
                                          APIs
                                          • GetParent.USER32(00000000), ref: 00790DA5
                                          • GetKeyboardState.USER32(?), ref: 00790DBA
                                          • SetKeyboardState.USER32(?), ref: 00790E1B
                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00790E47
                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00790E64
                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00790EA8
                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00790EC9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessagePost$KeyboardState$Parent
                                          • String ID:
                                          • API String ID: 87235514-0
                                          • Opcode ID: 2ac316fb2de085d29b4d4f33f8a58e56f232ce7f2de06254f75a91f6d2a48a8a
                                          • Instruction ID: 8e8d78bbb47f082902a0c25a26a9a4355c68a16663308b3a676bb2985b4be025
                                          • Opcode Fuzzy Hash: 2ac316fb2de085d29b4d4f33f8a58e56f232ce7f2de06254f75a91f6d2a48a8a
                                          • Instruction Fuzzy Hash: 2E5115A06247D57DFF3297349C45B7ABFA96B06300F088889F1D4468C2C39DAC98D7A0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _wcsncpy$LocalTime
                                          • String ID:
                                          • API String ID: 2945705084-0
                                          • Opcode ID: f8d2f805e93b424e0807265e970f83167aafab74fc9b56a128c702a52a2ffa2e
                                          • Instruction ID: 92596ccff6642e3f08c1f90077b0b98a9c18fa44bd22381bdbb0da514adab1f4
                                          • Opcode Fuzzy Hash: f8d2f805e93b424e0807265e970f83167aafab74fc9b56a128c702a52a2ffa2e
                                          • Instruction Fuzzy Hash: 0041BA66C10614B6CF11EBF4DC4AACFB3B89F05311F508555E908E3222FB78A759C7A6
                                          APIs
                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0078D5D4
                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0078D60A
                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0078D61B
                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0078D69D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                          • String ID: ,,|$DllGetClassObject
                                          • API String ID: 753597075-1863548374
                                          • Opcode ID: e2d6ff8124b4477ad0e1f64af55b05a46c8b4a09177c0c9cb9d634e0f25cfc0d
                                          • Instruction ID: 33faf06a276931ff64702757cbceda6bd99f87eb17ca893820e9ddad4a565856
                                          • Opcode Fuzzy Hash: e2d6ff8124b4477ad0e1f64af55b05a46c8b4a09177c0c9cb9d634e0f25cfc0d
                                          • Instruction Fuzzy Hash: CE4191B1640208EFDB25EF54C884B9A7BA9EF44350F1581ADEC09DF245E7B9DD40CBA0
                                          APIs
                                            • Part of subcall function 0079466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00793697,?), ref: 0079468B
                                            • Part of subcall function 0079466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00793697,?), ref: 007946A4
                                          • lstrcmpiW.KERNEL32(?,?), ref: 007936B7
                                          • _wcscmp.LIBCMT ref: 007936D3
                                          • MoveFileW.KERNEL32(?,?), ref: 007936EB
                                          • _wcscat.LIBCMT ref: 00793733
                                          • SHFileOperationW.SHELL32(?), ref: 0079379F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                          • String ID: \*.*
                                          • API String ID: 1377345388-1173974218
                                          • Opcode ID: adaaba427517a65e838092e50f1ee0e7c173fa58c48ff27a584ba24014f26eac
                                          • Instruction ID: 1129b67c4baeb2f45af4ae16e149a0846319da67bf2a918522ee4cd86bcfd7d1
                                          • Opcode Fuzzy Hash: adaaba427517a65e838092e50f1ee0e7c173fa58c48ff27a584ba24014f26eac
                                          • Instruction Fuzzy Hash: 3F4194B1508344AEDB51EF64D446DDF77E8EF89340F00492EF499C3251EA38D689C756
                                          APIs
                                          • _memset.LIBCMT ref: 007B72AA
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007B7351
                                          • IsMenu.USER32(?), ref: 007B7369
                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007B73B1
                                          • DrawMenuBar.USER32 ref: 007B73C4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Menu$Item$DrawInfoInsert_memset
                                          • String ID: 0
                                          • API String ID: 3866635326-4108050209
                                          • Opcode ID: 4c786b2fb4b03989a75998b45bcdb36c65388d3a62cfc7f7bd7ec8e5250d871b
                                          • Instruction ID: 03a75e3949c5ff7229952f065067c3733820d5be49837efeaab2d60093bf4efb
                                          • Opcode Fuzzy Hash: 4c786b2fb4b03989a75998b45bcdb36c65388d3a62cfc7f7bd7ec8e5250d871b
                                          • Instruction Fuzzy Hash: 8B412275A04248EFDB24DF64D884EEABBF8FB48350F148529FD15AB250D738AD60DB60
                                          APIs
                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 007B0FD4
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007B0FFE
                                          • FreeLibrary.KERNEL32(00000000), ref: 007B10B5
                                            • Part of subcall function 007B0FA5: RegCloseKey.ADVAPI32(?), ref: 007B101B
                                            • Part of subcall function 007B0FA5: FreeLibrary.KERNEL32(?), ref: 007B106D
                                            • Part of subcall function 007B0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 007B1090
                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 007B1058
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                                          • String ID:
                                          • API String ID: 395352322-0
                                          • Opcode ID: c06052001540d4186859300ad8e5cd417303c01917db04626472edd234e103a2
                                          • Instruction ID: b95cb9858ccf9ee2964357b2696f6f78daf910125ef0be2fc4711676b3020b85
                                          • Opcode Fuzzy Hash: c06052001540d4186859300ad8e5cd417303c01917db04626472edd234e103a2
                                          • Instruction Fuzzy Hash: 7D311A71900109FFDB15EBA4DC99FFFB7BCEF08300F40426AF501A2151EA789E859AA4
                                          APIs
                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 007B62EC
                                          • GetWindowLongW.USER32(013F4D98,000000F0), ref: 007B631F
                                          • GetWindowLongW.USER32(013F4D98,000000F0), ref: 007B6354
                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 007B6386
                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007B63B0
                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 007B63C1
                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 007B63DB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: LongWindow$MessageSend
                                          • String ID:
                                          • API String ID: 2178440468-0
                                          • Opcode ID: d72f9da3898e0815c2c30e7e74d3171f9fc67815a905f3a47263214ded91d5a4
                                          • Instruction ID: 7fa594cf8819fcee6c0edc25c864f8dc82d841e5a484f71b0d3e10b475390a1f
                                          • Opcode Fuzzy Hash: d72f9da3898e0815c2c30e7e74d3171f9fc67815a905f3a47263214ded91d5a4
                                          • Instruction Fuzzy Hash: 8131E035644650EFDB208F18DC88FA537E1FB4A754F1982A4FA019B2B2CB79A840DB55
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0078DB2E
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0078DB54
                                          • SysAllocString.OLEAUT32(00000000), ref: 0078DB57
                                          • SysAllocString.OLEAUT32(?), ref: 0078DB75
                                          • SysFreeString.OLEAUT32(?), ref: 0078DB7E
                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 0078DBA3
                                          • SysAllocString.OLEAUT32(?), ref: 0078DBB1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                          • String ID:
                                          • API String ID: 3761583154-0
                                          • Opcode ID: d5e598183cc952c645db13bb647cfc2277c477b7cdac9d0846894bda1f83f4eb
                                          • Instruction ID: 0c23217211d72ea6d279c5217f279d91c87b844bdf14313800ebef843f954eaf
                                          • Opcode Fuzzy Hash: d5e598183cc952c645db13bb647cfc2277c477b7cdac9d0846894bda1f83f4eb
                                          • Instruction Fuzzy Hash: 6721B676600219AFDF20EFB8DC88DBB77ACEB09760B118525FD14DB290D678DC4587A8
                                          APIs
                                            • Part of subcall function 007A7D8B: inet_addr.WSOCK32(00000000), ref: 007A7DB6
                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 007A61C6
                                          • WSAGetLastError.WSOCK32(00000000), ref: 007A61D5
                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 007A620E
                                          • connect.WSOCK32(00000000,?,00000010), ref: 007A6217
                                          • WSAGetLastError.WSOCK32 ref: 007A6221
                                          • closesocket.WSOCK32(00000000), ref: 007A624A
                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 007A6263
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                          • String ID:
                                          • API String ID: 910771015-0
                                          • Opcode ID: 1e6e0d4bdd04e8e6d1b7d08391b6f56b55f9f10d15a3d3616c4b38e3c05c8102
                                          • Instruction ID: 3102648f1dfb8d534fa08c0179b50c31025934e0f8f8623a47ecea485eb5c411
                                          • Opcode Fuzzy Hash: 1e6e0d4bdd04e8e6d1b7d08391b6f56b55f9f10d15a3d3616c4b38e3c05c8102
                                          • Instruction Fuzzy Hash: D7318471600118ABEF10AF64CC89FBD7BA9EB85750F048169F90597291DB78AD448B61
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __wcsnicmp
                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                          • API String ID: 1038674560-2734436370
                                          • Opcode ID: 94c7c31385d0c3247caa81a051d6759ca1534bfdd178a9aa438735aed2a228b8
                                          • Instruction ID: 2c1e017c24decee93f7b2eae3d8d3041fbf755adfc619bb1840cce38c9a8f799
                                          • Opcode Fuzzy Hash: 94c7c31385d0c3247caa81a051d6759ca1534bfdd178a9aa438735aed2a228b8
                                          • Instruction Fuzzy Hash: E82149B2294512E6E220F634AC07FA77398DF59350F50443DF84696052FB9D9D46C3A5
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0078DC09
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0078DC2F
                                          • SysAllocString.OLEAUT32(00000000), ref: 0078DC32
                                          • SysAllocString.OLEAUT32 ref: 0078DC53
                                          • SysFreeString.OLEAUT32 ref: 0078DC5C
                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 0078DC76
                                          • SysAllocString.OLEAUT32(?), ref: 0078DC84
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                          • String ID:
                                          • API String ID: 3761583154-0
                                          • Opcode ID: b9d009ead561d71cc18c532f4ab49e76e4b1eab65a94aed51e897f405eabea12
                                          • Instruction ID: b53da2bb966cb270c43f1c5ca617b190dd55f01b49eb9dd4b54c4276d535e34e
                                          • Opcode Fuzzy Hash: b9d009ead561d71cc18c532f4ab49e76e4b1eab65a94aed51e897f405eabea12
                                          • Instruction Fuzzy Hash: 8E214475644204AF9B20FFA8DC89DAB77ECEB09760B108125F914CB2A1D6B8DC41C764
                                          APIs
                                            • Part of subcall function 00731D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00731D73
                                            • Part of subcall function 00731D35: GetStockObject.GDI32(00000011), ref: 00731D87
                                            • Part of subcall function 00731D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00731D91
                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 007B7632
                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 007B763F
                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 007B764A
                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 007B7659
                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 007B7665
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$CreateObjectStockWindow
                                          • String ID: Msctls_Progress32
                                          • API String ID: 1025951953-3636473452
                                          • Opcode ID: 70a24a020936311847727d88b71632eb2fd2aa079b4d2bd631950188b812b257
                                          • Instruction ID: ec230dce9d553ccf119a1e945464d609babb88f83e0a4c1a333cc4531bfc84f8
                                          • Opcode Fuzzy Hash: 70a24a020936311847727d88b71632eb2fd2aa079b4d2bd631950188b812b257
                                          • Instruction Fuzzy Hash: 0E11B2B2110219BFEF159F64CC85EE77F6DEF08798F014115FB04A60A0CA76AC21DBA4
                                          APIs
                                          • __init_pointers.LIBCMT ref: 00759AE6
                                            • Part of subcall function 00753187: EncodePointer.KERNEL32(00000000), ref: 0075318A
                                            • Part of subcall function 00753187: __initp_misc_winsig.LIBCMT ref: 007531A5
                                            • Part of subcall function 00753187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00759EA0
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00759EB4
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00759EC7
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00759EDA
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00759EED
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00759F00
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00759F13
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00759F26
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00759F39
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00759F4C
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00759F5F
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00759F72
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00759F85
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00759F98
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00759FAB
                                            • Part of subcall function 00753187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00759FBE
                                          • __mtinitlocks.LIBCMT ref: 00759AEB
                                          • __mtterm.LIBCMT ref: 00759AF4
                                            • Part of subcall function 00759B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00759AF9,00757CD0,007EA0B8,00000014), ref: 00759C56
                                            • Part of subcall function 00759B5C: _free.LIBCMT ref: 00759C5D
                                            • Part of subcall function 00759B5C: DeleteCriticalSection.KERNEL32(007EEC00,?,?,00759AF9,00757CD0,007EA0B8,00000014), ref: 00759C7F
                                          • __calloc_crt.LIBCMT ref: 00759B19
                                          • __initptd.LIBCMT ref: 00759B3B
                                          • GetCurrentThreadId.KERNEL32 ref: 00759B42
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                          • String ID:
                                          • API String ID: 3567560977-0
                                          • Opcode ID: 45bdf250d9f29a6be9798c6ca832aa61d88ced22c3bfd14ec83a11adfcaf64cf
                                          • Instruction ID: f4d32a44d5719e97036174ed9524917625990c4b8b5c563b7be95b75f80db2be
                                          • Opcode Fuzzy Hash: 45bdf250d9f29a6be9798c6ca832aa61d88ced22c3bfd14ec83a11adfcaf64cf
                                          • Instruction Fuzzy Hash: 15F0C23260A715EAF62476787C0B6CA3690DB02732B208A1AFE10D50D2FEDC98494565
                                          APIs
                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00753F85), ref: 00754085
                                          • GetProcAddress.KERNEL32(00000000), ref: 0075408C
                                          • EncodePointer.KERNEL32(00000000), ref: 00754097
                                          • DecodePointer.KERNEL32(00753F85), ref: 007540B2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                          • String ID: RoUninitialize$combase.dll
                                          • API String ID: 3489934621-2819208100
                                          • Opcode ID: 42c4324116814780b7b494304f507d201a52935f42228a303ef751b82cd68d24
                                          • Instruction ID: dab0ee8c50f70f072fa9693ef77b31538325d0c48cbc188c5c51ea59930ad50f
                                          • Opcode Fuzzy Hash: 42c4324116814780b7b494304f507d201a52935f42228a303ef751b82cd68d24
                                          • Instruction Fuzzy Hash: 34E09A70645605ABDA109F61EC09F553BA4B714B46F148628F511D11A0CBBE5684CA19
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove$__itow__swprintf
                                          • String ID:
                                          • API String ID: 3253778849-0
                                          • Opcode ID: a5949a5a8617db4c5741801bd851b8f9126fbbcc744c2f3eb8fa314980665f8a
                                          • Instruction ID: f0765fea3f8c79382f0a3b9075dd4b711d519ce1a4f6caebfe8c69d9f7272cf4
                                          • Opcode Fuzzy Hash: a5949a5a8617db4c5741801bd851b8f9126fbbcc744c2f3eb8fa314980665f8a
                                          • Instruction Fuzzy Hash: DB61AA3090025AEBDF02EF64DC8AEFE37A5AF44308F044618FD556B292DB79E805CB90
                                          APIs
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                            • Part of subcall function 007B0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007AFDAD,?,?), ref: 007B0E31
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007B02BD
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007B02FD
                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 007B0320
                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 007B0349
                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 007B038C
                                          • RegCloseKey.ADVAPI32(00000000), ref: 007B0399
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                          • String ID:
                                          • API String ID: 4046560759-0
                                          • Opcode ID: 6a5846053db42dd99d6b52e21a7cf975d8beb88a367d43984c5ae544e87d6fcf
                                          • Instruction ID: 0a9572ba6f16d1741075150b17ecef1fb2a7dfaa804e4dbd14d59e50f17cd746
                                          • Opcode Fuzzy Hash: 6a5846053db42dd99d6b52e21a7cf975d8beb88a367d43984c5ae544e87d6fcf
                                          • Instruction Fuzzy Hash: 48514871208204EFD714EF64C889EABBBE9FF84714F04491DF545872A2DB79E905CB92
                                          APIs
                                          • GetMenu.USER32(?), ref: 007B57FB
                                          • GetMenuItemCount.USER32(00000000), ref: 007B5832
                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007B585A
                                          • GetMenuItemID.USER32(?,?), ref: 007B58C9
                                          • GetSubMenu.USER32(?,?), ref: 007B58D7
                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 007B5928
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Menu$Item$CountMessagePostString
                                          • String ID:
                                          • API String ID: 650687236-0
                                          • Opcode ID: 452d97b75c03a7dfcc0363dc6767725667ec55b58af559fe51e38b3851243cd4
                                          • Instruction ID: 47fbe9849c0c00c0c4caa3ab528d07eba3372ce87d26848bfa43207299a920d6
                                          • Opcode Fuzzy Hash: 452d97b75c03a7dfcc0363dc6767725667ec55b58af559fe51e38b3851243cd4
                                          • Instruction Fuzzy Hash: 93514935A00615EFDF11EF64C849BEEB7B4EF48720F104069E945BB352CB79AE418B90
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 0078EF06
                                          • VariantClear.OLEAUT32(00000013), ref: 0078EF78
                                          • VariantClear.OLEAUT32(00000000), ref: 0078EFD3
                                          • _memmove.LIBCMT ref: 0078EFFD
                                          • VariantClear.OLEAUT32(?), ref: 0078F04A
                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0078F078
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Variant$Clear$ChangeInitType_memmove
                                          • String ID:
                                          • API String ID: 1101466143-0
                                          • Opcode ID: 21bf7799000e75ea6ab21b12cf94e8fa72cd9aa59e57910140fb26a5632aab66
                                          • Instruction ID: 4d3b83a22bc44f7c0cb46c6dd1cffaecd9efd974c206b5f8a7d76e2082a88f1f
                                          • Opcode Fuzzy Hash: 21bf7799000e75ea6ab21b12cf94e8fa72cd9aa59e57910140fb26a5632aab66
                                          • Instruction Fuzzy Hash: CF5149B5A00209EFDB14DF58C884AAAB7B8FF4C314B158569ED59DB301E739E911CBA0
                                          APIs
                                          • _memset.LIBCMT ref: 00792258
                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007922A3
                                          • IsMenu.USER32(00000000), ref: 007922C3
                                          • CreatePopupMenu.USER32 ref: 007922F7
                                          • GetMenuItemCount.USER32(000000FF), ref: 00792355
                                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00792386
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                          • String ID:
                                          • API String ID: 3311875123-0
                                          • Opcode ID: f30c6ed5e61f70cd5ac72150c2c316225e48869d7ff4ba88abd86b86bca34a4d
                                          • Instruction ID: a6a5e9b3cabc3b63516b2fd9a8ea0fd665d1973e1847eac974c2b24847e704e9
                                          • Opcode Fuzzy Hash: f30c6ed5e61f70cd5ac72150c2c316225e48869d7ff4ba88abd86b86bca34a4d
                                          • Instruction Fuzzy Hash: 7D51AF70600209FFDF21EF68E888BADBBF5BF45314F108229E811A7292D77D9946CB51
                                          APIs
                                            • Part of subcall function 00732612: GetWindowLongW.USER32(?,000000EB), ref: 00732623
                                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 0073179A
                                          • GetWindowRect.USER32(?,?), ref: 007317FE
                                          • ScreenToClient.USER32(?,?), ref: 0073181B
                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0073182C
                                          • EndPaint.USER32(?,?), ref: 00731876
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                          • String ID:
                                          • API String ID: 1827037458-0
                                          • Opcode ID: 27121a53c8bb814d1a2da9dfb8a6968db8ab472b8b0eb8d0af1db6e9f57bbf26
                                          • Instruction ID: 2724cc6b5497b8223361854518b2332e0095e412035147678e83c2529bcdaaae
                                          • Opcode Fuzzy Hash: 27121a53c8bb814d1a2da9dfb8a6968db8ab472b8b0eb8d0af1db6e9f57bbf26
                                          • Instruction Fuzzy Hash: 0C41A031504701EFE710DF28CC84FB67BE8EB4A734F048668FA95872A2C7389845DB65
                                          APIs
                                          • ShowWindow.USER32(007F57B0,00000000,013F4D98,?,?,007F57B0,?,007BB5A8,?,?), ref: 007BB712
                                          • EnableWindow.USER32(00000000,00000000), ref: 007BB736
                                          • ShowWindow.USER32(007F57B0,00000000,013F4D98,?,?,007F57B0,?,007BB5A8,?,?), ref: 007BB796
                                          • ShowWindow.USER32(00000000,00000004,?,007BB5A8,?,?), ref: 007BB7A8
                                          • EnableWindow.USER32(00000000,00000001), ref: 007BB7CC
                                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 007BB7EF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$Show$Enable$MessageSend
                                          • String ID:
                                          • API String ID: 642888154-0
                                          • Opcode ID: badac653824e6d201482395f2a81b5d9a33344b52c9f197c5316532de07f2f21
                                          • Instruction ID: 910dc56d65aa557abef22cc0bc63b08962ebc1f98ce392156d1ebed877ff352e
                                          • Opcode Fuzzy Hash: badac653824e6d201482395f2a81b5d9a33344b52c9f197c5316532de07f2f21
                                          • Instruction Fuzzy Hash: 20418134600640AFDB21CF24C899FD47BE0FF45714F5881BAED488F6A2CBB5A856CB50
                                          APIs
                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,007A4E41,?,?,00000000,00000001), ref: 007A70AC
                                            • Part of subcall function 007A39A0: GetWindowRect.USER32(?,?), ref: 007A39B3
                                          • GetDesktopWindow.USER32 ref: 007A70D6
                                          • GetWindowRect.USER32(00000000), ref: 007A70DD
                                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 007A710F
                                            • Part of subcall function 00795244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007952BC
                                          • GetCursorPos.USER32(?), ref: 007A713B
                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007A7199
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                          • String ID:
                                          • API String ID: 4137160315-0
                                          • Opcode ID: d041fc4f2a320f26ba301e7b9b608335b351dfda11d4e7e40e5f1a9177897a38
                                          • Instruction ID: 39b3c2252f854d40ecf1e7d86d1a71304d6e33bfdd37f8efe17623030aedcb95
                                          • Opcode Fuzzy Hash: d041fc4f2a320f26ba301e7b9b608335b351dfda11d4e7e40e5f1a9177897a38
                                          • Instruction Fuzzy Hash: 7731E172509309ABC724DF14DC49F9BB7E9FFC9304F004A29F48497191CA38EA09CB96
                                          APIs
                                            • Part of subcall function 007880A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007880C0
                                            • Part of subcall function 007880A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007880CA
                                            • Part of subcall function 007880A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007880D9
                                            • Part of subcall function 007880A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007880E0
                                            • Part of subcall function 007880A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007880F6
                                          • GetLengthSid.ADVAPI32(?,00000000,0078842F), ref: 007888CA
                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007888D6
                                          • HeapAlloc.KERNEL32(00000000), ref: 007888DD
                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 007888F6
                                          • GetProcessHeap.KERNEL32(00000000,00000000,0078842F), ref: 0078890A
                                          • HeapFree.KERNEL32(00000000), ref: 00788911
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                          • String ID:
                                          • API String ID: 3008561057-0
                                          • Opcode ID: 2a757d430216de4eeb0ef754a8851766f1f5d62a5353355a8b292cbce3a493ff
                                          • Instruction ID: 77b273d9c800612ca9efc20cc1838d8a9dbbb97337fd9c8f65b844358f6372dd
                                          • Opcode Fuzzy Hash: 2a757d430216de4eeb0ef754a8851766f1f5d62a5353355a8b292cbce3a493ff
                                          • Instruction Fuzzy Hash: AC11B171551209FFDB50AFA8DC09FBE7769EF44311F908528E85597210CB3AAD00DB62
                                          APIs
                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007885E2
                                          • OpenProcessToken.ADVAPI32(00000000), ref: 007885E9
                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007885F8
                                          • CloseHandle.KERNEL32(00000004), ref: 00788603
                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00788632
                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00788646
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                          • String ID:
                                          • API String ID: 1413079979-0
                                          • Opcode ID: fc488c731c6e4aff114502a0b1a41a1bb27079fa6cd2c7c3e8321869c81d0e11
                                          • Instruction ID: 6a5c3271c81f825322755e10541d85ffcb30da83d9ca45ef43b8d1d25964fcd5
                                          • Opcode Fuzzy Hash: fc488c731c6e4aff114502a0b1a41a1bb27079fa6cd2c7c3e8321869c81d0e11
                                          • Instruction Fuzzy Hash: 67116A7254020DABDF019FA8DD49FDE7BA9EF08704F048164FE04A2161C77A8D60EB61
                                          APIs
                                          • GetDC.USER32(00000000), ref: 0078B7B5
                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 0078B7C6
                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0078B7CD
                                          • ReleaseDC.USER32(00000000,00000000), ref: 0078B7D5
                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0078B7EC
                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0078B7FE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CapsDevice$Release
                                          • String ID:
                                          • API String ID: 1035833867-0
                                          • Opcode ID: b870d03de368d13063e165da1a0e73eee1dd7b847ab204ec1138cf8383aa6dc0
                                          • Instruction ID: 1e76193b12bac9949750b893be14422089d62b943e3e05a88b5810f877b4e5bc
                                          • Opcode Fuzzy Hash: b870d03de368d13063e165da1a0e73eee1dd7b847ab204ec1138cf8383aa6dc0
                                          • Instruction Fuzzy Hash: 11017175A40309BBEB10ABA69C49F5EBFA8EB48711F008166FE04A7291D6349C00CF91
                                          APIs
                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00750193
                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 0075019B
                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007501A6
                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 007501B1
                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 007501B9
                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 007501C1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Virtual
                                          • String ID:
                                          • API String ID: 4278518827-0
                                          • Opcode ID: 97af032ba25793d21ef91bcab3d00fc8d5e446880dd45a92f88ac4014d860d7a
                                          • Instruction ID: 12c4ff67ee73e7d33c919a264c448ebd9f7a5ebc5c3657b0869f4f408c23b1ab
                                          • Opcode Fuzzy Hash: 97af032ba25793d21ef91bcab3d00fc8d5e446880dd45a92f88ac4014d860d7a
                                          • Instruction Fuzzy Hash: C6016CB0901759BDE3008F5A8C85B52FFA8FF19754F00411BE15C47941C7F5A864CBE5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007953F9
                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0079540F
                                          • GetWindowThreadProcessId.USER32(?,?), ref: 0079541E
                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0079542D
                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00795437
                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0079543E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                          • String ID:
                                          • API String ID: 839392675-0
                                          • Opcode ID: 31ac676e8f4f64160f43d9cbef5641e51066a32c6b74ed70e32c84d9772fb9f0
                                          • Instruction ID: 723118a9430f1599fca6d1e0d0716d70f62973546c9d4c7b557977f567bd3862
                                          • Opcode Fuzzy Hash: 31ac676e8f4f64160f43d9cbef5641e51066a32c6b74ed70e32c84d9772fb9f0
                                          • Instruction Fuzzy Hash: 76F06D32640158BBE7215BA69C0DFEB7B7CEBCAF15F004269FA04D106096A81A0187B9
                                          APIs
                                          • InterlockedExchange.KERNEL32(?,?), ref: 00797243
                                          • EnterCriticalSection.KERNEL32(?,?,00740EE4,?,?), ref: 00797254
                                          • TerminateThread.KERNEL32(00000000,000001F6,?,00740EE4,?,?), ref: 00797261
                                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00740EE4,?,?), ref: 0079726E
                                            • Part of subcall function 00796C35: CloseHandle.KERNEL32(00000000,?,0079727B,?,00740EE4,?,?), ref: 00796C3F
                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00797281
                                          • LeaveCriticalSection.KERNEL32(?,?,00740EE4,?,?), ref: 00797288
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                          • String ID:
                                          • API String ID: 3495660284-0
                                          • Opcode ID: 82465cd7757894c7c1b689e890185e3d40189dc823cc05ad9c56dee7592b11b6
                                          • Instruction ID: 2191063732dfaf4893b1a584dcfa96721ae33805a3dcd2e9aa88042246262686
                                          • Opcode Fuzzy Hash: 82465cd7757894c7c1b689e890185e3d40189dc823cc05ad9c56dee7592b11b6
                                          • Instruction Fuzzy Hash: 47F03A36540612EBDB121B64ED4CEDE7739FF45B02B104631F502D50A0CB7E5801CB64
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0078899D
                                          • UnloadUserProfile.USERENV(?,?), ref: 007889A9
                                          • CloseHandle.KERNEL32(?), ref: 007889B2
                                          • CloseHandle.KERNEL32(?), ref: 007889BA
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 007889C3
                                          • HeapFree.KERNEL32(00000000), ref: 007889CA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                          • String ID:
                                          • API String ID: 146765662-0
                                          • Opcode ID: 40a93ff8716eda121a04bad0b3c2d068f2d2af65802fd1c4417342c17ab7a50b
                                          • Instruction ID: c280ecd3fcea8e66ac0927720c95ca50bc5069dae0013c85245c4d2f8d5badce
                                          • Opcode Fuzzy Hash: 40a93ff8716eda121a04bad0b3c2d068f2d2af65802fd1c4417342c17ab7a50b
                                          • Instruction Fuzzy Hash: F5E05276104509FBDA011FE5EC0CE5ABFA9FB89B62B548731F219C1470CB3A9861DB58
                                          APIs
                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,007C2C7C,?), ref: 007876EA
                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,007C2C7C,?), ref: 00787702
                                          • CLSIDFromProgID.OLE32(?,?,00000000,007BFB80,000000FF,?,00000000,00000800,00000000,?,007C2C7C,?), ref: 00787727
                                          • _memcmp.LIBCMT ref: 00787748
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FromProg$FreeTask_memcmp
                                          • String ID: ,,|
                                          • API String ID: 314563124-2928947247
                                          • Opcode ID: ce41799c78093c3e72febc65459f46837a7c9aecf74804900359b15cfae44695
                                          • Instruction ID: 7a2c0f1a77b2f25c6a98dbc18596e90d6f14d72f776d2fecb6c5c582fb5ff630
                                          • Opcode Fuzzy Hash: ce41799c78093c3e72febc65459f46837a7c9aecf74804900359b15cfae44695
                                          • Instruction Fuzzy Hash: D5810D75A00109EFCB04DFA4C988EEEB7B9FF89315F204558F506AB251DB75AE06CB60
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 007A8613
                                          • CharUpperBuffW.USER32(?,?), ref: 007A8722
                                          • VariantClear.OLEAUT32(?), ref: 007A889A
                                            • Part of subcall function 00797562: VariantInit.OLEAUT32(00000000), ref: 007975A2
                                            • Part of subcall function 00797562: VariantCopy.OLEAUT32(00000000,?), ref: 007975AB
                                            • Part of subcall function 00797562: VariantClear.OLEAUT32(00000000), ref: 007975B7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                          • API String ID: 4237274167-1221869570
                                          • Opcode ID: c51bb67ae9b1b341a1a0eb544a0418933dbbaeb70263cf402bdab352f3ec2d34
                                          • Instruction ID: 452f30c8d1904f92316b7cb7b09ff530ae32d8956a150f8d88b12165be9cd49c
                                          • Opcode Fuzzy Hash: c51bb67ae9b1b341a1a0eb544a0418933dbbaeb70263cf402bdab352f3ec2d34
                                          • Instruction Fuzzy Hash: 00916B71604301DFCB50DF24C48595ABBE4EFCA714F148A2DF99A8B362DB39E905CB92
                                          APIs
                                            • Part of subcall function 0074FC86: _wcscpy.LIBCMT ref: 0074FCA9
                                          • _memset.LIBCMT ref: 00792B87
                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00792BB6
                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00792C69
                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00792C97
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                                          • String ID: 0
                                          • API String ID: 4152858687-4108050209
                                          • Opcode ID: 22f4cffda48d945ed8878c38d9a392a32ebd84423ef811ec1c0b90061dc3b9fd
                                          • Instruction ID: 55cecd7a3b67aa7a7589842c17c47d7b4e8a6403d4287d36587f1cedb46c4d84
                                          • Opcode Fuzzy Hash: 22f4cffda48d945ed8878c38d9a392a32ebd84423ef811ec1c0b90061dc3b9fd
                                          • Instruction Fuzzy Hash: 2251C471508301AADB24FF28E845A6F77E4EF56350F144A2DF895D31A2DB78CD06C7A2
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove$_free
                                          • String ID: 3ct$_t
                                          • API String ID: 2620147621-1670605766
                                          • Opcode ID: cfe8e9f3f2c5a52513844a8c0988385d4d434102435d459f0fecaebeebc69c66
                                          • Instruction ID: 3305dda857f09488474ba0ca2a2084898468ec3735d1926352ac2904e734fcd7
                                          • Opcode Fuzzy Hash: cfe8e9f3f2c5a52513844a8c0988385d4d434102435d459f0fecaebeebc69c66
                                          • Instruction Fuzzy Hash: 4A516B716047818FDB25CF28C441BAABBF5BF85350F08892DE98D87351EB39E905CB92
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memset$_memmove
                                          • String ID: 3ct$ERCP
                                          • API String ID: 2532777613-50398335
                                          • Opcode ID: e40f9e66306d41204efdc87978ba38c467b753dd439f5443cf509c68d0766866
                                          • Instruction ID: a1ffefca67ef2d6d092e2b16a5d6a7fb4faa81e162dfa56a2e9507bc9ed73e19
                                          • Opcode Fuzzy Hash: e40f9e66306d41204efdc87978ba38c467b753dd439f5443cf509c68d0766866
                                          • Instruction Fuzzy Hash: 4D51AF71A00309EBDB24DF65C8457EAB7F4FF09304F20456EE94ACB241E7B8AA44CB91
                                          APIs
                                          • _memset.LIBCMT ref: 007927C0
                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007927DC
                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00792822
                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,007F5890,00000000), ref: 0079286B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Menu$Delete$InfoItem_memset
                                          • String ID: 0
                                          • API String ID: 1173514356-4108050209
                                          • Opcode ID: d0185fab37b5155d69a69f33bf51b141c3d308fe5f7116d1af3a42eabfb5eb24
                                          • Instruction ID: a0083b05f5a094ea87736cb361b0167b1d927cfb108d8efd10008845407c93e3
                                          • Opcode Fuzzy Hash: d0185fab37b5155d69a69f33bf51b141c3d308fe5f7116d1af3a42eabfb5eb24
                                          • Instruction Fuzzy Hash: 2E41B274204301AFDB24EF24EC44F6ABBE4EF85314F144A2DF96597292D738E806CB62
                                          APIs
                                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 007AD7C5
                                            • Part of subcall function 0073784B: _memmove.LIBCMT ref: 00737899
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: BuffCharLower_memmove
                                          • String ID: cdecl$none$stdcall$winapi
                                          • API String ID: 3425801089-567219261
                                          • Opcode ID: e499cf0eacf7777b0a1fe26a0d126e4baacdd43fc6298291f7651a112ad96074
                                          • Instruction ID: ac786952a08d488ee4c60585df61ab505f2e2e3b5dac70104ce8491b267b6a5c
                                          • Opcode Fuzzy Hash: e499cf0eacf7777b0a1fe26a0d126e4baacdd43fc6298291f7651a112ad96074
                                          • Instruction Fuzzy Hash: 8831CF71904219EBDF24EF54C8559EEB3B4FF45320F008629E82697AD2DB79AD05CB80
                                          APIs
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                            • Part of subcall function 0078AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0078AABC
                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00788F14
                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00788F27
                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00788F57
                                            • Part of subcall function 00737BCC: _memmove.LIBCMT ref: 00737C06
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$_memmove$ClassName
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 365058703-1403004172
                                          • Opcode ID: 191d8640ed01be0f86e302501d61439c833e6d65c34b606702760158e332797f
                                          • Instruction ID: 30bfccb9b96a6230d704760e41cdf9b024430c61be76bc6b3e0f62825abde525
                                          • Opcode Fuzzy Hash: 191d8640ed01be0f86e302501d61439c833e6d65c34b606702760158e332797f
                                          • Instruction Fuzzy Hash: 5121F2B1A80104FAEB18BBB08C4ADFEB769DF05320F14811AF921A72E1DB3D1809D711
                                          APIs
                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007A184C
                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 007A1872
                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007A18A2
                                          • InternetCloseHandle.WININET(00000000), ref: 007A18E9
                                            • Part of subcall function 007A2483: GetLastError.KERNEL32(?,?,007A1817,00000000,00000000,00000001), ref: 007A2498
                                            • Part of subcall function 007A2483: SetEvent.KERNEL32(?,?,007A1817,00000000,00000000,00000001), ref: 007A24AD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                          • String ID:
                                          • API String ID: 3113390036-3916222277
                                          • Opcode ID: e155ed68bb046e85b88d0d9edc88059f36d77c9cffb366504654a6e7d680dd1b
                                          • Instruction ID: 85b88cd0e7fb48c4da5278f03d80f309b873a3a4c227388d00ba478ebd4b5b23
                                          • Opcode Fuzzy Hash: e155ed68bb046e85b88d0d9edc88059f36d77c9cffb366504654a6e7d680dd1b
                                          • Instruction Fuzzy Hash: 2E21B0B1500308BFFB119B64CC89EBB77EDEB8AB54F50822AF80596140EA2C9D0597A5
                                          APIs
                                            • Part of subcall function 00731D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00731D73
                                            • Part of subcall function 00731D35: GetStockObject.GDI32(00000011), ref: 00731D87
                                            • Part of subcall function 00731D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00731D91
                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 007B6461
                                          • LoadLibraryW.KERNEL32(?), ref: 007B6468
                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 007B647D
                                          • DestroyWindow.USER32(?), ref: 007B6485
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                          • String ID: SysAnimate32
                                          • API String ID: 4146253029-1011021900
                                          • Opcode ID: 18c587c54d94da24a6c97a439ef639756804b8f5684ef7332fb378737b098db0
                                          • Instruction ID: a8cf98b26d31dbd24ebc04064c329ad6ea544c2b13a1309dd37ea2b8f5ccc0e6
                                          • Opcode Fuzzy Hash: 18c587c54d94da24a6c97a439ef639756804b8f5684ef7332fb378737b098db0
                                          • Instruction Fuzzy Hash: C5217971210645AFEF104F64DC84FFA77A9EB59728F108629FB1093090D67DDC419760
                                          APIs
                                          • GetStdHandle.KERNEL32(0000000C), ref: 00796DBC
                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00796DEF
                                          • GetStdHandle.KERNEL32(0000000C), ref: 00796E01
                                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00796E3B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CreateHandle$FilePipe
                                          • String ID: nul
                                          • API String ID: 4209266947-2873401336
                                          • Opcode ID: a680ad9688dcdd61b65eb95cc659f1226a839d7190e7b3cc717013cb4eab795d
                                          • Instruction ID: b255befd710ad204b14f74ceb9c64e175a77bfa418cc38a6fe4931821dd3fd1d
                                          • Opcode Fuzzy Hash: a680ad9688dcdd61b65eb95cc659f1226a839d7190e7b3cc717013cb4eab795d
                                          • Instruction Fuzzy Hash: DA215175700209ABDF209F29EC05A9A77A4FF45720F204B19FDA1D72D0D7789950CB54
                                          APIs
                                          • GetStdHandle.KERNEL32(000000F6), ref: 00796E89
                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00796EBB
                                          • GetStdHandle.KERNEL32(000000F6), ref: 00796ECC
                                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00796F06
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CreateHandle$FilePipe
                                          • String ID: nul
                                          • API String ID: 4209266947-2873401336
                                          • Opcode ID: f7d7870fa1a64a52b364afa8ff18a625114d3a5524fb890db674e6ec8391a9bf
                                          • Instruction ID: 4d763728f3ab787a583cd43f24ece8752b0a2c1e0d872d44ce40549e406f4920
                                          • Opcode Fuzzy Hash: f7d7870fa1a64a52b364afa8ff18a625114d3a5524fb890db674e6ec8391a9bf
                                          • Instruction Fuzzy Hash: 65217179500305ABDF209F69EC04A9A77A8FF45720F204B19FCA1D72D0E778A851CB65
                                          APIs
                                          • SetErrorMode.KERNEL32(00000001), ref: 0079AC54
                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0079ACA8
                                          • __swprintf.LIBCMT ref: 0079ACC1
                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,007BF910), ref: 0079ACFF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorMode$InformationVolume__swprintf
                                          • String ID: %lu
                                          • API String ID: 3164766367-685833217
                                          • Opcode ID: 5138e00ff5c2a23ec0db9a5b8685c6eac1ee12f17a3aa890cb891a07cc6e781b
                                          • Instruction ID: b27df0e7ba46e0be5380c0350de7da68a0d93aa44b65ec31d2fe545cc8b09780
                                          • Opcode Fuzzy Hash: 5138e00ff5c2a23ec0db9a5b8685c6eac1ee12f17a3aa890cb891a07cc6e781b
                                          • Instruction Fuzzy Hash: CC21A47060010DEFCB10DF58CD49EEE77B8EF49714B004069F909EB252DA75EA01CB61
                                          APIs
                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0078FCED,?,00790D40,?,00008000), ref: 0079115F
                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0078FCED,?,00790D40,?,00008000), ref: 00791184
                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0078FCED,?,00790D40,?,00008000), ref: 0079118E
                                          • Sleep.KERNEL32(?,?,?,?,?,?,?,0078FCED,?,00790D40,?,00008000), ref: 007911C1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CounterPerformanceQuerySleep
                                          • String ID: @y
                                          • API String ID: 2875609808-330097415
                                          • Opcode ID: a689d7b464721d6213d3089749efd97a8bd1edc7d2627aedddf231423aa51340
                                          • Instruction ID: 5eeb1492a1524281eefcbe08ed31354558164b21a289525a5f5027105392c4cb
                                          • Opcode Fuzzy Hash: a689d7b464721d6213d3089749efd97a8bd1edc7d2627aedddf231423aa51340
                                          • Instruction Fuzzy Hash: 73113C31D4051EE7CF009FA9E888BEEBB78FF09711F808555EA45B6240CB789960CB95
                                          APIs
                                          • CharUpperBuffW.USER32(?,?), ref: 00791B19
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: BuffCharUpper
                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                          • API String ID: 3964851224-769500911
                                          • Opcode ID: d314abe625546127adea76da4f4a047725f8dce0b37c97a2d5e1f063b295a789
                                          • Instruction ID: 6a432669e24706b7abb71390decdf8c1fef9ecf8c66554d2c558c7f7309bbaeb
                                          • Opcode Fuzzy Hash: d314abe625546127adea76da4f4a047725f8dce0b37c97a2d5e1f063b295a789
                                          • Instruction Fuzzy Hash: F9118E71900249CFCF00EF64D8558FEB3B5FF25304B548468D81567292EB3A5D1ACB40
                                          APIs
                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 007AEC07
                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 007AEC37
                                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 007AED6A
                                          • CloseHandle.KERNEL32(?), ref: 007AEDEB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                          • String ID:
                                          • API String ID: 2364364464-0
                                          • Opcode ID: c83e05a13a02c07c0178cc6650b950dfa593a2e47dcb8d882d23a8bd1bd9c4e2
                                          • Instruction ID: 30c5c1dbec82a2fa62fcd36bb97c33eb8b198bff7922554ab140fbae183eb68d
                                          • Opcode Fuzzy Hash: c83e05a13a02c07c0178cc6650b950dfa593a2e47dcb8d882d23a8bd1bd9c4e2
                                          • Instruction Fuzzy Hash: 678183716047109FE760EF28C88AF6AB7E5AF89710F04891DF995DB2D2DBB4AC40CB51
                                          APIs
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                            • Part of subcall function 007B0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,007AFDAD,?,?), ref: 007B0E31
                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007B00FD
                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007B013C
                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 007B0183
                                          • RegCloseKey.ADVAPI32(?,?), ref: 007B01AF
                                          • RegCloseKey.ADVAPI32(00000000), ref: 007B01BC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                          • String ID:
                                          • API String ID: 3440857362-0
                                          • Opcode ID: 06248520ab1e345240da9cab81ca688c69dbe3ae55463699da5d3d7c009b0e8a
                                          • Instruction ID: f2e70edce1e95d44a3309a45f50507d1939c238df7ddeb6992de9bf8ad84c9b2
                                          • Opcode Fuzzy Hash: 06248520ab1e345240da9cab81ca688c69dbe3ae55463699da5d3d7c009b0e8a
                                          • Instruction Fuzzy Hash: CF512971208208EFD714EB58CC85FAFB7E9AF84714F40891DF555872A2DB79E904CB92
                                          APIs
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 007AD927
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 007AD9AA
                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 007AD9C6
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 007ADA07
                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 007ADA21
                                            • Part of subcall function 00735A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00797896,?,?,00000000), ref: 00735A2C
                                            • Part of subcall function 00735A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00797896,?,?,00000000,?,?), ref: 00735A50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                          • String ID:
                                          • API String ID: 327935632-0
                                          • Opcode ID: 0beeaf2a914ad93f39925504a8db0d32d43b5de2eac7c62df49801343a102243
                                          • Instruction ID: 5aabdb70097cfaaf90392dcc264ee58d6ee84361f9250832a1516673f80865b5
                                          • Opcode Fuzzy Hash: 0beeaf2a914ad93f39925504a8db0d32d43b5de2eac7c62df49801343a102243
                                          • Instruction Fuzzy Hash: A3513675A00209DFDB10EFA8C4889ADB7B4EF49310F04C165E916AB312DB39ED45CF81
                                          APIs
                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0079E61F
                                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0079E648
                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0079E687
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0079E6AC
                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0079E6B4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                          • String ID:
                                          • API String ID: 1389676194-0
                                          • Opcode ID: d08ae08d9b7d1cdd77d26d0cc078f01d59f4c5f80db7d272ab74938726352732
                                          • Instruction ID: e9b61d447c3a3a9f5e27457ee63b00740f57f01c045216f50db78e922deee42c
                                          • Opcode Fuzzy Hash: d08ae08d9b7d1cdd77d26d0cc078f01d59f4c5f80db7d272ab74938726352732
                                          • Instruction Fuzzy Hash: C0510735A00205DFDB01EF64C985AADBBF5EF49314F1480A9E909AB362CB75ED11CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f40c026e16b2fea3b088b55358732aed04517f92fb2e843336b8e8e621d272a1
                                          • Instruction ID: 2b662bd4de75c46f9d6a30fdf286748052bd8c05401e90a7e89cf37eb44fef28
                                          • Opcode Fuzzy Hash: f40c026e16b2fea3b088b55358732aed04517f92fb2e843336b8e8e621d272a1
                                          • Instruction Fuzzy Hash: 2B41903590450CBBD760EB2CCC89FE9BBB8EB09310F144265F916A72E1D738AD41DA61
                                          APIs
                                          • GetCursorPos.USER32(?), ref: 00732357
                                          • ScreenToClient.USER32(007F57B0,?), ref: 00732374
                                          • GetAsyncKeyState.USER32(00000001), ref: 00732399
                                          • GetAsyncKeyState.USER32(00000002), ref: 007323A7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AsyncState$ClientCursorScreen
                                          • String ID:
                                          • API String ID: 4210589936-0
                                          • Opcode ID: 7528e81b8f509c68847ce0981c14899ae12d4d26e911f0c794968f5dc9080bf2
                                          • Instruction ID: 6d7d040ef3ec836b4f4baeb6817c8931e10b9a6e5f6b8f38fc0d39fc91c4b59e
                                          • Opcode Fuzzy Hash: 7528e81b8f509c68847ce0981c14899ae12d4d26e911f0c794968f5dc9080bf2
                                          • Instruction Fuzzy Hash: 38417F35604119FBDF299F68CC48BE9BB74FB05360F20431AF869D22A2C7389991DB91
                                          APIs
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007863E7
                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00786433
                                          • TranslateMessage.USER32(?), ref: 0078645C
                                          • DispatchMessageW.USER32(?), ref: 00786466
                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00786475
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                                          • String ID:
                                          • API String ID: 2108273632-0
                                          • Opcode ID: 72db66407603d31e9ed9ed823399f7b07d178fa08b01d87529971288a540f185
                                          • Instruction ID: f794d7d33a2eeeca7cb1e7e906c9da7071c3f72f00efa5945ae4fe369723b684
                                          • Opcode Fuzzy Hash: 72db66407603d31e9ed9ed823399f7b07d178fa08b01d87529971288a540f185
                                          • Instruction Fuzzy Hash: 5B31E571980686BFDB24EFB4CC48FBABBA8BB00310F108265E529C21A0E73D9545D760
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 00788A30
                                          • PostMessageW.USER32(?,00000201,00000001), ref: 00788ADA
                                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00788AE2
                                          • PostMessageW.USER32(?,00000202,00000000), ref: 00788AF0
                                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00788AF8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessagePostSleep$RectWindow
                                          • String ID:
                                          • API String ID: 3382505437-0
                                          • Opcode ID: 73afe6b1b6a968b9ccf0d75fa35d831d4e3ebce56873ce769d3300285841b568
                                          • Instruction ID: 1ecb824f0ca424dabcc34786cbd1e5d1ce23dbaa7516bd8fe70584302611a148
                                          • Opcode Fuzzy Hash: 73afe6b1b6a968b9ccf0d75fa35d831d4e3ebce56873ce769d3300285841b568
                                          • Instruction Fuzzy Hash: 7231B171500219EBDB14DFA8DD4DB9E3BB5EB04315F108229F925E62D0C7B49914DB92
                                          APIs
                                          • IsWindowVisible.USER32(?), ref: 0078B204
                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0078B221
                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0078B259
                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0078B27F
                                          • _wcsstr.LIBCMT ref: 0078B289
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                          • String ID:
                                          • API String ID: 3902887630-0
                                          • Opcode ID: 72960cf4e733ec0c1fbbb0fc09b6532202810b4755cc925dfe3bb0b822934b58
                                          • Instruction ID: 3d2cae3aa6f8bbb3351dc5dd459d8dd5e8d1f4e8c3e8ba2796a4809d36d61450
                                          • Opcode Fuzzy Hash: 72960cf4e733ec0c1fbbb0fc09b6532202810b4755cc925dfe3bb0b822934b58
                                          • Instruction Fuzzy Hash: 02210772644204BBEB25AB799C09E7F7B98EF49760F108139FC04DA161EFA9DC4197A0
                                          APIs
                                            • Part of subcall function 00732612: GetWindowLongW.USER32(?,000000EB), ref: 00732623
                                          • GetWindowLongW.USER32(?,000000F0), ref: 007BB192
                                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 007BB1B7
                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 007BB1CF
                                          • GetSystemMetrics.USER32(00000004), ref: 007BB1F8
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,007A0E90,00000000), ref: 007BB216
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$Long$MetricsSystem
                                          • String ID:
                                          • API String ID: 2294984445-0
                                          • Opcode ID: aa091a446b027187de78cb701ea1d97b7a552146baa491703c3d8d9f0829d3fe
                                          • Instruction ID: 859483d1e343942f4381ee94fc3677e12228ef37d3513aff2f1b558e5bd2edf6
                                          • Opcode Fuzzy Hash: aa091a446b027187de78cb701ea1d97b7a552146baa491703c3d8d9f0829d3fe
                                          • Instruction Fuzzy Hash: A4216071A10659AFCB209F39DC14BAA3BA4FB05761F158728FD22D71E0E7789920CB90
                                          APIs
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00789320
                                            • Part of subcall function 00737BCC: _memmove.LIBCMT ref: 00737C06
                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00789352
                                          • __itow.LIBCMT ref: 0078936A
                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00789392
                                          • __itow.LIBCMT ref: 007893A3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$__itow$_memmove
                                          • String ID:
                                          • API String ID: 2983881199-0
                                          • Opcode ID: 5cd6fed63a013ec36614543760abc5a44a00715a4c65d809f76fb9f4956b3805
                                          • Instruction ID: 2ba4edd191e517161757ac7a9ced9a5b8bb93ae81f4358a44a0d7607d7575ddd
                                          • Opcode Fuzzy Hash: 5cd6fed63a013ec36614543760abc5a44a00715a4c65d809f76fb9f4956b3805
                                          • Instruction Fuzzy Hash: FB21C571740208FBDB20AA648C8DEFE7BADEB49B14F084025FE45E71D1D6B88D459791
                                          APIs
                                          • IsWindow.USER32(00000000), ref: 007A5A6E
                                          • GetForegroundWindow.USER32 ref: 007A5A85
                                          • GetDC.USER32(00000000), ref: 007A5AC1
                                          • GetPixel.GDI32(00000000,?,00000003), ref: 007A5ACD
                                          • ReleaseDC.USER32(00000000,00000003), ref: 007A5B08
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$ForegroundPixelRelease
                                          • String ID:
                                          • API String ID: 4156661090-0
                                          • Opcode ID: d4cbb3b4ee0866c41d92f8fc1607b2db266369f2835913da5d781392c8015980
                                          • Instruction ID: d1c3ec562a585304ecfb69cc50bcd7c062a97ebb3d33c5c6732b243bfa9201e6
                                          • Opcode Fuzzy Hash: d4cbb3b4ee0866c41d92f8fc1607b2db266369f2835913da5d781392c8015980
                                          • Instruction Fuzzy Hash: 4621A475A00104EFDB00EFA4DC88E9ABBE5EF89710F14C579F84997352CA78AC01CB50
                                          APIs
                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0073134D
                                          • SelectObject.GDI32(?,00000000), ref: 0073135C
                                          • BeginPath.GDI32(?), ref: 00731373
                                          • SelectObject.GDI32(?,00000000), ref: 0073139C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ObjectSelect$BeginCreatePath
                                          • String ID:
                                          • API String ID: 3225163088-0
                                          • Opcode ID: 31ba17816d179fbfeecb9170a70fccc67a1021c9db17883de5ea1a89f0db1906
                                          • Instruction ID: 1456736cdd5cfa8c2ff437d903f4a48895e6fbbaa484a8c33b4aa8b85b3ebf45
                                          • Opcode Fuzzy Hash: 31ba17816d179fbfeecb9170a70fccc67a1021c9db17883de5ea1a89f0db1906
                                          • Instruction Fuzzy Hash: 51216D30800A08EFEB109F25EC04B797BA8FB047A1F54C326F910965B2D77C9895DF98
                                          APIs
                                          • GetCurrentThreadId.KERNEL32 ref: 00794ABA
                                          • __beginthreadex.LIBCMT ref: 00794AD8
                                          • MessageBoxW.USER32(?,?,?,?), ref: 00794AED
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00794B03
                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00794B0A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                          • String ID:
                                          • API String ID: 3824534824-0
                                          • Opcode ID: f1695ba069230ade50af7a47aea911e9d637fb845e94f36a5b034129da18bf3a
                                          • Instruction ID: 99a6fbcb8be24546beace79ab31222ae2444b9192dc0f16528917eb48e08ebc9
                                          • Opcode Fuzzy Hash: f1695ba069230ade50af7a47aea911e9d637fb845e94f36a5b034129da18bf3a
                                          • Instruction Fuzzy Hash: 841108B6904248BBCB008FACEC08FAB7FADEB49320F148365F914D3260D679C90487A4
                                          APIs
                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0078821E
                                          • GetLastError.KERNEL32(?,00787CE2,?,?,?), ref: 00788228
                                          • GetProcessHeap.KERNEL32(00000008,?,?,00787CE2,?,?,?), ref: 00788237
                                          • HeapAlloc.KERNEL32(00000000,?,00787CE2,?,?,?), ref: 0078823E
                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00788255
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 842720411-0
                                          • Opcode ID: 6fc51e82a181cfce7101defdacd3c485727fcc5efa54aabc122612f2567eb048
                                          • Instruction ID: 02e666f2c6e55b9866bfe34e26228fe8c616bec9e0c7b15d9c868e321ce22a69
                                          • Opcode Fuzzy Hash: 6fc51e82a181cfce7101defdacd3c485727fcc5efa54aabc122612f2567eb048
                                          • Instruction Fuzzy Hash: DB016271240208BFDB105FA9DC48D677BACFF857547504629F809C3120DA358C00CB60
                                          APIs
                                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00787044,80070057,?,?,?,00787455), ref: 00787127
                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00787044,80070057,?,?), ref: 00787142
                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00787044,80070057,?,?), ref: 00787150
                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00787044,80070057,?), ref: 00787160
                                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00787044,80070057,?,?), ref: 0078716C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                          • String ID:
                                          • API String ID: 3897988419-0
                                          • Opcode ID: b96576546373840e6fc57cc39790caa4a868b0e69d244b6b2ca4231a0796960d
                                          • Instruction ID: aa67e6dabf9aa00a6d633d0a5dcbd74d458f3878ee4504bd5d20dc502ec311d4
                                          • Opcode Fuzzy Hash: b96576546373840e6fc57cc39790caa4a868b0e69d244b6b2ca4231a0796960d
                                          • Instruction Fuzzy Hash: 57017172A05208ABDB159F64DC88FAA7BADEB84BA1F244164FD05D7210D739DD40D7A0
                                          APIs
                                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00795260
                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0079526E
                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00795276
                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00795280
                                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007952BC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                          • String ID:
                                          • API String ID: 2833360925-0
                                          • Opcode ID: 170064ab6654f0ebfe1267e3f80e46108bfd6126cd6b1f9e400a783f637ca96a
                                          • Instruction ID: 34a7e8d7adbce5ca1ab6b304d97fedbec6d79a91f02bc4b85f6ae0844ee3af27
                                          • Opcode Fuzzy Hash: 170064ab6654f0ebfe1267e3f80e46108bfd6126cd6b1f9e400a783f637ca96a
                                          • Instruction Fuzzy Hash: E50157B1D01A2DDBCF00EFE8EC48AEDBB78FB0D711F404566E941B2241CB38595087A5
                                          APIs
                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00788121
                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0078812B
                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0078813A
                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00788141
                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00788157
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                          • String ID:
                                          • API String ID: 44706859-0
                                          • Opcode ID: 9bc94537ddc681713f3bea44ef11ed2ff450f224db87728ce0b880159943a6eb
                                          • Instruction ID: dae074511820fd3d3f0e41146fa4ffc71596dbca77cb8aa63b00765caa38efab
                                          • Opcode Fuzzy Hash: 9bc94537ddc681713f3bea44ef11ed2ff450f224db87728ce0b880159943a6eb
                                          • Instruction Fuzzy Hash: 4DF0AF70280308BFEB516FA8EC8CF673BACEF49B54B404129F945C2160CF689C01DB61
                                          APIs
                                          • GetDlgItem.USER32(?,000003E9), ref: 0078C1F7
                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 0078C20E
                                          • MessageBeep.USER32(00000000), ref: 0078C226
                                          • KillTimer.USER32(?,0000040A), ref: 0078C242
                                          • EndDialog.USER32(?,00000001), ref: 0078C25C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                          • String ID:
                                          • API String ID: 3741023627-0
                                          • Opcode ID: 713069180364a2499f0b37ab6826178c8c8caa2829114d365c23da90e093e647
                                          • Instruction ID: 80d08f5f676e02b45d48f8ff093065da97a556df54ef42b8a8c47820492151d2
                                          • Opcode Fuzzy Hash: 713069180364a2499f0b37ab6826178c8c8caa2829114d365c23da90e093e647
                                          • Instruction Fuzzy Hash: DF01D630444704ABEB216B64ED4EF9677B8FF00F06F004369F982A14E1DBF86944CBA4
                                          APIs
                                          • EndPath.GDI32(?), ref: 007313BF
                                          • StrokeAndFillPath.GDI32(?,?,0076B888,00000000,?), ref: 007313DB
                                          • SelectObject.GDI32(?,00000000), ref: 007313EE
                                          • DeleteObject.GDI32 ref: 00731401
                                          • StrokePath.GDI32(?), ref: 0073141C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                          • String ID:
                                          • API String ID: 2625713937-0
                                          • Opcode ID: e1527dec706aad5796ec43a26bd3f0eafef0482f9625f601a5c1e7901cf27cc9
                                          • Instruction ID: 6f54fcab0126244945b0380c44814a99acdbf3362245b94f2f88f109e3094f5d
                                          • Opcode Fuzzy Hash: e1527dec706aad5796ec43a26bd3f0eafef0482f9625f601a5c1e7901cf27cc9
                                          • Instruction Fuzzy Hash: 61F0FF31004B48EBEB116F2AEC4CB683FA4AB01766F58C325F529490F2C73D8995DF58
                                          APIs
                                          • CoInitialize.OLE32(00000000), ref: 0079C432
                                          • CoCreateInstance.OLE32(007C2D6C,00000000,00000001,007C2BDC,?), ref: 0079C44A
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                          • CoUninitialize.OLE32 ref: 0079C6B7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CreateInitializeInstanceUninitialize_memmove
                                          • String ID: .lnk
                                          • API String ID: 2683427295-24824748
                                          • Opcode ID: 8194bb1d32d91f2216e34e2dad6ff8fe666bc0ff12ab535953a816bbe1c210ce
                                          • Instruction ID: dcdbba65e16c4d5ddb899a2b525cb0cb0f8169da7d230307ff49c538f4f246ab
                                          • Opcode Fuzzy Hash: 8194bb1d32d91f2216e34e2dad6ff8fe666bc0ff12ab535953a816bbe1c210ce
                                          • Instruction Fuzzy Hash: CAA12AB1208305EFE704EF54C885EABB7A8FF85354F00491DF195971A2EB75AA09CB52
                                          APIs
                                            • Part of subcall function 00750DB6: std::exception::exception.LIBCMT ref: 00750DEC
                                            • Part of subcall function 00750DB6: __CxxThrowException@8.LIBCMT ref: 00750E01
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                            • Part of subcall function 00737A51: _memmove.LIBCMT ref: 00737AAB
                                          • __swprintf.LIBCMT ref: 00742ECD
                                          Strings
                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00742D66
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                          • API String ID: 1943609520-557222456
                                          • Opcode ID: a8ec3d4965691ff996da629bf3d79cdac50f53c72e1e58bd78e7c85254a48710
                                          • Instruction ID: 6cc0bdc6132cc93eae4c2ab6582ec5170843c0f393c431066663f0f12e9bfd01
                                          • Opcode Fuzzy Hash: a8ec3d4965691ff996da629bf3d79cdac50f53c72e1e58bd78e7c85254a48710
                                          • Instruction Fuzzy Hash: EC919DB1108701DFDB18EF24C889D6EB7A4EF85350F50491DF8859B2A2EB78ED49CB52
                                          APIs
                                            • Part of subcall function 00734750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00734743,?,?,007337AE,?), ref: 00734770
                                          • CoInitialize.OLE32(00000000), ref: 0079B9BB
                                          • CoCreateInstance.OLE32(007C2D6C,00000000,00000001,007C2BDC,?), ref: 0079B9D4
                                          • CoUninitialize.OLE32 ref: 0079B9F1
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                          • String ID: .lnk
                                          • API String ID: 2126378814-24824748
                                          • Opcode ID: 3575050546b0a8dec80bf54dc9fd96d1f350c9f32b19868cbd71a6169342ef90
                                          • Instruction ID: 9ed87f66df1c48113239a504c3fd828b1a4a7d475f4bcefc6a9b9d15356a79ca
                                          • Opcode Fuzzy Hash: 3575050546b0a8dec80bf54dc9fd96d1f350c9f32b19868cbd71a6169342ef90
                                          • Instruction Fuzzy Hash: 8AA134B56043019FDB00DF14D984D5ABBE5FF89324F048998F9999B3A2CB39EC45CB91
                                          APIs
                                          • OleSetContainedObject.OLE32(?,00000001), ref: 0078B4BE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ContainedObject
                                          • String ID: AutoIt3GUI$Container$%|
                                          • API String ID: 3565006973-2882729281
                                          • Opcode ID: e02d5ea16c69ccf1341756142917c802307490bb4be746bd512f497c979c124c
                                          • Instruction ID: a24f3d3d63c6e7189fb9d73253f1ad89127d39ba6ecf80e51b5b24b591d7d519
                                          • Opcode Fuzzy Hash: e02d5ea16c69ccf1341756142917c802307490bb4be746bd512f497c979c124c
                                          • Instruction Fuzzy Hash: 7D915770640601EFDB14EF64C885B6ABBF9FF49710F20856DE94ACB6A1DBB4E841CB50
                                          APIs
                                          • __startOneArgErrorHandling.LIBCMT ref: 007550AD
                                            • Part of subcall function 007600F0: __87except.LIBCMT ref: 0076012B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorHandling__87except__start
                                          • String ID: pow
                                          • API String ID: 2905807303-2276729525
                                          • Opcode ID: 4461a50bcbb320a3c950089ef94418d40eea115b68f953bb0a0085fa51f9aa75
                                          • Instruction ID: 395f208fc1abccde873b9759b7a3da87bbded496960a2049806a393e4be814c4
                                          • Opcode Fuzzy Hash: 4461a50bcbb320a3c950089ef94418d40eea115b68f953bb0a0085fa51f9aa75
                                          • Instruction Fuzzy Hash: 7E516B6090890687DB156724C8653BF2B94AF41711F208D59ECDB862E9EE7C8DCCDAC6
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memmove
                                          • String ID: 3ct$_t
                                          • API String ID: 4104443479-1670605766
                                          • Opcode ID: 6677ba12863107e43923d5f663fff9f31f10c5297c5890aeffced1e64352f04e
                                          • Instruction ID: 227c323581a0d3b8cb5072bf87dbd8610f6b4d43f210b31bb4d74c5e70a53108
                                          • Opcode Fuzzy Hash: 6677ba12863107e43923d5f663fff9f31f10c5297c5890aeffced1e64352f04e
                                          • Instruction Fuzzy Hash: 2A515FB0D00615DFCF64CF68C884AAEBBF1FF44344F24852AE85AD7250EB38A955DB52
                                          APIs
                                            • Part of subcall function 007914BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00789296,?,?,00000034,00000800,?,00000034), ref: 007914E6
                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0078983F
                                            • Part of subcall function 00791487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007892C5,?,?,00000800,?,00001073,00000000,?,?), ref: 007914B1
                                            • Part of subcall function 007913DE: GetWindowThreadProcessId.USER32(?,?), ref: 00791409
                                            • Part of subcall function 007913DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0078925A,00000034,?,?,00001004,00000000,00000000), ref: 00791419
                                            • Part of subcall function 007913DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0078925A,00000034,?,?,00001004,00000000,00000000), ref: 0079142F
                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007898AC
                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007898F9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                          • String ID: @
                                          • API String ID: 4150878124-2766056989
                                          • Opcode ID: 402350fbe4bcfaf09ad1ba8d54d84bdf72596fca66cf65f34b11823884633935
                                          • Instruction ID: f7aaf426c2ff128fe5364a17304be070cfa3ccf20e196fc4ccb970506fc8e53f
                                          • Opcode Fuzzy Hash: 402350fbe4bcfaf09ad1ba8d54d84bdf72596fca66cf65f34b11823884633935
                                          • Instruction Fuzzy Hash: 99418C7690021DAFCF10EFA4CC85AEEBBB8EB49300F004199FA45B7191DA746E45CBA0
                                          APIs
                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,007BF910,00000000,?,?,?,?), ref: 007B79DF
                                          • GetWindowLongW.USER32 ref: 007B79FC
                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 007B7A0C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$Long
                                          • String ID: SysTreeView32
                                          • API String ID: 847901565-1698111956
                                          • Opcode ID: ac52d315c49617a73465c9af35e890b7201b2ede41f5d7b903602abbea265e10
                                          • Instruction ID: 46f33f310829c0bae002f96f8190a93c49cfbe23e9eee3c46b6e340a5b541d48
                                          • Opcode Fuzzy Hash: ac52d315c49617a73465c9af35e890b7201b2ede41f5d7b903602abbea265e10
                                          • Instruction Fuzzy Hash: 8731B03120460AABEB158E38CC45BEA77A9EF45324F208725F975D22E1D739ED51CB50
                                          APIs
                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 007B7461
                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 007B7475
                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 007B7499
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$Window
                                          • String ID: SysMonthCal32
                                          • API String ID: 2326795674-1439706946
                                          • Opcode ID: 88809b6a43051381e5e05804e14da07703a51ba497b169298af6eef26942dff6
                                          • Instruction ID: 6aec6ecc902934e64d9ab1083c830424447d300dfe33eb0c3400ef5985c9a98c
                                          • Opcode Fuzzy Hash: 88809b6a43051381e5e05804e14da07703a51ba497b169298af6eef26942dff6
                                          • Instruction Fuzzy Hash: 5921A132600258BBDF158FA4CC46FEA3B79EF88724F110214FE156B1D0DAB9AC51DBA0
                                          APIs
                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 007B7C4A
                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 007B7C58
                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 007B7C5F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$DestroyWindow
                                          • String ID: msctls_updown32
                                          • API String ID: 4014797782-2298589950
                                          • Opcode ID: 01f75814a59ad841964ef0f3e66a0f62b2a140c9c45b814f0d243a0650505f15
                                          • Instruction ID: 66212b1812d3a87f8c26ed5e9aa1de4bb35afc6764cbddb1b29f6ef43b55645e
                                          • Opcode Fuzzy Hash: 01f75814a59ad841964ef0f3e66a0f62b2a140c9c45b814f0d243a0650505f15
                                          • Instruction Fuzzy Hash: D8216DB1604208AFDB15DF18DCC5DB63BACEB4A394B544059FA019B361CB75EC11CA70
                                          APIs
                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 007B6D3B
                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 007B6D4B
                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 007B6D70
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$MoveWindow
                                          • String ID: Listbox
                                          • API String ID: 3315199576-2633736733
                                          • Opcode ID: d7547ddaf30f2959998303e9090372944f32047df5e3158f5abde691ac60ec9a
                                          • Instruction ID: c5a5d0e0d6a04563f32da24e599b387df5cc1527fa40e9175f5eb56c1e7bc904
                                          • Opcode Fuzzy Hash: d7547ddaf30f2959998303e9090372944f32047df5e3158f5abde691ac60ec9a
                                          • Instruction Fuzzy Hash: 3E218032710118BFDF118F54CC45FFB3BAAEF89754F018124FA459B1A0CA79AC5197A0
                                          APIs
                                          • __snwprintf.LIBCMT ref: 007A3A66
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __snwprintf_memmove
                                          • String ID: , $$AUTOITCALLVARIABLE%d$%|
                                          • API String ID: 3506404897-2300887487
                                          • Opcode ID: e7859a28c9410e75688485a9d6a039bf7ff29c5d6801fa62e2fbd59900b03c1f
                                          • Instruction ID: 064293e1f9748b385d141e6bce1ff14d706506787f0942f1d4f8cfd3ee356aec
                                          • Opcode Fuzzy Hash: e7859a28c9410e75688485a9d6a039bf7ff29c5d6801fa62e2fbd59900b03c1f
                                          • Instruction Fuzzy Hash: A921A771600229EFCF54EF64CC86EAE77B5AF45700F504458F549A7182DB38EA45CB71
                                          APIs
                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 007B7772
                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 007B7787
                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 007B7794
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: msctls_trackbar32
                                          • API String ID: 3850602802-1010561917
                                          • Opcode ID: fc6b13aed7c56ec3247cb0c7ef42ea8be2cd5d3a4865f7342060b3ebd263f876
                                          • Instruction ID: 1393d48d5ff892945ab7f3137bfd590266481aa4adb7edaf6431af338a862bb6
                                          • Opcode Fuzzy Hash: fc6b13aed7c56ec3247cb0c7ef42ea8be2cd5d3a4865f7342060b3ebd263f876
                                          • Instruction Fuzzy Hash: 2B11E372254208BEEF249F65CC05FEB77A9EFC9B54F114628FA41A6090C676E811CB20
                                          APIs
                                          • __lock.LIBCMT ref: 00759B94
                                            • Part of subcall function 00759C0B: __mtinitlocknum.LIBCMT ref: 00759C1D
                                            • Part of subcall function 00759C0B: EnterCriticalSection.KERNEL32(00000000,?,00759A7C,0000000D), ref: 00759C36
                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 00759BA4
                                            • Part of subcall function 00759100: ___addlocaleref.LIBCMT ref: 0075911C
                                            • Part of subcall function 00759100: ___removelocaleref.LIBCMT ref: 00759127
                                            • Part of subcall function 00759100: ___freetlocinfo.LIBCMT ref: 0075913B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                          • String ID: 8~$8~
                                          • API String ID: 547918592-4061854447
                                          • Opcode ID: c1dd61124575347b4c34182f356dd927211b47aaf1833a0cf35fcc645f5ecfce
                                          • Instruction ID: a4e45f901d472552a38a87873e9488b5c06e8c06fa6fdb63670d4f61ec265dfd
                                          • Opcode Fuzzy Hash: c1dd61124575347b4c34182f356dd927211b47aaf1833a0cf35fcc645f5ecfce
                                          • Instruction Fuzzy Hash: D3E086F1943345E7EA50B7A4694BF8C36505B04723F204159F9556D0C1DEFC1408851B
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00734B83,?), ref: 00734C44
                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00734C56
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                          • API String ID: 2574300362-1355242751
                                          • Opcode ID: 60eb9fa85155b888f5077cef934ff36bc8fd8c915fd1f1146ac7876ca193b6fa
                                          • Instruction ID: ce621d29b847a93e7395a3e44fa154869b763df5be99414d0d185a79e656d974
                                          • Opcode Fuzzy Hash: 60eb9fa85155b888f5077cef934ff36bc8fd8c915fd1f1146ac7876ca193b6fa
                                          • Instruction Fuzzy Hash: D0D0C2B0511717CFD7244F36CC0871672D5AF04740F10CC39D492C6160E678D880C620
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00734BD0,?,00734DEF,?,007F52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00734C11
                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00734C23
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                          • API String ID: 2574300362-3689287502
                                          • Opcode ID: 8b1c5a162f04bad659abac749e6196ea160d173ecb098f304f27e0a1d0045e1d
                                          • Instruction ID: 92d1580ced1991cf6913d012af6304bf1a991d554d263cd9fa29fefe73b5e7b1
                                          • Opcode Fuzzy Hash: 8b1c5a162f04bad659abac749e6196ea160d173ecb098f304f27e0a1d0045e1d
                                          • Instruction Fuzzy Hash: 8AD0C27051171BCFDB205F75CC08707B6E6EF08741F00CC39D481C2150E6B8D880C620
                                          APIs
                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,007B1039), ref: 007B0DF5
                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 007B0E07
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                          • API String ID: 2574300362-4033151799
                                          • Opcode ID: 32cff744dbe990542bac6ed451492974332bd5275017f885090e71580794ab95
                                          • Instruction ID: f518b4867287fcde0fd1a8f11fa85c298613aef2872aa69406b6031fb37edcb4
                                          • Opcode Fuzzy Hash: 32cff744dbe990542bac6ed451492974332bd5275017f885090e71580794ab95
                                          • Instruction Fuzzy Hash: 86D0C27140031ACFC3205F79CC097C372D5AF04741F00CC3DD591C2190E6B8E4A0C644
                                          APIs
                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,007A8CF4,?,007BF910), ref: 007A90EE
                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 007A9100
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: GetModuleHandleExW$kernel32.dll
                                          • API String ID: 2574300362-199464113
                                          • Opcode ID: 8c66a7132c40ce231d800714d30023377151b862745deffc84a5a25b713ccf2f
                                          • Instruction ID: fa9e3c3ba42c20aa966cf8693752f9404d6ae84a1755db23dd700f6d99d28732
                                          • Opcode Fuzzy Hash: 8c66a7132c40ce231d800714d30023377151b862745deffc84a5a25b713ccf2f
                                          • Instruction Fuzzy Hash: 91D0C7B052071BCFCB208F39CC08B0272E9AF06B41B22CD3AD486D2190FA78C880CA90
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: LocalTime__swprintf
                                          • String ID: %.3d$WIN_XPe
                                          • API String ID: 2070861257-2409531811
                                          • Opcode ID: dff36749101ecf352f2ccf4d0316b874060ab6b6a79780c4095fcd4c0bbc337e
                                          • Instruction ID: 2782038b5f50b856724f851091a3f35032af16d63dd6ca7ee4e8336ced7bd969
                                          • Opcode Fuzzy Hash: dff36749101ecf352f2ccf4d0316b874060ab6b6a79780c4095fcd4c0bbc337e
                                          • Instruction Fuzzy Hash: 23D05B7280510CFACF4997949C89CFD737CB718381F904562F90AE2050E23D8B54D761
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 559fad1b89b0a43a53c04d3a04492efc812125a0e8f61ce518153a9a97f2adf4
                                          • Instruction ID: bbd6cb65ddfd90e106c13d88c496bbd94348b6a7b0be9df95183d471b1fd347a
                                          • Opcode Fuzzy Hash: 559fad1b89b0a43a53c04d3a04492efc812125a0e8f61ce518153a9a97f2adf4
                                          • Instruction Fuzzy Hash: ACC19375A04216EFCB18DFA4C884EAEBBB5FF48714B248598F80ADB251D734DD41DB90
                                          APIs
                                          • CharLowerBuffW.USER32(?,?), ref: 007AE0BE
                                          • CharLowerBuffW.USER32(?,?), ref: 007AE101
                                            • Part of subcall function 007AD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 007AD7C5
                                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 007AE301
                                          • _memmove.LIBCMT ref: 007AE314
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: BuffCharLower$AllocVirtual_memmove
                                          • String ID:
                                          • API String ID: 3659485706-0
                                          • Opcode ID: b5d736eea904a19e72723d29832f1adbcde20eb68d80882f0269e0acd0ba2276
                                          • Instruction ID: 4e03960245bd7199bd8b7cd8c1ce156db16882468085607d62e1c46d7b790f8a
                                          • Opcode Fuzzy Hash: b5d736eea904a19e72723d29832f1adbcde20eb68d80882f0269e0acd0ba2276
                                          • Instruction Fuzzy Hash: 8AC15771608301DFC714DF28C484A6ABBE4FF8A714F048A6DF8999B351D775E906CB82
                                          APIs
                                          • CoInitialize.OLE32(00000000), ref: 007A80C3
                                          • CoUninitialize.OLE32 ref: 007A80CE
                                            • Part of subcall function 0078D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0078D5D4
                                          • VariantInit.OLEAUT32(?), ref: 007A80D9
                                          • VariantClear.OLEAUT32(?), ref: 007A83AA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                          • String ID:
                                          • API String ID: 780911581-0
                                          • Opcode ID: 362b34ccb99b0d18f358c5a413f6f016eb527ef526fdb39c0efc9d8a45e32531
                                          • Instruction ID: 2d2c3a4ac4b07a4087b9e0c8d3bb4002e1f41004c003dc18bc66f683164bdce5
                                          • Opcode Fuzzy Hash: 362b34ccb99b0d18f358c5a413f6f016eb527ef526fdb39c0efc9d8a45e32531
                                          • Instruction Fuzzy Hash: BDA16975604701DFDB40DF24C885B6AB7E4BF8A724F048508FA959B3A2CB78EC05CB82
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Variant$AllocClearCopyInitString
                                          • String ID:
                                          • API String ID: 2808897238-0
                                          • Opcode ID: 7984e8a23c8a5078641207398f9b02ed347f46baa8249ad757649874243556aa
                                          • Instruction ID: a5dfcc710d0759d5e38ec16aaa9584493e1cbc4257a8e84c6218959fc3544122
                                          • Opcode Fuzzy Hash: 7984e8a23c8a5078641207398f9b02ed347f46baa8249ad757649874243556aa
                                          • Instruction Fuzzy Hash: E851E774780301FADF28BF65D895A2AB3E5AF44310F20C81FE686DB291DA7CD8408742
                                          APIs
                                          • GetWindowRect.USER32(013FE638,?), ref: 007B9863
                                          • ScreenToClient.USER32(00000002,00000002), ref: 007B9896
                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 007B9903
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$ClientMoveRectScreen
                                          • String ID:
                                          • API String ID: 3880355969-0
                                          • Opcode ID: 363fb5277333b48ad457944a0a181e48c2879f0ff9beece89b4ed95504db2b02
                                          • Instruction ID: bb81b12a97dc104b70b73b77aed4ead575a0d5d3a50d99968c178cd5a7174638
                                          • Opcode Fuzzy Hash: 363fb5277333b48ad457944a0a181e48c2879f0ff9beece89b4ed95504db2b02
                                          • Instruction Fuzzy Hash: C3513034A00609EFCF14CF54D884AEE7BB5FF55360F148169FA659B2A0D735AD41CB90
                                          APIs
                                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00789AD2
                                          • __itow.LIBCMT ref: 00789B03
                                            • Part of subcall function 00789D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00789DBE
                                          • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00789B6C
                                          • __itow.LIBCMT ref: 00789BC3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend$__itow
                                          • String ID:
                                          • API String ID: 3379773720-0
                                          • Opcode ID: 30709f0cc2a4a151fd7543ed8b2d2f45171cedf6c444e0eb3b4a1108854a6fd1
                                          • Instruction ID: c2a216d61d9f54425197989d27c1e11b4e1d1edf64e98bcc7ca3ceae81e7e250
                                          • Opcode Fuzzy Hash: 30709f0cc2a4a151fd7543ed8b2d2f45171cedf6c444e0eb3b4a1108854a6fd1
                                          • Instruction Fuzzy Hash: 074181B0A40208EBDF25EF54D849BFE7FB9EF48754F040059FA05A7292DB789944CB61
                                          APIs
                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 007A69D1
                                          • WSAGetLastError.WSOCK32(00000000), ref: 007A69E1
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 007A6A45
                                          • WSAGetLastError.WSOCK32(00000000), ref: 007A6A51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ErrorLast$__itow__swprintfsocket
                                          • String ID:
                                          • API String ID: 2214342067-0
                                          • Opcode ID: d721160653b6fb8c21971043632d20a1fb9cbd4200eecc8b657fc30530e56394
                                          • Instruction ID: cbb1621f8127eacea21b9d20a464214845e14110241ccc914682353f83f4a44d
                                          • Opcode Fuzzy Hash: d721160653b6fb8c21971043632d20a1fb9cbd4200eecc8b657fc30530e56394
                                          • Instruction Fuzzy Hash: 0C41A275740200AFEB60AF24DC8AF6A77E49B45B14F04C158FA59AB2C3DAB99D008B91
                                          APIs
                                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,007BF910), ref: 007A64A7
                                          • _strlen.LIBCMT ref: 007A64D9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _strlen
                                          • String ID:
                                          • API String ID: 4218353326-0
                                          • Opcode ID: b9484e13d0e1b0d02468a228c7133ebc95dddcf087a72d1f99a1b258c11c3499
                                          • Instruction ID: b87ea0df87dc9156257816d6086c7024601e27f245c7a90f73f91c9a93e2204d
                                          • Opcode Fuzzy Hash: b9484e13d0e1b0d02468a228c7133ebc95dddcf087a72d1f99a1b258c11c3499
                                          • Instruction Fuzzy Hash: F441F571A00104EFDB14FBA8DCC9FAEB7A9AF49310F148255F91997297DB38AE14CB50
                                          APIs
                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0079B89E
                                          • GetLastError.KERNEL32(?,00000000), ref: 0079B8C4
                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0079B8E9
                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0079B915
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                          • String ID:
                                          • API String ID: 3321077145-0
                                          • Opcode ID: 640e08a34a7e4d3f9b87209c360cf7d212d23103c8351fbfad98c5a113d037ea
                                          • Instruction ID: faacf1a2086506a0dc1e535d0cfc3ab56e9c4985db9eb0d0766e2a523dff7e8b
                                          • Opcode Fuzzy Hash: 640e08a34a7e4d3f9b87209c360cf7d212d23103c8351fbfad98c5a113d037ea
                                          • Instruction Fuzzy Hash: E1411939600610DFDB10EF15D588A9DBBE1AF89720F198098ED4A9B362CB79FD01CB91
                                          APIs
                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007B88DE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: InvalidateRect
                                          • String ID:
                                          • API String ID: 634782764-0
                                          • Opcode ID: 55e3b337b742af579bb03fc675cfd135305f66e14fb0df2020e722662cea9296
                                          • Instruction ID: f3fd9ea8e4b41a6981b513d05273e1a97f9a48428c70ada046ad3ef4a7e6538a
                                          • Opcode Fuzzy Hash: 55e3b337b742af579bb03fc675cfd135305f66e14fb0df2020e722662cea9296
                                          • Instruction Fuzzy Hash: FC31A134610108FFEFA49A58CC49FF97BA9EB05350F544112FA15E62A1CA7CE980D757
                                          APIs
                                          • ClientToScreen.USER32(?,?), ref: 007BAB60
                                          • GetWindowRect.USER32(?,?), ref: 007BABD6
                                          • PtInRect.USER32(?,?,007BC014), ref: 007BABE6
                                          • MessageBeep.USER32(00000000), ref: 007BAC57
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Rect$BeepClientMessageScreenWindow
                                          • String ID:
                                          • API String ID: 1352109105-0
                                          • Opcode ID: 41d17a0c9164e61a507749324b42320201d5f06020edd1a1d7a087e2e0b33628
                                          • Instruction ID: 122abbd14a5b9ef1a327d39f41901e77f818360416a6d5ad701d420443aaa907
                                          • Opcode Fuzzy Hash: 41d17a0c9164e61a507749324b42320201d5f06020edd1a1d7a087e2e0b33628
                                          • Instruction Fuzzy Hash: 4041AD70600619EFCB21EF58C884BA97BF5FF49350F1881A9E914DB260D738E841CBA2
                                          APIs
                                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00790B27
                                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 00790B43
                                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00790BA9
                                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00790BFB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: KeyboardState$InputMessagePostSend
                                          • String ID:
                                          • API String ID: 432972143-0
                                          • Opcode ID: 6890d832d882f123578f76a1b707e45b89e2a010d502bc0168f1b342020769a5
                                          • Instruction ID: 23c1bd6b838f67ec44186418f57ec0e56411a6ef34494f4680b6394ce5c32b0b
                                          • Opcode Fuzzy Hash: 6890d832d882f123578f76a1b707e45b89e2a010d502bc0168f1b342020769a5
                                          • Instruction Fuzzy Hash: 59315AB0D50618AEFF358B29AC09BFEBBA9AF45318F04835AE490521D1C37C899097E5
                                          APIs
                                          • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00790C66
                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00790C82
                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00790CE1
                                          • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00790D33
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: KeyboardState$InputMessagePostSend
                                          • String ID:
                                          • API String ID: 432972143-0
                                          • Opcode ID: c9d10ec27f2430657c0be755c980e09dcfd6f2cc5dbd0cda8342e771ad577bb4
                                          • Instruction ID: 606796d302bc11183ec24e07dc98520ee5a7ca829af75c3a5f21c633330d9e9a
                                          • Opcode Fuzzy Hash: c9d10ec27f2430657c0be755c980e09dcfd6f2cc5dbd0cda8342e771ad577bb4
                                          • Instruction Fuzzy Hash: CF312630A50618AEFF308B65AC08BFEBBB6AF46310F04831AE485521D1C33D9D55D7E5
                                          APIs
                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 007661FB
                                          • __isleadbyte_l.LIBCMT ref: 00766229
                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00766257
                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0076628D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                          • String ID:
                                          • API String ID: 3058430110-0
                                          • Opcode ID: b1fb700f8bff15815bff00baf719e18bdf9b91a658e22b09ecbb3c497d5d5673
                                          • Instruction ID: d54151709878220b64e83ed75d61ba17083e5f04f2e0ec65321c060b1e74d17a
                                          • Opcode Fuzzy Hash: b1fb700f8bff15815bff00baf719e18bdf9b91a658e22b09ecbb3c497d5d5673
                                          • Instruction Fuzzy Hash: 8131DE3060024AEFDF218F65CC58BAA7FA9FF42320F554128EC26971A1E739E950DB90
                                          APIs
                                          • GetForegroundWindow.USER32 ref: 007B4F02
                                            • Part of subcall function 00793641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0079365B
                                            • Part of subcall function 00793641: GetCurrentThreadId.KERNEL32 ref: 00793662
                                            • Part of subcall function 00793641: AttachThreadInput.USER32(00000000,?,00795005), ref: 00793669
                                          • GetCaretPos.USER32(?), ref: 007B4F13
                                          • ClientToScreen.USER32(00000000,?), ref: 007B4F4E
                                          • GetForegroundWindow.USER32 ref: 007B4F54
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                          • String ID:
                                          • API String ID: 2759813231-0
                                          • Opcode ID: e4c6b95159a032272b2610deef2bff6d224eda993555fd744122b503e0b3d960
                                          • Instruction ID: 6381aadc0605de721e003ba77bf22bec257a4cb23426fc0243508a8fdf6dba10
                                          • Opcode Fuzzy Hash: e4c6b95159a032272b2610deef2bff6d224eda993555fd744122b503e0b3d960
                                          • Instruction Fuzzy Hash: 94310F71D00208AFDB00EFA5C885EEFB7F9EF94300F10406AE555E7242DA79AE058BA1
                                          APIs
                                            • Part of subcall function 00732612: GetWindowLongW.USER32(?,000000EB), ref: 00732623
                                          • GetCursorPos.USER32(?), ref: 007BC4D2
                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0076B9AB,?,?,?,?,?), ref: 007BC4E7
                                          • GetCursorPos.USER32(?), ref: 007BC534
                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0076B9AB,?,?,?), ref: 007BC56E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                          • String ID:
                                          • API String ID: 2864067406-0
                                          • Opcode ID: c7edc64bd1bd4cfd50a1d6baf9186ccbfa4f6db2d6fd07dacf29848369da7aa0
                                          • Instruction ID: 636537d61357e78a32b55e884e9b4d5d2b944475f102d7003ceb155126802421
                                          • Opcode Fuzzy Hash: c7edc64bd1bd4cfd50a1d6baf9186ccbfa4f6db2d6fd07dacf29848369da7aa0
                                          • Instruction Fuzzy Hash: FE319135600458EFCB268F58C858FFA7BB5EF09710F148169FA058B262C739AD60DBA4
                                          APIs
                                            • Part of subcall function 0078810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00788121
                                            • Part of subcall function 0078810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0078812B
                                            • Part of subcall function 0078810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0078813A
                                            • Part of subcall function 0078810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00788141
                                            • Part of subcall function 0078810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00788157
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007886A3
                                          • _memcmp.LIBCMT ref: 007886C6
                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007886FC
                                          • HeapFree.KERNEL32(00000000), ref: 00788703
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                          • String ID:
                                          • API String ID: 1592001646-0
                                          • Opcode ID: 13c9dcb70b42369c5fcf08f6966153408a93a0cf13c7fd2aa88970986406c3d6
                                          • Instruction ID: aa54aa6a430ab20d05bc393989f640b550b35751a299d6a561d3492842f040bf
                                          • Opcode Fuzzy Hash: 13c9dcb70b42369c5fcf08f6966153408a93a0cf13c7fd2aa88970986406c3d6
                                          • Instruction Fuzzy Hash: CD219071E80108EFDB50EFA8CD49BEEB7B8EF44305F558059E454A7242EB39AE05CB51
                                          APIs
                                          • __setmode.LIBCMT ref: 007509AE
                                            • Part of subcall function 00735A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00797896,?,?,00000000), ref: 00735A2C
                                            • Part of subcall function 00735A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00797896,?,?,00000000,?,?), ref: 00735A50
                                          • _fprintf.LIBCMT ref: 007509E5
                                          • OutputDebugStringW.KERNEL32(?), ref: 00785DBB
                                            • Part of subcall function 00754AAA: _flsall.LIBCMT ref: 00754AC3
                                          • __setmode.LIBCMT ref: 00750A1A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                          • String ID:
                                          • API String ID: 521402451-0
                                          • Opcode ID: f5bc03b126e4a27f60a02f2ca40baf2026ef5a94043269e9dac73cc96dd8cc1d
                                          • Instruction ID: a0008d47d7e0b087ef65d8c5cf64092a185b92642bbab2d9183f939f8b04bd35
                                          • Opcode Fuzzy Hash: f5bc03b126e4a27f60a02f2ca40baf2026ef5a94043269e9dac73cc96dd8cc1d
                                          • Instruction Fuzzy Hash: 5B115731604204EFDB04B3B49C8E9FE77689F42321F104119FA0453183EEAD589A97E5
                                          APIs
                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007A17A3
                                            • Part of subcall function 007A182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 007A184C
                                            • Part of subcall function 007A182D: InternetCloseHandle.WININET(00000000), ref: 007A18E9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Internet$CloseConnectHandleOpen
                                          • String ID:
                                          • API String ID: 1463438336-0
                                          • Opcode ID: 2c970dba344ed1dc75e8460517aafd187a2b2338dfa8cc37c1cb23704a663bbe
                                          • Instruction ID: 5ed1dd371955f504ebd53e9b3151550ecbf0babf1500d945f6430507b67bef04
                                          • Opcode Fuzzy Hash: 2c970dba344ed1dc75e8460517aafd187a2b2338dfa8cc37c1cb23704a663bbe
                                          • Instruction Fuzzy Hash: E721D431200601BFFB129F64CC00FBABBA9FF8AB21F50422AF91196551DB7D981197A4
                                          APIs
                                          • GetFileAttributesW.KERNEL32(?,007BFAC0), ref: 00793A64
                                          • GetLastError.KERNEL32 ref: 00793A73
                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00793A82
                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,007BFAC0), ref: 00793ADF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                          • String ID:
                                          • API String ID: 2267087916-0
                                          • Opcode ID: f0b565a83ff4e63772da79fa7e9c4e14beb2ba7133bcf08829ce242c638c8662
                                          • Instruction ID: cfd3ab6f875e8a496c2ab1bf1691651777f405386f0f15d041285fd33a087bbb
                                          • Opcode Fuzzy Hash: f0b565a83ff4e63772da79fa7e9c4e14beb2ba7133bcf08829ce242c638c8662
                                          • Instruction Fuzzy Hash: D621A674508201DF8B10DF28DC859AA77E4FF55764F108A1EF499C72A2D739DE45CB42
                                          APIs
                                          • _free.LIBCMT ref: 00765101
                                            • Part of subcall function 0075571C: __FF_MSGBANNER.LIBCMT ref: 00755733
                                            • Part of subcall function 0075571C: __NMSG_WRITE.LIBCMT ref: 0075573A
                                            • Part of subcall function 0075571C: RtlAllocateHeap.NTDLL(013E0000,00000000,00000001,00000000,?,?,?,00750DD3,?), ref: 0075575F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: AllocateHeap_free
                                          • String ID:
                                          • API String ID: 614378929-0
                                          • Opcode ID: e3cb17089f2a048a4b462ca787c9b68919f0559b2c8932eb87416373574539e7
                                          • Instruction ID: 6b667ec64dddab498846d318e70c60317fe3a53662b91e0033dcd4bb26d4f76b
                                          • Opcode Fuzzy Hash: e3cb17089f2a048a4b462ca787c9b68919f0559b2c8932eb87416373574539e7
                                          • Instruction Fuzzy Hash: EC1129B2900A19EFCB353F74EC49BAD37989F063A2F204529FD06AA150DE7C8D44A795
                                          APIs
                                            • Part of subcall function 00735A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00797896,?,?,00000000), ref: 00735A2C
                                            • Part of subcall function 00735A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00797896,?,?,00000000,?,?), ref: 00735A50
                                          • gethostbyname.WSOCK32(?), ref: 007A6399
                                          • WSAGetLastError.WSOCK32(00000000), ref: 007A63A4
                                          • _memmove.LIBCMT ref: 007A63D1
                                          • inet_ntoa.WSOCK32(?), ref: 007A63DC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                          • String ID:
                                          • API String ID: 1504782959-0
                                          • Opcode ID: 2e5d2b59b2f9908c65746a7347e8d23413a9806f76407d177bff4fcdc6b9d419
                                          • Instruction ID: d35ac5d941adb3e08754da1fddafe3c9b8439f94701d0b7442a5d33197b31265
                                          • Opcode Fuzzy Hash: 2e5d2b59b2f9908c65746a7347e8d23413a9806f76407d177bff4fcdc6b9d419
                                          • Instruction Fuzzy Hash: CC116031500109EFDB04FBA4DD8ADEEB7B8AF49310B148165F505A7262DB39AF14DBA1
                                          APIs
                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00788B61
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00788B73
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00788B89
                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00788BA4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: edd0008a04626a5eb79c6ac005bfcde0a6ef73fe646941b27a8cf4735f844f52
                                          • Instruction ID: e79216dd57fada431d8be6e01ec8dc61f9e4ed93837348d93291a3e8d0d6c863
                                          • Opcode Fuzzy Hash: edd0008a04626a5eb79c6ac005bfcde0a6ef73fe646941b27a8cf4735f844f52
                                          • Instruction Fuzzy Hash: 65115EB9941218FFDB11DFA5CC84F9DBB74FB48710F204095E900B7290DA716E10DB94
                                          APIs
                                            • Part of subcall function 00732612: GetWindowLongW.USER32(?,000000EB), ref: 00732623
                                          • DefDlgProcW.USER32(?,00000020,?), ref: 007312D8
                                          • GetClientRect.USER32(?,?), ref: 0076B5FB
                                          • GetCursorPos.USER32(?), ref: 0076B605
                                          • ScreenToClient.USER32(?,?), ref: 0076B610
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Client$CursorLongProcRectScreenWindow
                                          • String ID:
                                          • API String ID: 4127811313-0
                                          • Opcode ID: 1233403e9f3b941ae567975276a306e4c183141f0e5f153bb29e48a73b1db2d9
                                          • Instruction ID: 08208e0fd6f8fc0b0f0ca738ca8f51c8a812a35158a4939adc5ecdeccd097a34
                                          • Opcode Fuzzy Hash: 1233403e9f3b941ae567975276a306e4c183141f0e5f153bb29e48a73b1db2d9
                                          • Instruction Fuzzy Hash: 6C111635A00019EBDB10EF98D8899EE77B8FB05300F804565FA41E7242C738BA51CBA9
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0078D84D
                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0078D864
                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0078D879
                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0078D897
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Type$Register$FileLoadModuleNameUser
                                          • String ID:
                                          • API String ID: 1352324309-0
                                          • Opcode ID: 0bfa6f9039f33b9f9361285bf121c0b7a85b370cc423e106c722637b14601fef
                                          • Instruction ID: 2aa416056b31ed03be234eb3938ecb15966e41427b2ad0d402c5c5b608e6da18
                                          • Opcode Fuzzy Hash: 0bfa6f9039f33b9f9361285bf121c0b7a85b370cc423e106c722637b14601fef
                                          • Instruction Fuzzy Hash: 4F1161B5645304EBE330AF51DC08F97BBBCEB00B10F108569E516D6090D7B8E949ABA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                          • String ID:
                                          • API String ID: 3016257755-0
                                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                          • Instruction ID: 2cea45afdb0f0d82210b3531bcb38cfc78f580552a653eac8cbba980487f5742
                                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                          • Instruction Fuzzy Hash: 61014B7244814ABBCF1A5E84CC05CEE3F62BB18399B588455FE1A98031D23AC9B1EB91
                                          APIs
                                          • GetWindowRect.USER32(?,?), ref: 007BB2E4
                                          • ScreenToClient.USER32(?,?), ref: 007BB2FC
                                          • ScreenToClient.USER32(?,?), ref: 007BB320
                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 007BB33B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ClientRectScreen$InvalidateWindow
                                          • String ID:
                                          • API String ID: 357397906-0
                                          • Opcode ID: 1768d1364cf5199b18b484b2d816885610e9101d3400af4cb6b28ab3f0ab30af
                                          • Instruction ID: 09a1426fd6f4415c2473385b915176efb2a53b20d83a1ddf676e903d5b9239ee
                                          • Opcode Fuzzy Hash: 1768d1364cf5199b18b484b2d816885610e9101d3400af4cb6b28ab3f0ab30af
                                          • Instruction Fuzzy Hash: 751144B9D00209EFDB41CFA9C884AEEBBF9FF08314F108166E914E3220D775AA558F54
                                          APIs
                                          • _memset.LIBCMT ref: 007BB644
                                          • _memset.LIBCMT ref: 007BB653
                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,007F6F20,007F6F64), ref: 007BB682
                                          • CloseHandle.KERNEL32 ref: 007BB694
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _memset$CloseCreateHandleProcess
                                          • String ID:
                                          • API String ID: 3277943733-0
                                          • Opcode ID: 14637baa2a88c60bc3b987affde9990ff86f12ce5a9ad5ece0f43dda8c1efa19
                                          • Instruction ID: add703498ad70044d30b228ae130a929cf7b1281bc2ac39087590106b9971042
                                          • Opcode Fuzzy Hash: 14637baa2a88c60bc3b987affde9990ff86f12ce5a9ad5ece0f43dda8c1efa19
                                          • Instruction Fuzzy Hash: A6F0DAB2640304BBE2102765BC0AFBB7BDCEB09795F048025FA08E6192D7BA5C10C7AC
                                          APIs
                                          • EnterCriticalSection.KERNEL32(?), ref: 00796BE6
                                            • Part of subcall function 007976C4: _memset.LIBCMT ref: 007976F9
                                          • _memmove.LIBCMT ref: 00796C09
                                          • _memset.LIBCMT ref: 00796C16
                                          • LeaveCriticalSection.KERNEL32(?), ref: 00796C26
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CriticalSection_memset$EnterLeave_memmove
                                          • String ID:
                                          • API String ID: 48991266-0
                                          • Opcode ID: efc34cd2bada9b53fb54b34fef95c15a4d58301f842b76679b5cfb831bce18f9
                                          • Instruction ID: 0aa612dc4a86dd1b31c3301f1399fecffeae0bd51ff9eb61a34e366df8f61e73
                                          • Opcode Fuzzy Hash: efc34cd2bada9b53fb54b34fef95c15a4d58301f842b76679b5cfb831bce18f9
                                          • Instruction Fuzzy Hash: 8DF0543A200100BBCF056F95EC89E8ABB29EF45321F04C065FE089E227C775E811CBB4
                                          APIs
                                          • GetSysColor.USER32(00000008), ref: 00732231
                                          • SetTextColor.GDI32(?,000000FF), ref: 0073223B
                                          • SetBkMode.GDI32(?,00000001), ref: 00732250
                                          • GetStockObject.GDI32(00000005), ref: 00732258
                                          • GetWindowDC.USER32(?,00000000), ref: 0076BE83
                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0076BE90
                                          • GetPixel.GDI32(00000000,?,00000000), ref: 0076BEA9
                                          • GetPixel.GDI32(00000000,00000000,?), ref: 0076BEC2
                                          • GetPixel.GDI32(00000000,?,?), ref: 0076BEE2
                                          • ReleaseDC.USER32(?,00000000), ref: 0076BEED
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                          • String ID:
                                          • API String ID: 1946975507-0
                                          • Opcode ID: d23ccc99100474102baa55e9915cc138d5703fd97ec512511d72d349fe939d35
                                          • Instruction ID: 39912f9e7f109a23093039ecf2eb65dccc4a7f494c633bf7f85a0fe5c01c068c
                                          • Opcode Fuzzy Hash: d23ccc99100474102baa55e9915cc138d5703fd97ec512511d72d349fe939d35
                                          • Instruction Fuzzy Hash: 03E06D32104248EAEF215FA8FC0DBD83F10EB06732F00C366FA69980F1877A4990DB12
                                          APIs
                                          • GetCurrentThread.KERNEL32 ref: 0078871B
                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,007882E6), ref: 00788722
                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007882E6), ref: 0078872F
                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,007882E6), ref: 00788736
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CurrentOpenProcessThreadToken
                                          • String ID:
                                          • API String ID: 3974789173-0
                                          • Opcode ID: de15035a647d4b61667a0096b7ece7cdaade3f6f926f7ca2655b4bf67292c4c7
                                          • Instruction ID: f0abf7e0ccf6f1bec2d1b7192175da2d98fc465d41ab4247993354526c338f48
                                          • Opcode Fuzzy Hash: de15035a647d4b61667a0096b7ece7cdaade3f6f926f7ca2655b4bf67292c4c7
                                          • Instruction Fuzzy Hash: D6E08636655211ABD7606FF05D0CF963BBCEF54B91F14C828F245CA050DA3C8441C755
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %|
                                          • API String ID: 0-1433500012
                                          • Opcode ID: 68d08ae06187cfe173f0fc2ffe6550a0f536c5a6bdd894fc5f990267604a4c50
                                          • Instruction ID: 64715360b80b480ebf2eff0aece2051a4e6cab3dae0f4c808ba2ca20e5769fca
                                          • Opcode Fuzzy Hash: 68d08ae06187cfe173f0fc2ffe6550a0f536c5a6bdd894fc5f990267604a4c50
                                          • Instruction Fuzzy Hash: D3B17F71D00109EAEF24EF94C8859FEBBB5FF44310F548126E952A7193EB389E85CB91
                                          APIs
                                            • Part of subcall function 0074FC86: _wcscpy.LIBCMT ref: 0074FCA9
                                            • Part of subcall function 00739837: __itow.LIBCMT ref: 00739862
                                            • Part of subcall function 00739837: __swprintf.LIBCMT ref: 007398AC
                                          • __wcsnicmp.LIBCMT ref: 0079B02D
                                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0079B0F6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                          • String ID: LPT
                                          • API String ID: 3222508074-1350329615
                                          • Opcode ID: c7d914b292613c915d42032e279b917bb5c65a94d152864a72b2b1e86052abb0
                                          • Instruction ID: 2ebc0d6a61dd3b716af328c5d50898833ddde6557a3d5592930a65a21b782b5c
                                          • Opcode Fuzzy Hash: c7d914b292613c915d42032e279b917bb5c65a94d152864a72b2b1e86052abb0
                                          • Instruction Fuzzy Hash: 3D61BF75A00218EFCF14DF98E995EAEB7B4EF08310F004069F916AB391D778AE40CB50
                                          APIs
                                          • Sleep.KERNEL32(00000000), ref: 00742968
                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00742981
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: GlobalMemorySleepStatus
                                          • String ID: @
                                          • API String ID: 2783356886-2766056989
                                          • Opcode ID: 8170f2e6bdb091f7c1bf5e18878182926d62a5b51a8b40859cfd772278b4bb37
                                          • Instruction ID: 53ccd2f3b99b88268ea9bf9a4947299fb6b52ea7a62942d167dbf60886d6ba6a
                                          • Opcode Fuzzy Hash: 8170f2e6bdb091f7c1bf5e18878182926d62a5b51a8b40859cfd772278b4bb37
                                          • Instruction Fuzzy Hash: 455125724187449BE320EF10D88ABAFBBF8FB85344F41885DF2D8411A2DB759529CB66
                                          APIs
                                            • Part of subcall function 00734F0B: __fread_nolock.LIBCMT ref: 00734F29
                                          • _wcscmp.LIBCMT ref: 00799824
                                          • _wcscmp.LIBCMT ref: 00799837
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: _wcscmp$__fread_nolock
                                          • String ID: FILE
                                          • API String ID: 4029003684-3121273764
                                          • Opcode ID: 06c57d546b4e3f4abec3e824c3f997bb95c25eaf5fea2f4d8496df180303d0cd
                                          • Instruction ID: 153f07142bf30b1a883f3b018cff0bc530463de53fd847ef5f7bf97edce67361
                                          • Opcode Fuzzy Hash: 06c57d546b4e3f4abec3e824c3f997bb95c25eaf5fea2f4d8496df180303d0cd
                                          • Instruction Fuzzy Hash: 3D41D971A0020ABAEF249AA5DC49FEFB7BDDF85714F10046DFA04A7181DA79A9048B61
                                          APIs
                                          • _memset.LIBCMT ref: 007A259E
                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007A25D4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CrackInternet_memset
                                          • String ID: |
                                          • API String ID: 1413715105-2343686810
                                          • Opcode ID: 9758017b2794c85cd940502fb2c91709ee75afafbd5bf6aec2042c7373608c2d
                                          • Instruction ID: 456bf98a8505b556b4c4da6b5e300fe3e5cbdc639799ed04e25910a09305ff28
                                          • Opcode Fuzzy Hash: 9758017b2794c85cd940502fb2c91709ee75afafbd5bf6aec2042c7373608c2d
                                          • Instruction Fuzzy Hash: 333137B1801119EBDF15EFA4CC89EEEBFB8FF09300F100159F914B6162EA395916DB60
                                          APIs
                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 007B7B61
                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 007B7B76
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: '
                                          • API String ID: 3850602802-1997036262
                                          • Opcode ID: bd4a7612b120c28306d54c40555aef747c47013e3745d188801be96db25dc751
                                          • Instruction ID: 66b06700084c8533edc8e2584ac5da58213ea5d4cb0cae69430b25796d28f333
                                          • Opcode Fuzzy Hash: bd4a7612b120c28306d54c40555aef747c47013e3745d188801be96db25dc751
                                          • Instruction Fuzzy Hash: 1D41F874A0520ADFDB58CF68C981BEABBB5FF48310F10416AE905EB391D774AA51CF90
                                          APIs
                                          • DestroyWindow.USER32(?,?,?,?), ref: 007B6B17
                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 007B6B53
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$DestroyMove
                                          • String ID: static
                                          • API String ID: 2139405536-2160076837
                                          • Opcode ID: bb4395bc7edfff3f431939e7cf1e6446976056d50be5cda1eb9ba7ab6c445cce
                                          • Instruction ID: 87c3cd243cf77d4741ac45c6eef0a9645c43247a176d28a6c3fcd94ba68da77f
                                          • Opcode Fuzzy Hash: bb4395bc7edfff3f431939e7cf1e6446976056d50be5cda1eb9ba7ab6c445cce
                                          • Instruction Fuzzy Hash: AA3190B1210604AEEB109F68CC50BFB73B9FF48760F108619FAA9D7190DA79AC51C760
                                          APIs
                                          • _memset.LIBCMT ref: 00792911
                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0079294C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: InfoItemMenu_memset
                                          • String ID: 0
                                          • API String ID: 2223754486-4108050209
                                          • Opcode ID: ae58ab842fd2d3af7127172602bd50b2bbfdc496771cf003248dfb105c83f2f5
                                          • Instruction ID: 749abf731f3d76ad8b0dce0ed6c5e0d2b151e1e4846282f6c1177b5da7281387
                                          • Opcode Fuzzy Hash: ae58ab842fd2d3af7127172602bd50b2bbfdc496771cf003248dfb105c83f2f5
                                          • Instruction Fuzzy Hash: E531C331600305BBEF24EF58E845BAEBBB8EF45360F144029E985B61A2D778A946CB51
                                          APIs
                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 007B6761
                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007B676C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID: Combobox
                                          • API String ID: 3850602802-2096851135
                                          • Opcode ID: 2aada866b9bdda84836ccb94be739d5519668ea043377ccbb8e2e78fa724ab38
                                          • Instruction ID: 5da27aac6a06a8d0e12725727922702e6f5ee4a6522c125ceec7679151aa0ecd
                                          • Opcode Fuzzy Hash: 2aada866b9bdda84836ccb94be739d5519668ea043377ccbb8e2e78fa724ab38
                                          • Instruction Fuzzy Hash: 39118275310208AFEF219F55CC85FFB376AEB48768F114129FA1497290DA7D9C5187A0
                                          APIs
                                            • Part of subcall function 00731D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00731D73
                                            • Part of subcall function 00731D35: GetStockObject.GDI32(00000011), ref: 00731D87
                                            • Part of subcall function 00731D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00731D91
                                          • GetWindowRect.USER32(00000000,?), ref: 007B6C71
                                          • GetSysColor.USER32(00000012), ref: 007B6C8B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                          • String ID: static
                                          • API String ID: 1983116058-2160076837
                                          • Opcode ID: 77433445b5fe2328b3ae4773c1b2d609ea81a66faef96fbef22da0248dd4d34c
                                          • Instruction ID: ee9f28906396df6a416858942ee017c324d360d13f364370ab34998e0942bd39
                                          • Opcode Fuzzy Hash: 77433445b5fe2328b3ae4773c1b2d609ea81a66faef96fbef22da0248dd4d34c
                                          • Instruction Fuzzy Hash: 1521E472610209AFDB14DFA8CC45EFA7BA8FB08714F114A29FE95D2250D639E861DB60
                                          APIs
                                          • GetWindowTextLengthW.USER32(00000000), ref: 007B69A2
                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007B69B1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: LengthMessageSendTextWindow
                                          • String ID: edit
                                          • API String ID: 2978978980-2167791130
                                          • Opcode ID: 0fd623b6f6cfe9bf94a9c711ae6e806a3d089149aa344ea6f5b48f42c92aae01
                                          • Instruction ID: 35fb74d80b2fb57e3f0d89e7b0a333ecadb8f5cb2df4ee475d7a08eef8168859
                                          • Opcode Fuzzy Hash: 0fd623b6f6cfe9bf94a9c711ae6e806a3d089149aa344ea6f5b48f42c92aae01
                                          • Instruction Fuzzy Hash: A6116A71110208ABEB108E64DC44FEB37A9EB05378F604728FAA5961E0C77DEC509B60
                                          APIs
                                          • _memset.LIBCMT ref: 00792A22
                                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00792A41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: InfoItemMenu_memset
                                          • String ID: 0
                                          • API String ID: 2223754486-4108050209
                                          • Opcode ID: 632f668c548e5cd3205ad99bf4b640fc45fda6b80a8dfa25510964d35e4014d5
                                          • Instruction ID: ef6c92b632c94a063c034204230c7abd9de0d9961481e77712a24baf5d20a69c
                                          • Opcode Fuzzy Hash: 632f668c548e5cd3205ad99bf4b640fc45fda6b80a8dfa25510964d35e4014d5
                                          • Instruction Fuzzy Hash: 9B11AF33901114BACF30EA58E844FAE77B8EB46310F048021ED55A72A2D778AD0BC795
                                          APIs
                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 007A222C
                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 007A2255
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Internet$OpenOption
                                          • String ID: <local>
                                          • API String ID: 942729171-4266983199
                                          • Opcode ID: ffd6e4d156bf1745d2cc18a76a3d97da5c50d20ffa57a9e7733f59dce284787f
                                          • Instruction ID: 204f6a4f9efa336f2aacf032dd64f7d75b272576298341330b649b3759247e42
                                          • Opcode Fuzzy Hash: ffd6e4d156bf1745d2cc18a76a3d97da5c50d20ffa57a9e7733f59dce284787f
                                          • Instruction Fuzzy Hash: 26110270501225BADB248F19CC88FBBFBA8FF87751F10832AFA0446081D2789882D6F0
                                          APIs
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                            • Part of subcall function 0078AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0078AABC
                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00788E73
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_memmove
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 372448540-1403004172
                                          • Opcode ID: eff12e843f57fd9c88bfd5b84777170233aafab9bc6ec1a522a6f427b9e6fae7
                                          • Instruction ID: 92e5fdd9425e28c865309f9047f0218e84e7faed19087f05278990e4203ec27d
                                          • Opcode Fuzzy Hash: eff12e843f57fd9c88bfd5b84777170233aafab9bc6ec1a522a6f427b9e6fae7
                                          • Instruction Fuzzy Hash: D001F5B1641218EB9B18FBA0CC49DFE7368EF05320B440619F831672D2DE395808C751
                                          APIs
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                            • Part of subcall function 0078AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0078AABC
                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00788D6B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_memmove
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 372448540-1403004172
                                          • Opcode ID: 7a5b42c6195362d5e4027c926929622e4985509a69c19be413f3e0f5d6c67442
                                          • Instruction ID: c27d9cf419cb9a77e5cbdbeb925def1f2ce28fed3ee8c2739737a33f029aa064
                                          • Opcode Fuzzy Hash: 7a5b42c6195362d5e4027c926929622e4985509a69c19be413f3e0f5d6c67442
                                          • Instruction Fuzzy Hash: 8E01B5B1781108EBDB18F7A0CD5AEFE73A89F19300F540015B80163192DE185A08D372
                                          APIs
                                            • Part of subcall function 00737DE1: _memmove.LIBCMT ref: 00737E22
                                            • Part of subcall function 0078AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0078AABC
                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00788DEE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ClassMessageNameSend_memmove
                                          • String ID: ComboBox$ListBox
                                          • API String ID: 372448540-1403004172
                                          • Opcode ID: 005e3ab4ed776640aac624ad9b345d4d8ecf6371655a01f8455bdcc13231165e
                                          • Instruction ID: e1f091dee556067370e3e9df797ea05edf9ca6509c3c65a5d11eeb80a42468b3
                                          • Opcode Fuzzy Hash: 005e3ab4ed776640aac624ad9b345d4d8ecf6371655a01f8455bdcc13231165e
                                          • Instruction Fuzzy Hash: 5A0184B1B81109F7EB19F6A4CD4AEFE77A89B15300F544016B80563292DA1D5E08D372
                                          APIs
                                          • VariantInit.OLEAUT32(?), ref: 0078C534
                                            • Part of subcall function 0078C816: _memmove.LIBCMT ref: 0078C860
                                            • Part of subcall function 0078C816: VariantInit.OLEAUT32(00000000), ref: 0078C882
                                            • Part of subcall function 0078C816: VariantCopy.OLEAUT32(00000000,?), ref: 0078C88C
                                          • VariantClear.OLEAUT32(?), ref: 0078C556
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Variant$Init$ClearCopy_memmove
                                          • String ID: d}~
                                          • API String ID: 2932060187-2645811566
                                          • Opcode ID: 697fa1864a5fbc0e7906c88fdd8668794a08993f6818f2e964c55b9b8b52dc7a
                                          • Instruction ID: 40317f3eaef356967a1054d9af35406a7f3e4f12f31c0e069910e79ab0d618f8
                                          • Opcode Fuzzy Hash: 697fa1864a5fbc0e7906c88fdd8668794a08993f6818f2e964c55b9b8b52dc7a
                                          • Instruction Fuzzy Hash: 41110CB19007089FC710DFAAD88499BF7F8FF08710B50862EE58AD7611E775AA45CF90
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: __calloc_crt
                                          • String ID: ~
                                          • API String ID: 3494438863-2703998100
                                          • Opcode ID: 12d205667c5604b8dc3177fd0380041b8400442b28a87740338f2ff346b3264a
                                          • Instruction ID: bf4a10a7bb512637178e38d8e6d74e7487159a292fa47a1e87796414c55b0843
                                          • Opcode Fuzzy Hash: 12d205667c5604b8dc3177fd0380041b8400442b28a87740338f2ff346b3264a
                                          • Instruction Fuzzy Hash: A2F0A4F1209A128BF7648F55FC51BE22B94F704731BB0452AEA00DF185EBBC88498688
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: ClassName_wcscmp
                                          • String ID: #32770
                                          • API String ID: 2292705959-463685578
                                          • Opcode ID: 5951bc004b613644a2ee84baaefab6f04b77b874753652627b4ba18f15cc9a26
                                          • Instruction ID: 24c40125398abdfc5f9c447d5f3d4ee62786a0b2828a490574f2f3b381a2020b
                                          • Opcode Fuzzy Hash: 5951bc004b613644a2ee84baaefab6f04b77b874753652627b4ba18f15cc9a26
                                          • Instruction Fuzzy Hash: 1AE06832A0032C2BE720ABA9AC09FB7F7ACEB44B70F000067FC04D3050E9649A15C7E1
                                          APIs
                                            • Part of subcall function 0076B314: _memset.LIBCMT ref: 0076B321
                                            • Part of subcall function 00750940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0076B2F0,?,?,?,0073100A), ref: 00750945
                                          • IsDebuggerPresent.KERNEL32(?,?,?,0073100A), ref: 0076B2F4
                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0073100A), ref: 0076B303
                                          Strings
                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0076B2FE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                          • API String ID: 3158253471-631824599
                                          • Opcode ID: 309a1bad2188defd7dc55977952f07fbe31c7390e1a1e53b093e747dd23c780a
                                          • Instruction ID: a6917a37dc0cda83179acd7de2a5a62677594bef86e60ce5fc308a0c0e155126
                                          • Opcode Fuzzy Hash: 309a1bad2188defd7dc55977952f07fbe31c7390e1a1e53b093e747dd23c780a
                                          • Instruction Fuzzy Hash: 22E0C9B06007118AD7219F29D9087467BE4FF55714F008A6DE856C7752E7BCA445CBA1
                                          APIs
                                          • GetSystemDirectoryW.KERNEL32(?), ref: 00771775
                                            • Part of subcall function 007ABFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0077195E,?), ref: 007ABFFE
                                            • Part of subcall function 007ABFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 007AC010
                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0077196D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                          • String ID: WIN_XPe
                                          • API String ID: 582185067-3257408948
                                          • Opcode ID: 1dec5e7e9174805ef6aa197b34de39c1fa1ac3251d8f6d6a218626870426e577
                                          • Instruction ID: 3f71a86aea3b930866ed074c318ed2674258bd1e694aeb0d8d36a63464de89c0
                                          • Opcode Fuzzy Hash: 1dec5e7e9174805ef6aa197b34de39c1fa1ac3251d8f6d6a218626870426e577
                                          • Instruction Fuzzy Hash: 7AF03970800008DFDF19DBA8CD88BECBBF8AB18340F948095E006A20A1C7394F84CFA4
                                          APIs
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007B596E
                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 007B5981
                                            • Part of subcall function 00795244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007952BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FindMessagePostSleepWindow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 529655941-2988720461
                                          • Opcode ID: dd1cf8c7deccce213fdd0dcc904fd97912577844c3ad3f7ee18e3986a887473c
                                          • Instruction ID: 104972ac292e0983b3ddc197b5734394af571ab7b5eb0edbc454134a371a87bf
                                          • Opcode Fuzzy Hash: dd1cf8c7deccce213fdd0dcc904fd97912577844c3ad3f7ee18e3986a887473c
                                          • Instruction Fuzzy Hash: BDD0C971784711B6E6A4AB74AC0FFA66A14BF04B50F004925F649AA1D0C9E89810C668
                                          APIs
                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007B59AE
                                          • PostMessageW.USER32(00000000), ref: 007B59B5
                                            • Part of subcall function 00795244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 007952BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1333377432.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00730000, based on PE: true
                                          • Associated: 00000000.00000002.1333355303.0000000000730000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333464475.00000000007E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333540664.00000000007EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1333570358.00000000007F7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_730000_ql8KpEHT7y.jbxd
                                          Similarity
                                          • API ID: FindMessagePostSleepWindow
                                          • String ID: Shell_TrayWnd
                                          • API String ID: 529655941-2988720461
                                          • Opcode ID: 69c3878b2ba85bd507d516c5d3ee2b7960d8670b3ca0fed5527f7998371ba602
                                          • Instruction ID: d04c09649c788a2195ea7fa33ed2aee8c1759245b4dbde1775184e920a12fe3d
                                          • Opcode Fuzzy Hash: 69c3878b2ba85bd507d516c5d3ee2b7960d8670b3ca0fed5527f7998371ba602
                                          • Instruction Fuzzy Hash: A6D0C971781711BAE6A4AB74AC0FF966614BB08B50F004925F649AA1D0C9E8A810C668