Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uOCavrYu1y.exe

Overview

General Information

Sample name:uOCavrYu1y.exe
renamed because original name is a hash value
Original sample name:7dd88bb379949c90207a5d476d7318ba98ccb6cb7853409c6d323febd28d318d.exe
Analysis ID:1587805
MD5:be37ea5702226bf6ed17a5031c2d75d0
SHA1:c398fd238eb4c706ea7aff5c24cc0eaf93bcf077
SHA256:7dd88bb379949c90207a5d476d7318ba98ccb6cb7853409c6d323febd28d318d
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • uOCavrYu1y.exe (PID: 5088 cmdline: "C:\Users\user\Desktop\uOCavrYu1y.exe" MD5: BE37EA5702226BF6ED17A5031C2D75D0)
    • RegSvcs.exe (PID: 4304 cmdline: "C:\Users\user\Desktop\uOCavrYu1y.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.stingatoareincendii.ro", "Username": "mojooooofileeeee@stingatoareincendii.ro", "Password": "3.*RYhlG)lkA"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x34441:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x344b3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x3453d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x345cf:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x34639:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x346ab:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x34741:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x347d1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
        • 0x315d3:$s2: GetPrivateProfileString
        • 0x30ca1:$s3: get_OSFullName
        • 0x322d3:$s5: remove_Key
        • 0x324aa:$s5: remove_Key
        • 0x333db:$s6: FtpWebRequest
        • 0x34423:$s7: logins
        • 0x34995:$s7: logins
        • 0x376a6:$s7: logins
        • 0x37758:$s7: logins
        • 0x390ad:$s7: logins
        • 0x382f2:$s9: 1.85 (Hash, version 2, native byte-order)
        Click to see the 8 entries
        SourceRuleDescriptionAuthorStrings
        0.2.uOCavrYu1y.exe.3690000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.uOCavrYu1y.exe.3690000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            0.2.uOCavrYu1y.exe.3690000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.uOCavrYu1y.exe.3690000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x34441:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x344b3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x3453d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x345cf:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x34639:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x346ab:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x34741:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x347d1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              0.2.uOCavrYu1y.exe.3690000.1.raw.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
              • 0x315d3:$s2: GetPrivateProfileString
              • 0x30ca1:$s3: get_OSFullName
              • 0x322d3:$s5: remove_Key
              • 0x324aa:$s5: remove_Key
              • 0x333db:$s6: FtpWebRequest
              • 0x34423:$s7: logins
              • 0x34995:$s7: logins
              • 0x376a6:$s7: logins
              • 0x37758:$s7: logins
              • 0x390ad:$s7: logins
              • 0x382f2:$s9: 1.85 (Hash, version 2, native byte-order)
              Click to see the 9 entries
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 0.2.uOCavrYu1y.exe.3690000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.stingatoareincendii.ro", "Username": "mojooooofileeeee@stingatoareincendii.ro", "Password": "3.*RYhlG)lkA"}
              Source: uOCavrYu1y.exeVirustotal: Detection: 78%Perma Link
              Source: uOCavrYu1y.exeReversingLabs: Detection: 65%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: uOCavrYu1y.exeJoe Sandbox ML: detected
              Source: uOCavrYu1y.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: Binary string: wntdll.pdbUGP source: uOCavrYu1y.exe, 00000000.00000003.2165815098.0000000003870000.00000004.00001000.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2162638027.00000000036D0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: uOCavrYu1y.exe, 00000000.00000003.2165815098.0000000003870000.00000004.00001000.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2162638027.00000000036D0000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AF445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00AF445A
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFC6D1 FindFirstFileW,FindClose,0_2_00AFC6D1
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00AFC75C
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AFEF95
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AFF0F2
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AFF3F3
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AF37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AF37EF
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AF3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AF3B12
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AFBCBC

              Networking

              barindex
              Source: Yara matchFile source: 0.2.uOCavrYu1y.exe.3690000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: global trafficTCP traffic: 192.168.2.6:50169 -> 1.1.1.1:53
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: unknownDNS query: name: ip-api.com
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B022EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00B022EE
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: ip-api.com
              Source: RegSvcs.exe, 00000002.00000002.3401369142.0000000002621000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.00000000026FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.00000000026E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
              Source: uOCavrYu1y.exe, 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.0000000002621000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.00000000026E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
              Source: RegSvcs.exe, 00000002.00000002.3400434024.00000000009A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingk#k
              Source: RegSvcs.exe, 00000002.00000002.3400434024.00000000009A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting~#
              Source: RegSvcs.exe, 00000002.00000002.3401369142.0000000002621000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.00000000026E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: uOCavrYu1y.exe, 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B04164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B04164
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B04164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B04164
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B03F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B03F66
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AF001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00AF001C
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1CABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B1CABC

              System Summary

              barindex
              Source: 0.2.uOCavrYu1y.exe.3690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0.2.uOCavrYu1y.exe.3690000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 0.2.uOCavrYu1y.exe.3690000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0.2.uOCavrYu1y.exe.3690000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: This is a third-party compiled AutoIt script.0_2_00A93B3A
              Source: uOCavrYu1y.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: uOCavrYu1y.exe, 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7c643a5f-e
              Source: uOCavrYu1y.exe, 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_6e776df9-f
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A93633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,0_2_00A93633
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1C1AC PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,0_2_00B1C1AC
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1C498 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,0_2_00B1C498
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1C5FE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,0_2_00B1C5FE
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1C57D SendMessageW,NtdllDialogWndProc_W,0_2_00B1C57D
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1C8BE NtdllDialogWndProc_W,0_2_00B1C8BE
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1C88F NtdllDialogWndProc_W,0_2_00B1C88F
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1C860 NtdllDialogWndProc_W,0_2_00B1C860
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1C93E ClientToScreen,NtdllDialogWndProc_W,0_2_00B1C93E
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1C909 NtdllDialogWndProc_W,0_2_00B1C909
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1CABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B1CABC
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1CA7C GetWindowLongW,NtdllDialogWndProc_W,0_2_00B1CA7C
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A91287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,74A3C8D0,NtdllDialogWndProc_W,0_2_00A91287
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A91290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient,0_2_00A91290
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1D3B8 NtdllDialogWndProc_W,0_2_00B1D3B8
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1D43E GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,0_2_00B1D43E
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A916B5 NtdllDialogWndProc_W,0_2_00A916B5
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A916DE GetParent,NtdllDialogWndProc_W,0_2_00A916DE
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A9167D NtdllDialogWndProc_W,0_2_00A9167D
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1D78C NtdllDialogWndProc_W,0_2_00B1D78C
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A9189B NtdllDialogWndProc_W,0_2_00A9189B
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1BC5D NtdllDialogWndProc_W,CallWindowProcW,0_2_00B1BC5D
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1BF8C ReleaseCapture,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,0_2_00B1BF8C
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B1BF30 NtdllDialogWndProc_W,0_2_00B1BF30
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00AFA1EF
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AE8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,74F75590,CreateProcessAsUserW,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,0_2_00AE8310
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AF51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00AF51BD
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A9E6A00_2_00A9E6A0
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00ABD9750_2_00ABD975
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AB21C50_2_00AB21C5
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AC62D20_2_00AC62D2
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B103DA0_2_00B103DA
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AC242E0_2_00AC242E
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AB25FA0_2_00AB25FA
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AA66E10_2_00AA66E1
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AEE6160_2_00AEE616
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AC878F0_2_00AC878F
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AF88890_2_00AF8889
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AA88080_2_00AA8808
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B108570_2_00B10857
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AC68440_2_00AC6844
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00ABCB210_2_00ABCB21
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AC6DB60_2_00AC6DB6
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AA6F9E0_2_00AA6F9E
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AA30300_2_00AA3030
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AB31870_2_00AB3187
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00ABF1D90_2_00ABF1D9
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A912870_2_00A91287
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AB14840_2_00AB1484
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AA55200_2_00AA5520
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AB76960_2_00AB7696
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AA57600_2_00AA5760
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AB19780_2_00AB1978
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AC9AB50_2_00AC9AB5
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A9FCE00_2_00A9FCE0
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00ABBDA60_2_00ABBDA6
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AB1D900_2_00AB1D90
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B17DDB0_2_00B17DDB
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AA3FE00_2_00AA3FE0
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A9DF000_2_00A9DF00
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_036835F00_2_036835F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0243A6E02_2_0243A6E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02434A802_2_02434A80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02433E682_2_02433E68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024341B02_2_024341B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0243FA332_2_0243FA33
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CB12882_2_05CB1288
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CB3BD82_2_05CB3BD8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CB34F02_2_05CB34F0
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: String function: 00AB0AE3 appears 70 times
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: String function: 00AB8900 appears 42 times
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: String function: 00A97DE1 appears 36 times
              Source: uOCavrYu1y.exe, 00000000.00000003.2168323162.00000000039ED000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs uOCavrYu1y.exe
              Source: uOCavrYu1y.exe, 00000000.00000003.2164048414.00000000037F3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs uOCavrYu1y.exe
              Source: uOCavrYu1y.exe, 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamee8300309-2878-4eb6-9fa4-d88c99cb9494.exe4 vs uOCavrYu1y.exe
              Source: uOCavrYu1y.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.2.uOCavrYu1y.exe.3690000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0.2.uOCavrYu1y.exe.3690000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 0.2.uOCavrYu1y.exe.3690000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0.2.uOCavrYu1y.exe.3690000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFA06A GetLastError,FormatMessageW,0_2_00AFA06A
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AE81CB AdjustTokenPrivileges,CloseHandle,0_2_00AE81CB
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AE87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00AE87E1
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFB3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00AFB3FB
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B0EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00B0EE0D
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B083BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00B083BB
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A94E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00A94E89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeFile created: C:\Users\user\AppData\Local\Temp\aut10F5.tmpJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000002.00000002.3401369142.0000000002719000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.000000000272B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: uOCavrYu1y.exeVirustotal: Detection: 78%
              Source: uOCavrYu1y.exeReversingLabs: Detection: 65%
              Source: unknownProcess created: C:\Users\user\Desktop\uOCavrYu1y.exe "C:\Users\user\Desktop\uOCavrYu1y.exe"
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\uOCavrYu1y.exe"
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\uOCavrYu1y.exe"Jump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
              Source: Binary string: wntdll.pdbUGP source: uOCavrYu1y.exe, 00000000.00000003.2165815098.0000000003870000.00000004.00001000.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2162638027.00000000036D0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: uOCavrYu1y.exe, 00000000.00000003.2165815098.0000000003870000.00000004.00001000.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2162638027.00000000036D0000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B989C0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_00B989C0
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AB8945 push ecx; ret 0_2_00AB8958
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CBB5AF push 3805CDDAh; retf 2_2_05CBB5D5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CBF771 push cs; iretd 2_2_05CBF772
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CBF6D1 push cs; iretd 2_2_05CBF6D2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CBF6A1 push cs; iretd 2_2_05CBF6A2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CB1FF7 push esi; retf 2_2_05CB2002
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CBFF18 push ss; iretd 2_2_05CBFF1A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CBFEAB push ss; iretd 2_2_05CBFEB2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05CBFEA8 push ss; iretd 2_2_05CBFEAA
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A948D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00A948D7
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B15376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B15376
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AB3187 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00AB3187
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: uOCavrYu1y.exe PID: 5088, type: MEMORYSTR
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeAPI/Special instruction interceptor: Address: 3683214
              Source: uOCavrYu1y.exe, 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.0000000002655000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.00000000026FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: uOCavrYu1y.exe, 00000000.00000003.2152355578.0000000000CCD000.00000004.00000020.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2153734807.0000000000CCD000.00000004.00000020.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2153432583.0000000000CCD000.00000004.00000020.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2152750625.0000000000CCD000.00000004.00000020.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000002.2178757415.0000000000CCD000.00000004.00000020.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2152306418.0000000000CCD000.00000004.00000020.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2155609997.0000000000CC5000.00000004.00000020.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2153357880.0000000000CCD000.00000004.00000020.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2176564300.0000000000CC6000.00000004.00000020.00020000.00000000.sdmp, uOCavrYu1y.exe, 00000000.00000003.2153816653.0000000000CCD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE^
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-107318
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeAPI coverage: 4.7 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AF445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00AF445A
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFC6D1 FindFirstFileW,FindClose,0_2_00AFC6D1
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00AFC75C
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AFEF95
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AFF0F2
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AFF3F3
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AF37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AF37EF
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AF3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00AF3B12
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AFBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AFBCBC
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A949A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A949A0
              Source: RegSvcs.exe, 00000002.00000002.3401369142.00000000026FB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
              Source: RegSvcs.exe, 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
              Source: RegSvcs.exe, 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
              Source: RegSvcs.exe, 00000002.00000002.3402240113.00000000057F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeAPI call chain: ExitProcess graph end nodegraph_0-104866
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeAPI call chain: ExitProcess graph end nodegraph_0-106691

              Anti Debugging

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02437068 CheckRemoteDebuggerPresent,2_2_02437068
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B03F09 BlockInput,0_2_00B03F09
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A93B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00A93B3A
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AC5A7C RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,0_2_00AC5A7C
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B989C0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_00B989C0
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_036834E0 mov eax, dword ptr fs:[00000030h]0_2_036834E0
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_03683480 mov eax, dword ptr fs:[00000030h]0_2_03683480
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_03681E70 mov eax, dword ptr fs:[00000030h]0_2_03681E70
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AE80A9 GetTokenInformation,GetLastError,GetProcessHeap,RtlAllocateHeap,GetTokenInformation,0_2_00AE80A9
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00ABA124 SetUnhandledExceptionFilter,0_2_00ABA124
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00ABA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00ABA155
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 513008Jump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AE87B1 LogonUserW,0_2_00AE87B1
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A93B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00A93B3A
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A948D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00A948D7
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AF4C27 mouse_event,0_2_00AF4C27
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\uOCavrYu1y.exe"Jump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AE7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00AE7CAF
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AE874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00AE874B
              Source: uOCavrYu1y.exe, 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: uOCavrYu1y.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AB862B cpuid 0_2_00AB862B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AC4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00AC4E87
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AD1E06 GetUserNameW,0_2_00AD1E06
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00AC3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00AC3F3A
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00A949A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A949A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.uOCavrYu1y.exe.3690000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.uOCavrYu1y.exe.3690000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: uOCavrYu1y.exe PID: 5088, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4304, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: uOCavrYu1y.exeBinary or memory string: WIN_81
              Source: uOCavrYu1y.exeBinary or memory string: WIN_XP
              Source: uOCavrYu1y.exeBinary or memory string: WIN_XPe
              Source: uOCavrYu1y.exeBinary or memory string: WIN_VISTA
              Source: uOCavrYu1y.exeBinary or memory string: WIN_7
              Source: uOCavrYu1y.exeBinary or memory string: WIN_8
              Source: uOCavrYu1y.exe, 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
              Source: Yara matchFile source: 0.2.uOCavrYu1y.exe.3690000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.uOCavrYu1y.exe.3690000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3401369142.0000000002655000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: uOCavrYu1y.exe PID: 5088, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4304, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.uOCavrYu1y.exe.3690000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.uOCavrYu1y.exe.3690000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: uOCavrYu1y.exe PID: 5088, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4304, type: MEMORYSTR
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B06283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00B06283
              Source: C:\Users\user\Desktop\uOCavrYu1y.exeCode function: 0_2_00B06747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B06747
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              221
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Native API
              2
              Valid Accounts
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              21
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              Software Packing
              NTDS138
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              2
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets651
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Valid Accounts
              Cached Domain Credentials22
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              uOCavrYu1y.exe79%VirustotalBrowse
              uOCavrYu1y.exe66%ReversingLabsWin32.Trojan.AutoitInject
              uOCavrYu1y.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              ip-api.com
              208.95.112.1
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://ip-api.com/line/?fields=hostingfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://account.dyn.com/uOCavrYu1y.exe, 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3401369142.0000000002621000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.00000000026E0000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://ip-api.com/line/?fields=hostingk#kRegSvcs.exe, 00000002.00000002.3400434024.00000000009A4000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://ip-api.comRegSvcs.exe, 00000002.00000002.3401369142.0000000002621000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.00000000026FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3401369142.00000000026E0000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://ip-api.com/line/?fields=hosting~#RegSvcs.exe, 00000002.00000002.3400434024.00000000009A4000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUSfalse
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1587805
                            Start date and time:2025-01-10 18:09:36 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 45s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:5
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:uOCavrYu1y.exe
                            renamed because original name is a hash value
                            Original Sample Name:7dd88bb379949c90207a5d476d7318ba98ccb6cb7853409c6d323febd28d318d.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 59
                            • Number of non-executed functions: 277
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            sDflTDPSLw.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            2HCwqwLg1G.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            CdbVaYf8jC.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            H9YFiQB7o3.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            lFlw40OH6u.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            Pago devuelto #.Documentos#9787565789678675645767856843.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ip-api.comXoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            sDflTDPSLw.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            2HCwqwLg1G.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            CdbVaYf8jC.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            H9YFiQB7o3.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            lFlw40OH6u.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            Pago devuelto #.Documentos#9787565789678675645767856843.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            TUT-ASUSXoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            sDflTDPSLw.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            2HCwqwLg1G.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            CdbVaYf8jC.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            H9YFiQB7o3.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            lFlw40OH6u.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            Pago devuelto #.Documentos#9787565789678675645767856843.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            No context
                            No context
                            Process:C:\Users\user\Desktop\uOCavrYu1y.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):145778
                            Entropy (8bit):7.743783484328225
                            Encrypted:false
                            SSDEEP:3072:d7SluJ2x+0K+PQDf+s0fUk5EZMb8KvAi51KSze5h3d3aQgjAaYpCXgkVU:d2UZ0mfqfUk54K951KikZgjAaYKgR
                            MD5:EBB2252F43E163F6ED5E728DAEFA9B70
                            SHA1:037F0BC820A5F09389F275601E57817F07AB1DED
                            SHA-256:8B2AC072F9543C19574F38F9AAB76ABEC30C0A1F679013C513395326D9F56A1A
                            SHA-512:D43DE6EE2E35A02483296CFBF52A7B8876B5EA9B96105630763E64D9667322D5EA7F8C46E4BF9DCDB10DADC5D2785DB57AA1A224D3191E17FEDDDCEA95E5C2A1
                            Malicious:false
                            Reputation:low
                            Preview:EA06.....E.T."k0...3...cL..*T......(t..2..!.x......+.?E.m...m.....n..'.....'.P...NE!.....-:.W...B...['.9..1E.N.`....jT..&m0..w.P..u..y...R.P..*eF....".0.....eD.@..).p...1.U@$3K....M.R.(1A..y5.e..6...4.......0..i8:.6.. ..S.-(...Sg@ .P....@R..;G..!`........%.h.....Z...=c..e....U..!4 ..^. R........R&....y\.K&4....1.S....d...@...p.........8..4.Az..o..4.S....>cJ.....3L.~.._.....Y.R.G........+..m...t.C*.w...t.......I....c.PoF..F.j?....T......kaw..4.=.w~...r.6....^(.8&..?..>.........6W..\v.....;..y}).{.2...uy...*..2Yu.K.j)....o..y.{n..i....s.u.!.z;.....*..{........`.0....`B...`..?..)........" ....@.........A.d.?..;2Y..Z.!^....&E....z..3..O.2{\......H7.%0........}..4....Gy..".)...i..)UjD.1...U{..m....................D&.I...9S.......i....mH..9...:..ki.nF.a...*R.TFq>.H%.Y=f.*..l.x.Fy#..p1F........A.R..:}.....,..#YX.0&S..faG...7...=M.Q.3KOvg2.S*Tz\.....dt:|.S.U..jD...M...:..L..g.....2.L........Mf.P1..O.V...&.ob..'.z.....Tb`..{.1..n4....Q.T).......F.5.-..L.R.1y
                            Process:C:\Users\user\Desktop\uOCavrYu1y.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9746
                            Entropy (8bit):7.623388652781833
                            Encrypted:false
                            SSDEEP:192:EndJI2/lyEAZDgmFVZYQl/sumysD8X7WYkS/9hkOSAGfMFTyvcvl:EnPZNyVDgaLEPD86ZSVhmBayvm
                            MD5:52DF0C5F3F41ED1C446B3D6A65D1A573
                            SHA1:F4D751FB875BEF97C0EA570D60111E839A93C525
                            SHA-256:76D473C11AF81126FC6F199CF8831DE5597B4799E5141374A55158C78CC1ED10
                            SHA-512:F336B9B03BCB2A697F07CA67AA8F0B8999FC3AE8466C7A9546940B8274DE7C6F0DD2866455C36256589B330CF780C61D95D1E935B3DF3C812B316DE44E395E6B
                            Malicious:false
                            Reputation:low
                            Preview:EA06..p..L..Y..p...o3i...f.NfVk%..1..@.I..m8..f.0..c1...3...s5...`...@.K..f.%...r.lY........d...@.o..c..&...Lls....f.Y...b..-vm6.M@......7.l,........X..K ........g6Y......l..].M..p...9|....r.1..... ..$h.c.....#@...H,....`..m1.H.f.0...<zm6....!:.B...S..n..Y..s8.t.,.0....5....p....9.... ....d....`....1.....0..Y......./Z..-zu6...js8...zn........V)...#...Nf...N.^.:.....8.:..w.......8...}3.#..qd...g.`./....J.v.6.X.{......)....b..g.....`.Y..`...&.......x...u| ......l`=.%.f....f.9...,sp./..9....`..%.......;$..#..l.0./.m6.M@4.;$..K..4|.K..g.d....d.Nf.y....x.g.{ ..d..gSi...@}.<..3.....33+..uf..g6PC`..s....f.,..j........Y.......Y.,.r.Y. .f.e...8...@.2....;2.X.b..Lg@...... ....38...[........9e..,vf.....k3........#.0.....3b.Y.6pj.....Bvh.....@R...o9.4@9..NM..;4.X.n.:M.@..........c.P....3)..f.... ......8.a...g...B)..'f......j.b.X.@..u6..Bvl......).;...N@.;7.X...Cv0}.....g <..L..8.....g..@.@....`...f..!..Lf....l....B;8.X...c3.%..:...!...Gg ....,d..Yg..........c.....
                            Process:C:\Users\user\Desktop\uOCavrYu1y.exe
                            File Type:ASCII text, with very long lines (28696), with no line terminators
                            Category:dropped
                            Size (bytes):28696
                            Entropy (8bit):3.578385471745518
                            Encrypted:false
                            SSDEEP:192:GIU0YzxURqp0m5Y+25yeDE49yry+a9ydKKqQl8Ep1zMHPLD1LXVBvbcENwwZUU1s:fYzxrp0FwaI4EYVLXDXZZRdDZ8d4509
                            MD5:94BBDD15E8682D8B44EB09A6C71EF84C
                            SHA1:093924580CFA6ACC343039AA7779A56EBFD9AAAA
                            SHA-256:6513C00568442A6F80DFB0A2EA2D1A9B9695CE924D9DBB4499673A97786B3DEB
                            SHA-512:82C86FD4B1F72F5D8268E79E2D15F630440245507C2AD02A38BEA2DA1EBAC4DF558931969C5443B4F2EA827C70F6474A2B39F231EB57EF51420EBBC82C165B92
                            Malicious:false
                            Reputation:low
                            Preview:625522888881y669cfd92fddd1311116768c97c111111779:5695c:76111111779:5e97cb83111111779:6699c97f111111779:569bc:76111111779:5e9dcb7d111111779:669fc944111111779:56:1c:43111111779:5e:3cb3f111111779:66:5c975111111779:56:7c:7d111111779:5e:9cb7d111111779:66:b44d1779:56:dc:7f111111779:9e55ggggggcb85111111779::657ggggggc975111111779:9659ggggggc:7d111111779:9e5bggggggcb7d111111779::65dggggggc93f111111779:965fggggggc:75111111779:9e61ggggggcb7d111111779::663ggggggc97d111111779:9665gggggg44d:779:9e67ggggggcb86111111779:66e1c984111111779:56e3c:76111111779:5ee5cb83111111779:66e7c944111111779:56e9c:43111111779:5eebcb3f111111779:66edc975111111779:56efc:7d111111779:5ef1cb7d111111779:66f344d1779:56f5c:72111111779:9e79ggggggcb75111111779::67bggggggc987111111779:967dggggggc:72111111779:9e7fggggggcb81111111779::681ggggggc97:111111779:9683ggggggc:44111111779:9e85ggggggcb43111111779::687ggggggc93f111111779:9689ggggggc:75111111779:9e8bggggggcb7d111111779::68dggggggc97d111111779:968fgggggg44d:779:5e91cb841111117
                            Process:C:\Users\user\Desktop\uOCavrYu1y.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):244224
                            Entropy (8bit):6.616525222907074
                            Encrypted:false
                            SSDEEP:6144:oRQZaeR1kLHrln/makr1m7KPC+pLWeHnpHIZgx:oRIaeYLHriUKPCOZpoZgx
                            MD5:7CA597B9B54DD1F10415A926448A28F8
                            SHA1:D4AFF9DF2DFE8E46AD5537C330BF692698E73873
                            SHA-256:7A7FC7743F2ED9D5896D269053AA8D6A48ED2DB9388479DC4699027F2C519BC2
                            SHA-512:C58801697BC75CB9465B8D4281E5E2ACE9E88597406C6C01E92EB2A58BB159F9976C3521BFEC65433D7528A010D769FB036C8CC967EAB30843FE57E28D913384
                            Malicious:false
                            Reputation:low
                            Preview:...M5H50KGY0..1L.LRM6H50.GY0CO1LQLRM6H50OGY0CO1LQLRM6H50OGY0.O1L_S.C6.<.n.X|.ne$8?r=D'RB.*yS"!_#%l0(.:@^o.7...bl<#6(.E8:kGY0CO1L..RMzI60...UCO1LQLRM.H71DFR0C.2LQDRM6H50!.Z0Co1LQ.QM6Hu0OgY0CM1LULRM6H50KGY0CO1LQlVM6J50OGY0AOq.QLBM6X50OGI0C_1LQLRM&H50OGY0CO1LI.QMeH50O.Z0.J1LQLRM6H50OGY0CO1LQLVM:H50OGY0CO1LQLRM6H50OGY0CO1LQLRM6H50OGY0CO1LQLRM6H50OgY0KO1LQLRM6H50GgY0.O1LQLRM6H50a3<H7O1L%.QM6h50O.Z0CM1LQLRM6H50OGY0cO1,.>!?UH50.BY0C.2LQJRM6.60OGY0CO1LQLRMvH5pa5<\,,1L]LRM6H10OEY0C.2LQLRM6H50OGY0.O1.QLRM6H50OGY0CO1L..QM6H50.GY0AO4L..PM.}40LGY0BO1JQLRM6H50OGY0CO1LQLRM6H50OGY0CO1LQLRM6H50OGY0CO1LL.....}..:g:!H.j.+.N..&..>..L.$.*X.}.8.....d:7..L.B...F...:.DT5S.....w'RAM'b;~C3.+.l.zxD...J?.(..K..)_..f...jq..y?;....;..2#?cW8E\*i.Q%.C%.N.L6H50........84...K:.{U!f...e^*.....1GY0'O1L#LRMWH50.GY0,O1L?LRMHH501GY0.O1L.LRM.H50jGY0.O1LuLRMHH50.:V?...%".M6H50z....".....z....>.'k!w.(....0c.H1.4.}...\..#y.X.26`.iKPJVH4O13CzW{...mSHVH4O13CzW{...m.j....>....5.0QLRM6H.0O.Y0C.L.LRM.H.0..Y0C..L.L.M..0
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                            Entropy (8bit):7.921841957003964
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.39%
                            • UPX compressed Win32 Executable (30571/9) 0.30%
                            • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            File name:uOCavrYu1y.exe
                            File size:551'936 bytes
                            MD5:be37ea5702226bf6ed17a5031c2d75d0
                            SHA1:c398fd238eb4c706ea7aff5c24cc0eaf93bcf077
                            SHA256:7dd88bb379949c90207a5d476d7318ba98ccb6cb7853409c6d323febd28d318d
                            SHA512:dbccef3070c62d1fa2fad4f81e1a8cf8d8a86e3a3e4b81a7dffa928110f7d2f1dc426141c28a52be70a0beaaed1d9d8cfc0079294fc85b06089d0c5e584e8906
                            SSDEEP:12288:LquErHF6xC9D6DmR1J98w4oknqOOCyQfDp0ZOJovZNf9t7:Srl6kD68JmlotQfaZz7f7
                            TLSH:F4C412894D85D862D6286776C079CC981A767872CD88776EC728F55FFC30387A81EB2C
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                            Icon Hash:aaf3e3e3938382a0
                            Entrypoint:0x5089c0
                            Entrypoint Section:UPX1
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                            Time Stamp:0x67655EAD [Fri Dec 20 12:10:21 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:fc6683d30d9f25244a50fd5357825e79
                            Instruction
                            pushad
                            mov esi, 004B3000h
                            lea edi, dword ptr [esi-000B2000h]
                            push edi
                            jmp 00007F3C34C004EDh
                            nop
                            mov al, byte ptr [esi]
                            inc esi
                            mov byte ptr [edi], al
                            inc edi
                            add ebx, ebx
                            jne 00007F3C34C004E9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007F3C34C004CFh
                            mov eax, 00000001h
                            add ebx, ebx
                            jne 00007F3C34C004E9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc eax, eax
                            add ebx, ebx
                            jnc 00007F3C34C004EDh
                            jne 00007F3C34C0050Ah
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007F3C34C00501h
                            dec eax
                            add ebx, ebx
                            jne 00007F3C34C004E9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc eax, eax
                            jmp 00007F3C34C004B6h
                            add ebx, ebx
                            jne 00007F3C34C004E9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc ecx, ecx
                            jmp 00007F3C34C00534h
                            xor ecx, ecx
                            sub eax, 03h
                            jc 00007F3C34C004F3h
                            shl eax, 08h
                            mov al, byte ptr [esi]
                            inc esi
                            xor eax, FFFFFFFFh
                            je 00007F3C34C00557h
                            sar eax, 1
                            mov ebp, eax
                            jmp 00007F3C34C004EDh
                            add ebx, ebx
                            jne 00007F3C34C004E9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007F3C34C004AEh
                            inc ecx
                            add ebx, ebx
                            jne 00007F3C34C004E9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007F3C34C004A0h
                            add ebx, ebx
                            jne 00007F3C34C004E9h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc ecx, ecx
                            add ebx, ebx
                            jnc 00007F3C34C004D1h
                            jne 00007F3C34C004EBh
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jnc 00007F3C34C004C6h
                            add ecx, 02h
                            cmp ebp, FFFFFB00h
                            adc ecx, 02h
                            lea edx, dword ptr [edi+ebp]
                            cmp ebp, FFFFFFFCh
                            jbe 00007F3C34C004F0h
                            mov al, byte ptr [edx]
                            Programming Language:
                            • [ASM] VS2013 build 21005
                            • [ C ] VS2013 build 21005
                            • [C++] VS2013 build 21005
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [ASM] VS2013 UPD4 build 31101
                            • [RES] VS2013 build 21005
                            • [LNK] VS2013 UPD4 build 31101
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x13961c0x424.rsrc
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1090000x3061c.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x139a400xc.rsrc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x108ba40x48UPX1
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            UPX00x10000xb20000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            UPX10xb30000x560000x55c00584e3129925ba56e8c320bdfb53e420eFalse0.9884349945335277data7.936841013942489IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x1090000x310000x30c0003b2ad3bd065a400a6b236067fa7be2bFalse0.8944661458333333data7.815697256785348IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x1095ac0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                            RT_ICON0x1096d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                            RT_ICON0x1098040x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0x1099300x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                            RT_ICON0x109c1c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                            RT_ICON0x109d480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                            RT_ICON0x10abf40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                            RT_ICON0x10b4a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                            RT_ICON0x10ba0c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                            RT_ICON0x10dfb80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                            RT_ICON0x10f0640x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                            RT_MENU0xcd4a00x50dataEnglishGreat Britain1.1375
                            RT_STRING0xcd4f00x594dataEnglishGreat Britain1.007703081232493
                            RT_STRING0xcda840x68adataEnglishGreat Britain1.0065710872162486
                            RT_STRING0xce1100x490dataEnglishGreat Britain1.009417808219178
                            RT_STRING0xce5a00x5fcdataEnglishGreat Britain1.0071801566579635
                            RT_STRING0xceb9c0x65cdataEnglishGreat Britain1.0067567567567568
                            RT_STRING0xcf1f80x466dataEnglishGreat Britain1.0097690941385435
                            RT_STRING0xcf6600x158dataEnglishGreat Britain1.0319767441860466
                            RT_RCDATA0x10f4d00x29bb2data1.0003568712338384
                            RT_GROUP_ICON0x1390880x76dataEnglishGreat Britain0.6610169491525424
                            RT_GROUP_ICON0x1391040x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0x13911c0x14dataEnglishGreat Britain1.15
                            RT_GROUP_ICON0x1391340x14dataEnglishGreat Britain1.25
                            RT_VERSION0x13914c0xdcdataEnglishGreat Britain0.6181818181818182
                            RT_MANIFEST0x13922c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                            DLLImport
                            KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                            ADVAPI32.dllGetAce
                            COMCTL32.dllImageList_Remove
                            COMDLG32.dllGetOpenFileNameW
                            GDI32.dllLineTo
                            IPHLPAPI.DLLIcmpSendEcho
                            MPR.dllWNetUseConnectionW
                            ole32.dllCoGetObject
                            OLEAUT32.dllVariantInit
                            PSAPI.DLLGetProcessMemoryInfo
                            SHELL32.dllDragFinish
                            USER32.dllGetDC
                            USERENV.dllLoadUserProfileW
                            UxTheme.dllIsThemeActive
                            VERSION.dllVerQueryValueW
                            WININET.dllFtpOpenFileW
                            WINMM.dlltimeGetTime
                            WSOCK32.dllconnect
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 10, 2025 18:10:35.860451937 CET4971080192.168.2.6208.95.112.1
                            Jan 10, 2025 18:10:35.865371943 CET8049710208.95.112.1192.168.2.6
                            Jan 10, 2025 18:10:35.865454912 CET4971080192.168.2.6208.95.112.1
                            Jan 10, 2025 18:10:35.896445036 CET4971080192.168.2.6208.95.112.1
                            Jan 10, 2025 18:10:35.901381969 CET8049710208.95.112.1192.168.2.6
                            Jan 10, 2025 18:10:36.329173088 CET8049710208.95.112.1192.168.2.6
                            Jan 10, 2025 18:10:36.377748013 CET4971080192.168.2.6208.95.112.1
                            Jan 10, 2025 18:10:51.181996107 CET5016953192.168.2.61.1.1.1
                            Jan 10, 2025 18:10:51.186851025 CET53501691.1.1.1192.168.2.6
                            Jan 10, 2025 18:10:51.186919928 CET5016953192.168.2.61.1.1.1
                            Jan 10, 2025 18:10:51.191814899 CET53501691.1.1.1192.168.2.6
                            Jan 10, 2025 18:10:51.660765886 CET5016953192.168.2.61.1.1.1
                            Jan 10, 2025 18:10:51.666090012 CET53501691.1.1.1192.168.2.6
                            Jan 10, 2025 18:10:51.666223049 CET5016953192.168.2.61.1.1.1
                            Jan 10, 2025 18:11:24.645874977 CET8049710208.95.112.1192.168.2.6
                            Jan 10, 2025 18:11:24.645922899 CET4971080192.168.2.6208.95.112.1
                            Jan 10, 2025 18:12:16.368067980 CET4971080192.168.2.6208.95.112.1
                            Jan 10, 2025 18:12:16.373069048 CET8049710208.95.112.1192.168.2.6
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 10, 2025 18:10:35.846036911 CET6208153192.168.2.61.1.1.1
                            Jan 10, 2025 18:10:35.853756905 CET53620811.1.1.1192.168.2.6
                            Jan 10, 2025 18:10:51.181595087 CET53569591.1.1.1192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 10, 2025 18:10:35.846036911 CET192.168.2.61.1.1.10x95daStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 10, 2025 18:10:35.853756905 CET1.1.1.1192.168.2.60x95daNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.649710208.95.112.1804304C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            TimestampBytes transferredDirectionData
                            Jan 10, 2025 18:10:35.896445036 CET80OUTGET /line/?fields=hosting HTTP/1.1
                            Host: ip-api.com
                            Connection: Keep-Alive
                            Jan 10, 2025 18:10:36.329173088 CET175INHTTP/1.1 200 OK
                            Date: Fri, 10 Jan 2025 17:10:35 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 6
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 66 61 6c 73 65 0a
                            Data Ascii: false


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:12:10:32
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\uOCavrYu1y.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\uOCavrYu1y.exe"
                            Imagebase:0xa90000
                            File size:551'936 bytes
                            MD5 hash:BE37EA5702226BF6ED17A5031C2D75D0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.2179718615.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:12:10:33
                            Start date:10/01/2025
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\uOCavrYu1y.exe"
                            Imagebase:0x200000
                            File size:45'984 bytes
                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3401369142.0000000002655000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3400114367.0000000000602000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:3.7%
                              Dynamic/Decrypted Code Coverage:1.3%
                              Signature Coverage:6.8%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:46
                              execution_graph 104551 acfdfc 104568 a9ab30 Mailbox _memmove 104551->104568 104553 ae617e Mailbox 59 API calls 104566 a9a057 104553->104566 104555 ab0db6 59 API calls Mailbox 104555->104568 104557 a9b525 104822 af9e4a 89 API calls 4 library calls 104557->104822 104559 ad09e5 104827 af9e4a 89 API calls 4 library calls 104559->104827 104560 ad0055 104817 af9e4a 89 API calls 4 library calls 104560->104817 104562 ab0db6 59 API calls Mailbox 104576 a99f37 Mailbox 104562->104576 104565 a9b475 104818 a98047 104565->104818 104567 ad0064 104568->104555 104568->104557 104568->104566 104568->104576 104585 a9b2b6 104568->104585 104588 ad086a 104568->104588 104590 ad0878 104568->104590 104592 ad085c 104568->104592 104593 a9b21c 104568->104593 104597 ae6e8f 59 API calls 104568->104597 104602 a99ea0 104568->104602 104626 afd07b 104568->104626 104673 b0df23 104568->104673 104676 b0445a 104568->104676 104685 aa1fc3 104568->104685 104725 b0c2e0 104568->104725 104757 af7956 104568->104757 104763 a97de1 104568->104763 104767 b0bc6b 104568->104767 104807 ae617e 104568->104807 104812 a99c90 59 API calls Mailbox 104568->104812 104816 b0c193 85 API calls 2 library calls 104568->104816 104570 a9b47a 104570->104559 104570->104560 104573 a97667 59 API calls 104573->104576 104575 a98047 59 API calls 104575->104576 104576->104560 104576->104562 104576->104565 104576->104566 104576->104570 104576->104573 104576->104575 104578 ae6e8f 59 API calls 104576->104578 104579 ad09d6 104576->104579 104580 ab2d40 67 API calls __cinit 104576->104580 104583 a9a55a 104576->104583 104810 a9c8c0 331 API calls 2 library calls 104576->104810 104811 a9b900 60 API calls Mailbox 104576->104811 104578->104576 104826 af9e4a 89 API calls 4 library calls 104579->104826 104580->104576 104825 af9e4a 89 API calls 4 library calls 104583->104825 104815 a9f6a3 331 API calls 104585->104815 104823 a99c90 59 API calls Mailbox 104588->104823 104824 af9e4a 89 API calls 4 library calls 104590->104824 104592->104553 104592->104566 104813 a99d3c 60 API calls Mailbox 104593->104813 104595 a9b22d 104814 a99d3c 60 API calls Mailbox 104595->104814 104597->104568 104603 a99ebf 104602->104603 104621 a99eed Mailbox 104602->104621 104828 ab0db6 104603->104828 104605 a9b475 104606 a98047 59 API calls 104605->104606 104617 a9a057 104606->104617 104607 a9b47a 104609 ad09e5 104607->104609 104610 ad0055 104607->104610 104608 ae6e8f 59 API calls 104608->104621 104843 af9e4a 89 API calls 4 library calls 104609->104843 104840 af9e4a 89 API calls 4 library calls 104610->104840 104611 a97667 59 API calls 104611->104621 104613 ab0db6 59 API calls Mailbox 104613->104621 104616 ad0064 104616->104568 104617->104568 104619 a98047 59 API calls 104619->104621 104621->104605 104621->104607 104621->104608 104621->104610 104621->104611 104621->104613 104621->104617 104621->104619 104622 ab2d40 67 API calls __cinit 104621->104622 104623 ad09d6 104621->104623 104625 a9a55a 104621->104625 104838 a9c8c0 331 API calls 2 library calls 104621->104838 104839 a9b900 60 API calls Mailbox 104621->104839 104622->104621 104842 af9e4a 89 API calls 4 library calls 104623->104842 104841 af9e4a 89 API calls 4 library calls 104625->104841 104627 afd0a5 104626->104627 104628 afd09a 104626->104628 104671 afd17f Mailbox 104627->104671 104904 a97667 104627->104904 104903 a99b3c 59 API calls 104628->104903 104630 ab0db6 Mailbox 59 API calls 104632 afd1c8 104630->104632 104634 afd1d4 104632->104634 104974 a957a6 60 API calls Mailbox 104632->104974 104872 a99837 104634->104872 104635 a97667 59 API calls 104638 afd0d2 104635->104638 104640 a99837 84 API calls 104638->104640 104642 afd0de 104640->104642 104909 a9459b 104642->104909 104645 afd1ff GetLastError 104648 afd218 104645->104648 104646 afd233 104650 afd25e 104646->104650 104651 afd295 104646->104651 104647 afd0f3 104960 a97b2e 104647->104960 104654 afd188 Mailbox 104648->104654 104975 a958ba CloseHandle 104648->104975 104653 ab0db6 Mailbox 59 API calls 104650->104653 104656 ab0db6 Mailbox 59 API calls 104651->104656 104658 afd263 104653->104658 104654->104568 104655 afd178 104973 a99b3c 59 API calls 104655->104973 104657 afd29a 104656->104657 104657->104654 104664 a97667 59 API calls 104657->104664 104662 afd274 104658->104662 104665 a97667 59 API calls 104658->104665 104976 b0fbce 59 API calls 2 library calls 104662->104976 104664->104654 104665->104662 104666 afd13a 104667 a97de1 59 API calls 104666->104667 104669 afd147 104667->104669 104972 af3a2a 63 API calls Mailbox 104669->104972 104671->104630 104671->104654 104672 afd150 Mailbox 104672->104655 105089 b0cadd 104673->105089 104675 b0df33 104675->104568 104677 a99837 84 API calls 104676->104677 104678 b04494 104677->104678 105200 a96240 104678->105200 104680 b044a4 104681 b044c9 104680->104681 104682 a99ea0 331 API calls 104680->104682 104684 b044cd 104681->104684 105225 a99a98 104681->105225 104682->104681 104684->104568 104686 a99a98 59 API calls 104685->104686 104687 aa1fdb 104686->104687 104689 ab0db6 Mailbox 59 API calls 104687->104689 104692 ad6585 104687->104692 104690 aa1ff4 104689->104690 104693 aa2004 104690->104693 105266 a957a6 60 API calls Mailbox 104690->105266 104691 aa2029 104702 aa2036 104691->104702 105271 a99b3c 59 API calls 104691->105271 104692->104691 105270 aff574 59 API calls 104692->105270 104695 a99837 84 API calls 104693->104695 104697 aa2012 104695->104697 104699 a957f6 67 API calls 104697->104699 104698 ad65cd 104701 ad65d5 104698->104701 104698->104702 104700 aa2021 104699->104700 104700->104691 104700->104692 105269 a958ba CloseHandle 104700->105269 105272 a99b3c 59 API calls 104701->105272 104703 a95cdf 2 API calls 104702->104703 104706 aa203d 104703->104706 104707 ad65e7 104706->104707 104708 aa2057 104706->104708 104710 ab0db6 Mailbox 59 API calls 104707->104710 104709 a97667 59 API calls 104708->104709 104711 aa205f 104709->104711 104712 ad65ed 104710->104712 105251 a95572 104711->105251 104713 ad6601 104712->104713 105273 a95850 ReadFile SetFilePointerEx 104712->105273 104718 ad6605 _memmove 104713->104718 105274 af76c4 59 API calls 2 library calls 104713->105274 104717 aa206e 104717->104718 105267 a99a3c 59 API calls Mailbox 104717->105267 104720 aa2082 Mailbox 104721 aa20bc 104720->104721 104722 a95c6f CloseHandle 104720->104722 104721->104568 104723 aa20b0 104722->104723 104723->104721 105268 a958ba CloseHandle 104723->105268 104726 a97667 59 API calls 104725->104726 104727 b0c2f4 104726->104727 104728 a97667 59 API calls 104727->104728 104729 b0c2fc 104728->104729 104730 a97667 59 API calls 104729->104730 104731 b0c304 104730->104731 104732 a99837 84 API calls 104731->104732 104746 b0c312 104732->104746 104733 a97bcc 59 API calls 104733->104746 104734 b0c4fb 104735 b0c528 Mailbox 104734->104735 105321 a99a3c 59 API calls Mailbox 104734->105321 104735->104568 104736 b0c4e2 105314 a97cab 104736->105314 104739 a97924 59 API calls 104739->104746 104740 b0c4fd 104743 a97cab 59 API calls 104740->104743 104741 a98047 59 API calls 104741->104746 104745 b0c50c 104743->104745 104744 a97b2e 59 API calls 104744->104734 104748 a97b2e 59 API calls 104745->104748 104746->104733 104746->104734 104746->104735 104746->104736 104746->104739 104746->104740 104746->104741 104747 a97e4f 59 API calls 104746->104747 104749 a97e4f 59 API calls 104746->104749 104754 a99837 84 API calls 104746->104754 104755 a97b2e 59 API calls 104746->104755 104756 a97cab 59 API calls 104746->104756 104750 b0c3a9 CharUpperBuffW 104747->104750 104748->104734 104752 b0c469 CharUpperBuffW 104749->104752 105312 a9843a 68 API calls 104750->105312 105313 a9c5a7 69 API calls 2 library calls 104752->105313 104754->104746 104755->104746 104756->104746 104758 af7962 104757->104758 104759 ab0db6 Mailbox 59 API calls 104758->104759 104760 af7970 104759->104760 104761 af797e 104760->104761 104762 a97667 59 API calls 104760->104762 104761->104568 104762->104761 104764 a97df0 __NMSG_WRITE _memmove 104763->104764 104765 ab0db6 Mailbox 59 API calls 104764->104765 104766 a97e2e 104765->104766 104766->104568 104768 b0bcb0 104767->104768 104769 b0bc96 104767->104769 105328 b0a213 59 API calls Mailbox 104768->105328 105327 af9e4a 89 API calls 4 library calls 104769->105327 104772 b0bcbb 104773 a99ea0 330 API calls 104772->104773 104774 b0bd1c 104773->104774 104775 b0bdae 104774->104775 104778 b0bd5d 104774->104778 104800 b0bca8 Mailbox 104774->104800 104776 b0be04 104775->104776 104777 b0bdb4 104775->104777 104779 a99837 84 API calls 104776->104779 104776->104800 105349 af791a 59 API calls 104777->105349 105329 af72df 59 API calls Mailbox 104778->105329 104781 b0be16 104779->104781 104784 a97e4f 59 API calls 104781->104784 104782 b0bdd7 105350 a95d41 59 API calls Mailbox 104782->105350 104785 b0be3a CharUpperBuffW 104784->104785 104790 b0be54 104785->104790 104787 b0bd8d 105330 a9f460 104787->105330 104788 b0bddf Mailbox 105351 a9fce0 331 API calls 2 library calls 104788->105351 104791 b0bea7 104790->104791 104792 b0be5b 104790->104792 104794 a99837 84 API calls 104791->104794 105352 af72df 59 API calls Mailbox 104792->105352 104795 b0beaf 104794->104795 105353 a99e5d 60 API calls 104795->105353 104798 b0be89 104799 a9f460 330 API calls 104798->104799 104799->104800 104800->104568 104801 b0beb9 104801->104800 104802 a99837 84 API calls 104801->104802 104803 b0bed4 104802->104803 105354 a95d41 59 API calls Mailbox 104803->105354 104805 b0bee4 105355 a9fce0 331 API calls 2 library calls 104805->105355 106465 ae60c0 104807->106465 104809 ae618c 104809->104568 104810->104576 104811->104576 104812->104568 104813->104595 104814->104585 104815->104557 104816->104568 104817->104567 104819 a9805a 104818->104819 104820 a98052 104818->104820 104819->104566 106470 a97f77 59 API calls 2 library calls 104820->106470 104822->104592 104823->104592 104824->104592 104825->104566 104826->104559 104827->104566 104831 ab0dbe 104828->104831 104830 ab0dd8 104830->104621 104831->104830 104833 ab0ddc std::exception::exception 104831->104833 104844 ab571c 104831->104844 104861 ab33a1 RtlDecodePointer 104831->104861 104862 ab859b RaiseException 104833->104862 104835 ab0e06 104863 ab84d1 58 API calls _free 104835->104863 104837 ab0e18 104837->104621 104838->104621 104839->104621 104840->104616 104841->104617 104842->104609 104843->104617 104845 ab5797 104844->104845 104856 ab5728 104844->104856 104870 ab33a1 RtlDecodePointer 104845->104870 104847 ab579d 104871 ab8b28 58 API calls __getptd_noexit 104847->104871 104850 ab575b RtlAllocateHeap 104850->104856 104860 ab578f 104850->104860 104852 ab5783 104868 ab8b28 58 API calls __getptd_noexit 104852->104868 104856->104850 104856->104852 104857 ab5781 104856->104857 104858 ab5733 104856->104858 104867 ab33a1 RtlDecodePointer 104856->104867 104869 ab8b28 58 API calls __getptd_noexit 104857->104869 104858->104856 104864 aba16b 58 API calls 2 library calls 104858->104864 104865 aba1c8 58 API calls 6 library calls 104858->104865 104866 ab309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104858->104866 104860->104831 104861->104831 104862->104835 104863->104837 104864->104858 104865->104858 104867->104856 104868->104857 104869->104860 104870->104847 104871->104860 104873 a99851 104872->104873 104882 a9984b 104872->104882 104874 acf5d3 __i64tow 104873->104874 104875 a99899 104873->104875 104876 a99857 __itow 104873->104876 104881 acf4da 104873->104881 104977 ab3698 83 API calls 4 library calls 104875->104977 104879 ab0db6 Mailbox 59 API calls 104876->104879 104880 a99871 104879->104880 104880->104882 104884 a97de1 59 API calls 104880->104884 104883 ab0db6 Mailbox 59 API calls 104881->104883 104888 acf552 Mailbox _wcscpy 104881->104888 104890 a957f6 104882->104890 104885 acf51f 104883->104885 104884->104882 104886 ab0db6 Mailbox 59 API calls 104885->104886 104887 acf545 104886->104887 104887->104888 104889 a97de1 59 API calls 104887->104889 104978 ab3698 83 API calls 4 library calls 104888->104978 104889->104888 104979 a95c6f 104890->104979 104894 a95844 104894->104645 104894->104646 104895 a95821 104895->104894 104991 a95610 104895->104991 104897 a95833 105008 a9527b SetFilePointerEx SetFilePointerEx 104897->105008 104899 acdc07 105009 af345a SetFilePointerEx SetFilePointerEx WriteFile 104899->105009 104900 a9583a 104900->104894 104900->104899 104902 acdc37 104902->104894 104903->104627 104905 ab0db6 Mailbox 59 API calls 104904->104905 104906 a97688 104905->104906 104907 ab0db6 Mailbox 59 API calls 104906->104907 104908 a97696 104907->104908 104908->104635 104910 a97667 59 API calls 104909->104910 104911 a945b1 104910->104911 104912 a97667 59 API calls 104911->104912 104913 a945b9 104912->104913 104914 a97667 59 API calls 104913->104914 104915 a945c1 104914->104915 104916 a97667 59 API calls 104915->104916 104917 a945c9 104916->104917 104918 a945fd 104917->104918 104919 acd4d2 104917->104919 104920 a9784b 59 API calls 104918->104920 104921 a98047 59 API calls 104919->104921 104922 a9460b 104920->104922 104923 acd4db 104921->104923 105048 a97d2c 104922->105048 105055 a97d8c 104923->105055 104926 a94615 104928 a9784b 59 API calls 104926->104928 104929 a94640 104926->104929 104927 a94680 105035 a9784b 104927->105035 104931 a94636 104928->104931 104929->104927 104932 a9465f 104929->104932 104941 acd4fb 104929->104941 104935 a97d2c 59 API calls 104931->104935 105052 a979f2 104932->105052 104934 a94691 104939 a946a3 104934->104939 104942 a98047 59 API calls 104934->104942 104935->104929 104936 acd5cb 104937 a97bcc 59 API calls 104936->104937 104955 acd588 104937->104955 104940 a946b3 104939->104940 104943 a98047 59 API calls 104939->104943 104945 a946ba 104940->104945 104947 a98047 59 API calls 104940->104947 104941->104936 104944 acd5b4 104941->104944 104954 acd532 104941->104954 104942->104939 104943->104940 104944->104936 104950 acd59f 104944->104950 104948 a98047 59 API calls 104945->104948 104957 a946c1 Mailbox 104945->104957 104946 a9784b 59 API calls 104946->104927 104947->104945 104948->104957 104949 a979f2 59 API calls 104949->104955 104953 a97bcc 59 API calls 104950->104953 104951 acd590 104952 a97bcc 59 API calls 104951->104952 104952->104955 104953->104955 104954->104951 104958 acd57b 104954->104958 104955->104927 104955->104949 105068 a97924 59 API calls 2 library calls 104955->105068 104957->104647 105059 a97bcc 104958->105059 104961 acec6b 104960->104961 104962 a97b40 104960->104962 105084 ae7bdb 59 API calls _memmove 104961->105084 105078 a97a51 104962->105078 104965 a97b4c 104965->104655 104969 af3c37 104965->104969 104966 acec75 104967 a98047 59 API calls 104966->104967 104968 acec7d Mailbox 104967->104968 105085 af445a GetFileAttributesW 104969->105085 104972->104672 104973->104671 104974->104634 104975->104654 104976->104654 104977->104876 104978->104874 104980 a95802 104979->104980 104981 a95c88 104979->104981 104983 a95c99 104980->104983 104981->104980 104982 a95c8d CloseHandle 104981->104982 104982->104980 104984 acdd58 104983->104984 104985 a95cb2 CreateFileW 104983->104985 104986 acdd5e CreateFileW 104984->104986 104988 a95cd4 104984->104988 104985->104988 104987 acdd84 104986->104987 104986->104988 105010 a95aee 104987->105010 104988->104895 104992 a9562b 104991->104992 104995 acdba5 104991->104995 104993 a95aee 2 API calls 104992->104993 105007 a956ba 104992->105007 104994 a9564d 104993->104994 105020 a9522e 104994->105020 104995->105007 105029 a95cdf 104995->105029 104999 a95664 105000 ab0db6 Mailbox 59 API calls 104999->105000 105001 a9566f 105000->105001 105002 a9522e 59 API calls 105001->105002 105003 a9567a 105002->105003 105023 a95bc0 105003->105023 105006 a95aee 2 API calls 105006->105007 105007->104897 105008->104900 105009->104902 105016 a95b08 105010->105016 105011 a95b8f SetFilePointerEx 105018 a95c4e SetFilePointerEx 105011->105018 105012 acdd28 105019 a95c4e SetFilePointerEx 105012->105019 105015 a95b63 105015->104988 105016->105011 105016->105012 105016->105015 105017 acdd42 105018->105015 105019->105017 105021 ab0db6 Mailbox 59 API calls 105020->105021 105022 a95240 105021->105022 105022->104995 105022->104999 105024 a95c33 105023->105024 105028 a95bce 105023->105028 105034 a95c4e SetFilePointerEx 105024->105034 105026 a956a7 105026->105006 105027 a95c06 ReadFile 105027->105026 105027->105028 105028->105026 105028->105027 105030 a95aee 2 API calls 105029->105030 105031 a95d00 105030->105031 105032 a95aee 2 API calls 105031->105032 105033 a95d14 105032->105033 105033->105007 105034->105028 105036 a9785a 105035->105036 105037 a978b7 105035->105037 105036->105037 105039 a97865 105036->105039 105038 a97d2c 59 API calls 105037->105038 105045 a97888 _memmove 105038->105045 105040 aceb09 105039->105040 105041 a97880 105039->105041 105070 a98029 105040->105070 105069 a97f27 59 API calls Mailbox 105041->105069 105044 aceb13 105046 ab0db6 Mailbox 59 API calls 105044->105046 105045->104934 105047 aceb33 105046->105047 105049 a97d3a 105048->105049 105051 a97d43 _memmove 105048->105051 105049->105051 105073 a97e4f 105049->105073 105051->104926 105053 a97e4f 59 API calls 105052->105053 105054 a94669 105053->105054 105054->104927 105054->104946 105056 a97da6 105055->105056 105058 a97d99 105055->105058 105057 ab0db6 Mailbox 59 API calls 105056->105057 105057->105058 105058->104929 105060 a97bd8 __NMSG_WRITE 105059->105060 105061 a97c45 105059->105061 105063 a97bee 105060->105063 105064 a97c13 105060->105064 105062 a97d2c 59 API calls 105061->105062 105067 a97bf6 _memmove 105062->105067 105077 a97f27 59 API calls Mailbox 105063->105077 105066 a98029 59 API calls 105064->105066 105066->105067 105067->104955 105068->104955 105069->105045 105071 ab0db6 Mailbox 59 API calls 105070->105071 105072 a98033 105071->105072 105072->105044 105074 a97e5f _memmove 105073->105074 105075 a97e62 105073->105075 105074->105051 105076 ab0db6 Mailbox 59 API calls 105075->105076 105076->105074 105077->105067 105079 a97a85 _memmove 105078->105079 105080 a97a5f 105078->105080 105079->104965 105079->105079 105080->105079 105081 ab0db6 Mailbox 59 API calls 105080->105081 105082 a97ad4 105081->105082 105083 ab0db6 Mailbox 59 API calls 105082->105083 105083->105079 105084->104966 105086 af4475 FindFirstFileW 105085->105086 105088 af3c3e 105085->105088 105087 af448a FindClose 105086->105087 105086->105088 105087->105088 105088->104655 105088->104666 105090 a99837 84 API calls 105089->105090 105091 b0cb1a 105090->105091 105114 b0cb61 Mailbox 105091->105114 105127 b0d7a5 105091->105127 105093 b0cdb9 105094 b0cf2e 105093->105094 105098 b0cdc7 105093->105098 105177 b0d8c8 92 API calls Mailbox 105094->105177 105097 b0cf3d 105097->105098 105100 b0cf49 105097->105100 105140 b0c96e 105098->105140 105099 a99837 84 API calls 105116 b0cbb2 Mailbox 105099->105116 105100->105114 105105 b0ce00 105155 ab0c08 105105->105155 105108 b0ce33 105162 a992ce 105108->105162 105109 b0ce1a 105161 af9e4a 89 API calls 4 library calls 105109->105161 105112 b0ce25 GetCurrentProcess TerminateProcess 105112->105108 105114->104675 105116->105093 105116->105099 105116->105114 105159 b0fbce 59 API calls 2 library calls 105116->105159 105160 b0cfdf 61 API calls 2 library calls 105116->105160 105119 b0cfa4 105119->105114 105123 b0cfb8 FreeLibrary 105119->105123 105120 b0ce6b 105174 b0d649 107 API calls _free 105120->105174 105123->105114 105126 b0ce7c 105126->105119 105175 a98d40 59 API calls Mailbox 105126->105175 105176 a99d3c 60 API calls Mailbox 105126->105176 105178 b0d649 107 API calls _free 105126->105178 105128 a97e4f 59 API calls 105127->105128 105129 b0d7c0 CharLowerBuffW 105128->105129 105179 aef167 105129->105179 105133 a97667 59 API calls 105134 b0d7f9 105133->105134 105135 a9784b 59 API calls 105134->105135 105136 b0d810 105135->105136 105138 a97d2c 59 API calls 105136->105138 105137 b0d858 Mailbox 105137->105116 105139 b0d81c Mailbox 105138->105139 105139->105137 105186 b0cfdf 61 API calls 2 library calls 105139->105186 105141 b0c989 105140->105141 105145 b0c9de 105140->105145 105142 ab0db6 Mailbox 59 API calls 105141->105142 105143 b0c9ab 105142->105143 105144 ab0db6 Mailbox 59 API calls 105143->105144 105143->105145 105144->105143 105146 b0da50 105145->105146 105147 b0dc79 Mailbox 105146->105147 105154 b0da73 _strcat _wcscpy __NMSG_WRITE 105146->105154 105147->105105 105148 a99b98 59 API calls 105148->105154 105149 a99be6 59 API calls 105149->105154 105150 a99b3c 59 API calls 105150->105154 105151 a99837 84 API calls 105151->105154 105152 ab571c 58 API calls __crtCompareStringA_stat 105152->105154 105154->105147 105154->105148 105154->105149 105154->105150 105154->105151 105154->105152 105189 af5887 61 API calls 2 library calls 105154->105189 105156 ab0c1d 105155->105156 105157 ab0cb5 VirtualAlloc 105156->105157 105158 ab0c83 105156->105158 105157->105158 105158->105108 105158->105109 105159->105116 105160->105116 105161->105112 105163 a992d6 105162->105163 105164 ab0db6 Mailbox 59 API calls 105163->105164 105165 a992e4 105164->105165 105166 a992f0 105165->105166 105190 a991fc 59 API calls Mailbox 105165->105190 105168 a99050 105166->105168 105191 a99160 105168->105191 105170 a9905f 105171 ab0db6 Mailbox 59 API calls 105170->105171 105172 a990fb 105170->105172 105171->105172 105172->105126 105173 a98d40 59 API calls Mailbox 105172->105173 105173->105120 105174->105126 105175->105126 105176->105126 105177->105097 105178->105126 105180 aef192 __NMSG_WRITE 105179->105180 105181 aef1d1 105180->105181 105184 aef1c7 105180->105184 105185 aef278 105180->105185 105181->105133 105181->105139 105184->105181 105187 a978c4 61 API calls 105184->105187 105185->105181 105188 a978c4 61 API calls 105185->105188 105186->105137 105187->105184 105188->105185 105189->105154 105190->105166 105192 a99169 Mailbox 105191->105192 105193 acf19f 105192->105193 105198 a99173 105192->105198 105194 ab0db6 Mailbox 59 API calls 105193->105194 105196 acf1ab 105194->105196 105195 a9917a 105195->105170 105198->105195 105199 a99c90 59 API calls Mailbox 105198->105199 105199->105198 105238 a97a16 105200->105238 105202 a9646a 105245 a9750f 59 API calls 2 library calls 105202->105245 105204 a96484 Mailbox 105204->104680 105207 a96265 105207->105202 105208 acdff6 105207->105208 105211 a9750f 59 API calls 105207->105211 105213 a97d8c 59 API calls 105207->105213 105217 acdf92 105207->105217 105221 a97e4f 59 API calls 105207->105221 105224 a96799 _memmove 105207->105224 105243 a95f6c 60 API calls 105207->105243 105244 a95d41 59 API calls Mailbox 105207->105244 105246 a95e72 60 API calls 105207->105246 105247 a97924 59 API calls 2 library calls 105207->105247 105248 aef8aa 91 API calls 4 library calls 105208->105248 105211->105207 105213->105207 105214 ace004 105249 a9750f 59 API calls 2 library calls 105214->105249 105216 ace01a 105216->105204 105218 a98029 59 API calls 105217->105218 105220 acdf9d 105218->105220 105223 ab0db6 Mailbox 59 API calls 105220->105223 105222 a9643b CharUpperBuffW 105221->105222 105222->105207 105223->105224 105250 aef8aa 91 API calls 4 library calls 105224->105250 105226 acf7d6 105225->105226 105227 a99aa8 105225->105227 105228 acf7e7 105226->105228 105229 a97bcc 59 API calls 105226->105229 105232 ab0db6 Mailbox 59 API calls 105227->105232 105230 a97d8c 59 API calls 105228->105230 105229->105228 105231 acf7f1 105230->105231 105235 a99ad4 105231->105235 105236 a97667 59 API calls 105231->105236 105233 a99abb 105232->105233 105233->105231 105234 a99ac6 105233->105234 105234->105235 105237 a97de1 59 API calls 105234->105237 105235->104684 105236->105235 105237->105235 105239 ab0db6 Mailbox 59 API calls 105238->105239 105240 a97a3b 105239->105240 105241 a98029 59 API calls 105240->105241 105242 a97a4a 105241->105242 105242->105207 105243->105207 105244->105207 105245->105204 105246->105207 105247->105207 105248->105214 105249->105216 105250->105204 105252 a9557d 105251->105252 105253 a955a2 105251->105253 105252->105253 105258 a9558c 105252->105258 105254 a97d8c 59 API calls 105253->105254 105257 af325e 105254->105257 105255 af328d 105255->104717 105257->105255 105275 af31fa ReadFile SetFilePointerEx 105257->105275 105276 a97924 59 API calls 2 library calls 105257->105276 105277 a95ab8 105258->105277 105265 af339c Mailbox 105265->104717 105266->104693 105267->104720 105268->104721 105269->104692 105270->104692 105271->104698 105272->104706 105273->104713 105274->104718 105275->105257 105276->105257 105278 ab0db6 Mailbox 59 API calls 105277->105278 105279 a95acb 105278->105279 105280 ab0db6 Mailbox 59 API calls 105279->105280 105281 a95ad7 105280->105281 105282 a954d2 105281->105282 105289 a958cf 105282->105289 105284 a95514 105284->105265 105288 a977da 61 API calls Mailbox 105284->105288 105285 a95bc0 2 API calls 105286 a954e3 105285->105286 105286->105284 105286->105285 105296 a95a7a 105286->105296 105288->105265 105290 acdc3c 105289->105290 105291 a958e0 105289->105291 105305 ae5ecd 59 API calls Mailbox 105290->105305 105291->105286 105293 acdc46 105294 ab0db6 Mailbox 59 API calls 105293->105294 105295 acdc52 105294->105295 105297 acdcee 105296->105297 105298 a95a8e 105296->105298 105311 ae5ecd 59 API calls Mailbox 105297->105311 105306 a959b9 105298->105306 105301 acdcf9 105303 ab0db6 Mailbox 59 API calls 105301->105303 105302 a95a9a 105302->105286 105304 acdd0e _memmove 105303->105304 105305->105293 105307 a959ca _memmove 105306->105307 105308 a959d1 105306->105308 105307->105302 105309 ab0db6 Mailbox 59 API calls 105308->105309 105310 acdc7e 105308->105310 105309->105307 105310->105310 105311->105301 105312->104746 105313->104746 105315 aced4a 105314->105315 105316 a97cbf 105314->105316 105318 a98029 59 API calls 105315->105318 105322 a97c50 105316->105322 105320 aced55 __NMSG_WRITE _memmove 105318->105320 105319 a97cca 105319->104744 105321->104735 105323 a97c5f __NMSG_WRITE 105322->105323 105324 a98029 59 API calls 105323->105324 105325 a97c70 _memmove 105323->105325 105326 aced07 _memmove 105324->105326 105325->105319 105327->104800 105328->104772 105329->104787 105331 a9f4ba 105330->105331 105332 a9f650 105330->105332 105334 ad441e 105331->105334 105335 a9f4c6 105331->105335 105333 a97de1 59 API calls 105332->105333 105341 a9f58c Mailbox 105333->105341 105336 b0bc6b 331 API calls 105334->105336 105442 a9f290 331 API calls 2 library calls 105335->105442 105338 ad442c 105336->105338 105342 a9f630 105338->105342 105444 af9e4a 89 API calls 4 library calls 105338->105444 105340 a9f4fd 105340->105338 105340->105341 105340->105342 105344 a9f5e3 105341->105344 105347 af3c37 3 API calls 105341->105347 105348 b0445a 331 API calls 105341->105348 105356 a94e4a 105341->105356 105362 afcb7a 105341->105362 105342->104800 105344->105342 105443 a99c90 59 API calls Mailbox 105344->105443 105347->105344 105348->105344 105349->104782 105350->104788 105351->104800 105352->104798 105353->104801 105354->104805 105355->104800 105357 a94e5b 105356->105357 105358 a94e54 105356->105358 105360 a94e7b FreeLibrary 105357->105360 105361 a94e6a 105357->105361 105445 ab53a6 105358->105445 105360->105361 105361->105344 105363 a97667 59 API calls 105362->105363 105364 afcbaf 105363->105364 105365 a97667 59 API calls 105364->105365 105366 afcbb8 105365->105366 105367 afcbcc 105366->105367 105898 a99b3c 59 API calls 105366->105898 105369 a99837 84 API calls 105367->105369 105370 afcbe9 105369->105370 105371 afcc0b 105370->105371 105372 afccea 105370->105372 105377 afcd1a Mailbox 105370->105377 105373 a99837 84 API calls 105371->105373 105765 a94ddd 105372->105765 105375 afcc17 105373->105375 105378 a98047 59 API calls 105375->105378 105377->105344 105381 afcc23 105378->105381 105379 afcd16 105379->105377 105380 a97667 59 API calls 105379->105380 105383 afcd4b 105380->105383 105386 afcc69 105381->105386 105387 afcc37 105381->105387 105382 a94ddd 136 API calls 105382->105379 105384 a97667 59 API calls 105383->105384 105385 afcd54 105384->105385 105389 a97667 59 API calls 105385->105389 105388 a99837 84 API calls 105386->105388 105390 a98047 59 API calls 105387->105390 105391 afcc76 105388->105391 105392 afcd5d 105389->105392 105393 afcc47 105390->105393 105395 a98047 59 API calls 105391->105395 105396 a97667 59 API calls 105392->105396 105394 a97cab 59 API calls 105393->105394 105397 afcc51 105394->105397 105398 afcc82 105395->105398 105399 afcd66 105396->105399 105400 a99837 84 API calls 105397->105400 105899 af4a31 GetFileAttributesW 105398->105899 105402 a99837 84 API calls 105399->105402 105403 afcc5d 105400->105403 105405 afcd73 105402->105405 105406 a97b2e 59 API calls 105403->105406 105404 afcc8b 105407 afcc9e 105404->105407 105410 a979f2 59 API calls 105404->105410 105408 a9459b 59 API calls 105405->105408 105406->105386 105409 a99837 84 API calls 105407->105409 105417 afcca4 105407->105417 105411 afcd8e 105408->105411 105413 afcccb 105409->105413 105410->105407 105412 a979f2 59 API calls 105411->105412 105414 afcd9d 105412->105414 105900 af37ef 75 API calls Mailbox 105413->105900 105416 afcdd1 105414->105416 105418 a979f2 59 API calls 105414->105418 105419 a98047 59 API calls 105416->105419 105417->105377 105420 afcdae 105418->105420 105421 afcddf 105419->105421 105420->105416 105423 a97bcc 59 API calls 105420->105423 105422 a97b2e 59 API calls 105421->105422 105424 afcded 105422->105424 105425 afcdc3 105423->105425 105426 a97b2e 59 API calls 105424->105426 105427 a97bcc 59 API calls 105425->105427 105428 afcdfb 105426->105428 105427->105416 105429 a97b2e 59 API calls 105428->105429 105430 afce09 105429->105430 105431 a99837 84 API calls 105430->105431 105432 afce15 105431->105432 105789 af4071 105432->105789 105434 afce26 105435 af3c37 3 API calls 105434->105435 105436 afce30 105435->105436 105437 a99837 84 API calls 105436->105437 105441 afce61 105436->105441 105438 afce4e 105437->105438 105843 af9155 105438->105843 105440 a94e4a 84 API calls 105440->105377 105441->105440 105442->105340 105443->105344 105444->105342 105446 ab53b2 __commit 105445->105446 105447 ab53de 105446->105447 105448 ab53c6 105446->105448 105454 ab53d6 __commit 105447->105454 105458 ab6c11 105447->105458 105480 ab8b28 58 API calls __getptd_noexit 105448->105480 105451 ab53cb 105481 ab8db6 9 API calls __commit 105451->105481 105454->105357 105459 ab6c43 RtlEnterCriticalSection 105458->105459 105460 ab6c21 105458->105460 105462 ab53f0 105459->105462 105460->105459 105461 ab6c29 105460->105461 105483 ab9c0b 105461->105483 105464 ab533a 105462->105464 105465 ab5349 105464->105465 105466 ab535d 105464->105466 105572 ab8b28 58 API calls __getptd_noexit 105465->105572 105468 ab5359 105466->105468 105529 ab4a3d 105466->105529 105482 ab5415 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 105468->105482 105469 ab534e 105573 ab8db6 9 API calls __commit 105469->105573 105476 ab5377 105546 ac0a02 105476->105546 105478 ab537d 105478->105468 105479 ab2d55 _free 58 API calls 105478->105479 105479->105468 105480->105451 105481->105454 105482->105454 105484 ab9c2f RtlEnterCriticalSection 105483->105484 105485 ab9c1c 105483->105485 105484->105462 105490 ab9c93 105485->105490 105487 ab9c22 105487->105484 105514 ab30b5 58 API calls 3 library calls 105487->105514 105491 ab9c9f __commit 105490->105491 105492 ab9ca8 105491->105492 105493 ab9cc0 105491->105493 105515 aba16b 58 API calls 2 library calls 105492->105515 105501 ab9ce1 __commit 105493->105501 105518 ab881d 58 API calls 2 library calls 105493->105518 105496 ab9cad 105516 aba1c8 58 API calls 6 library calls 105496->105516 105497 ab9cd5 105499 ab9ceb 105497->105499 105500 ab9cdc 105497->105500 105504 ab9c0b __lock 58 API calls 105499->105504 105519 ab8b28 58 API calls __getptd_noexit 105500->105519 105501->105487 105502 ab9cb4 105517 ab309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 105502->105517 105506 ab9cf2 105504->105506 105508 ab9cff 105506->105508 105509 ab9d17 105506->105509 105520 ab9e2b InitializeCriticalSectionAndSpinCount 105508->105520 105521 ab2d55 105509->105521 105512 ab9d0b 105527 ab9d33 RtlLeaveCriticalSection _doexit 105512->105527 105515->105496 105516->105502 105518->105497 105519->105501 105520->105512 105522 ab2d5e RtlFreeHeap 105521->105522 105526 ab2d87 _free 105521->105526 105523 ab2d73 105522->105523 105522->105526 105528 ab8b28 58 API calls __getptd_noexit 105523->105528 105525 ab2d79 GetLastError 105525->105526 105526->105512 105527->105501 105528->105525 105530 ab4a50 105529->105530 105534 ab4a74 105529->105534 105531 ab46e6 __flswbuf 58 API calls 105530->105531 105530->105534 105532 ab4a6d 105531->105532 105574 abd886 105532->105574 105535 ac0b77 105534->105535 105536 ab5371 105535->105536 105537 ac0b84 105535->105537 105539 ab46e6 105536->105539 105537->105536 105538 ab2d55 _free 58 API calls 105537->105538 105538->105536 105540 ab46f0 105539->105540 105541 ab4705 105539->105541 105720 ab8b28 58 API calls __getptd_noexit 105540->105720 105541->105476 105543 ab46f5 105721 ab8db6 9 API calls __commit 105543->105721 105545 ab4700 105545->105476 105547 ac0a0e __commit 105546->105547 105548 ac0a1b 105547->105548 105549 ac0a32 105547->105549 105737 ab8af4 58 API calls __getptd_noexit 105548->105737 105551 ac0abd 105549->105551 105552 ac0a42 105549->105552 105742 ab8af4 58 API calls __getptd_noexit 105551->105742 105555 ac0a6a 105552->105555 105556 ac0a60 105552->105556 105554 ac0a20 105738 ab8b28 58 API calls __getptd_noexit 105554->105738 105560 abd206 ___lock_fhandle 59 API calls 105555->105560 105739 ab8af4 58 API calls __getptd_noexit 105556->105739 105557 ac0a65 105743 ab8b28 58 API calls __getptd_noexit 105557->105743 105562 ac0a70 105560->105562 105564 ac0a8e 105562->105564 105565 ac0a83 105562->105565 105563 ac0ac9 105744 ab8db6 9 API calls __commit 105563->105744 105740 ab8b28 58 API calls __getptd_noexit 105564->105740 105722 ac0add 105565->105722 105568 ac0a27 __commit 105568->105478 105570 ac0a89 105741 ac0ab5 RtlLeaveCriticalSection __unlock_fhandle 105570->105741 105572->105469 105573->105468 105575 abd892 __commit 105574->105575 105576 abd89f 105575->105576 105577 abd8b6 105575->105577 105675 ab8af4 58 API calls __getptd_noexit 105576->105675 105579 abd955 105577->105579 105581 abd8ca 105577->105581 105681 ab8af4 58 API calls __getptd_noexit 105579->105681 105580 abd8a4 105676 ab8b28 58 API calls __getptd_noexit 105580->105676 105584 abd8e8 105581->105584 105585 abd8f2 105581->105585 105677 ab8af4 58 API calls __getptd_noexit 105584->105677 105602 abd206 105585->105602 105586 abd8ed 105682 ab8b28 58 API calls __getptd_noexit 105586->105682 105589 abd8f8 105591 abd90b 105589->105591 105592 abd91e 105589->105592 105611 abd975 105591->105611 105678 ab8b28 58 API calls __getptd_noexit 105592->105678 105593 abd961 105683 ab8db6 9 API calls __commit 105593->105683 105594 abd8ab __commit 105594->105534 105598 abd917 105680 abd94d RtlLeaveCriticalSection __unlock_fhandle 105598->105680 105599 abd923 105679 ab8af4 58 API calls __getptd_noexit 105599->105679 105603 abd212 __commit 105602->105603 105604 abd261 RtlEnterCriticalSection 105603->105604 105605 ab9c0b __lock 58 API calls 105603->105605 105606 abd287 __commit 105604->105606 105607 abd237 105605->105607 105606->105589 105608 abd24f 105607->105608 105684 ab9e2b InitializeCriticalSectionAndSpinCount 105607->105684 105685 abd28b RtlLeaveCriticalSection _doexit 105608->105685 105612 abd982 __ftell_nolock 105611->105612 105613 abd9b6 105612->105613 105614 abd9c1 105612->105614 105615 abd9e0 105612->105615 105709 abc5f6 105613->105709 105695 ab8af4 58 API calls __getptd_noexit 105614->105695 105618 abda38 105615->105618 105619 abda1c 105615->105619 105623 abda51 105618->105623 105701 ac18c1 60 API calls 3 library calls 105618->105701 105698 ab8af4 58 API calls __getptd_noexit 105619->105698 105620 abe1d6 105620->105598 105621 abd9c6 105696 ab8b28 58 API calls __getptd_noexit 105621->105696 105686 ac5c6b 105623->105686 105625 abda21 105699 ab8b28 58 API calls __getptd_noexit 105625->105699 105627 abd9cd 105697 ab8db6 9 API calls __commit 105627->105697 105629 abda5f 105632 abddb8 105629->105632 105702 ab99ac 58 API calls 2 library calls 105629->105702 105634 abe14b WriteFile 105632->105634 105635 abddd6 105632->105635 105633 abda28 105700 ab8db6 9 API calls __commit 105633->105700 105638 abddab GetLastError 105634->105638 105640 abdd78 105634->105640 105639 abdefa 105635->105639 105649 abddec 105635->105649 105638->105640 105648 abdfef 105639->105648 105651 abdf05 105639->105651 105640->105613 105642 abe184 105640->105642 105647 abded8 105640->105647 105641 abda8b GetConsoleMode 105641->105632 105643 abdaca 105641->105643 105642->105613 105707 ab8b28 58 API calls __getptd_noexit 105642->105707 105643->105632 105644 abdada GetConsoleCP 105643->105644 105644->105642 105672 abdb09 105644->105672 105645 abde5b WriteFile 105645->105638 105650 abde98 105645->105650 105654 abe17b 105647->105654 105655 abdee3 105647->105655 105648->105642 105656 abe064 WideCharToMultiByte 105648->105656 105649->105642 105649->105645 105650->105649 105657 abdebc 105650->105657 105651->105642 105658 abdf6a WriteFile 105651->105658 105652 abe1b2 105708 ab8af4 58 API calls __getptd_noexit 105652->105708 105706 ab8b07 58 API calls 2 library calls 105654->105706 105704 ab8b28 58 API calls __getptd_noexit 105655->105704 105656->105638 105667 abe0ab 105656->105667 105657->105640 105658->105638 105659 abdfb9 105658->105659 105659->105640 105659->105651 105659->105657 105662 abdee8 105705 ab8af4 58 API calls __getptd_noexit 105662->105705 105663 abe0b3 WriteFile 105666 abe106 GetLastError 105663->105666 105663->105667 105666->105667 105667->105640 105667->105648 105667->105657 105667->105663 105668 ac62ba 60 API calls __write_nolock 105668->105672 105669 ac7a5e WriteConsoleW CreateFileW __putwch_nolock 105673 abdc5f 105669->105673 105670 abdbf2 WideCharToMultiByte 105670->105640 105671 abdc2d WriteFile 105670->105671 105671->105638 105671->105673 105672->105640 105672->105668 105672->105670 105672->105673 105703 ab35f5 58 API calls __isleadbyte_l 105672->105703 105673->105638 105673->105640 105673->105669 105673->105672 105674 abdc87 WriteFile 105673->105674 105674->105638 105674->105673 105675->105580 105676->105594 105677->105586 105678->105599 105679->105598 105680->105594 105681->105586 105682->105593 105683->105594 105684->105608 105685->105604 105687 ac5c76 105686->105687 105688 ac5c83 105686->105688 105716 ab8b28 58 API calls __getptd_noexit 105687->105716 105690 ac5c8f 105688->105690 105717 ab8b28 58 API calls __getptd_noexit 105688->105717 105690->105629 105692 ac5c7b 105692->105629 105693 ac5cb0 105718 ab8db6 9 API calls __commit 105693->105718 105695->105621 105696->105627 105697->105613 105698->105625 105699->105633 105700->105613 105701->105623 105702->105641 105703->105672 105704->105662 105705->105613 105706->105613 105707->105652 105708->105613 105710 abc5fe 105709->105710 105711 abc600 IsProcessorFeaturePresent 105709->105711 105710->105620 105713 ac590a 105711->105713 105719 ac58b9 5 API calls 2 library calls 105713->105719 105715 ac59ed 105715->105620 105716->105692 105717->105693 105718->105692 105719->105715 105720->105543 105721->105545 105745 abd4c3 105722->105745 105724 ac0b41 105758 abd43d 59 API calls __set_osfhnd 105724->105758 105726 ac0aeb 105726->105724 105729 abd4c3 __commit 58 API calls 105726->105729 105736 ac0b1f 105726->105736 105727 abd4c3 __commit 58 API calls 105730 ac0b2b CloseHandle 105727->105730 105728 ac0b49 105734 ac0b6b 105728->105734 105759 ab8b07 58 API calls 2 library calls 105728->105759 105731 ac0b16 105729->105731 105730->105724 105732 ac0b37 GetLastError 105730->105732 105735 abd4c3 __commit 58 API calls 105731->105735 105732->105724 105734->105570 105735->105736 105736->105724 105736->105727 105737->105554 105738->105568 105739->105557 105740->105570 105741->105568 105742->105557 105743->105563 105744->105568 105746 abd4ce 105745->105746 105747 abd4e3 105745->105747 105760 ab8af4 58 API calls __getptd_noexit 105746->105760 105753 abd508 105747->105753 105762 ab8af4 58 API calls __getptd_noexit 105747->105762 105750 abd4d3 105761 ab8b28 58 API calls __getptd_noexit 105750->105761 105751 abd512 105763 ab8b28 58 API calls __getptd_noexit 105751->105763 105753->105726 105755 abd4db 105755->105726 105756 abd51a 105764 ab8db6 9 API calls __commit 105756->105764 105758->105728 105759->105734 105760->105750 105761->105755 105762->105751 105763->105756 105764->105755 105901 a94bb5 105765->105901 105770 a94e08 LoadLibraryExW 105911 a94b6a 105770->105911 105771 acd8e6 105772 a94e4a 84 API calls 105771->105772 105774 acd8ed 105772->105774 105776 a94b6a 3 API calls 105774->105776 105779 acd8f5 105776->105779 105778 a94e2f 105778->105779 105780 a94e3b 105778->105780 105937 a94f0b 105779->105937 105782 a94e4a 84 API calls 105780->105782 105784 a94e40 105782->105784 105784->105379 105784->105382 105786 acd91c 105945 a94ec7 105786->105945 105790 af408d 105789->105790 105791 af4092 105790->105791 105792 af40a0 105790->105792 105794 a98047 59 API calls 105791->105794 105793 a97667 59 API calls 105792->105793 105795 af40a8 105793->105795 105842 af409b Mailbox 105794->105842 105796 a97667 59 API calls 105795->105796 105797 af40b0 105796->105797 105798 a97667 59 API calls 105797->105798 105799 af40bb 105798->105799 105800 a97667 59 API calls 105799->105800 105801 af40c3 105800->105801 105802 a97667 59 API calls 105801->105802 105803 af40cb 105802->105803 105804 a97667 59 API calls 105803->105804 105805 af40d3 105804->105805 105806 a97667 59 API calls 105805->105806 105807 af40db 105806->105807 105808 a97667 59 API calls 105807->105808 105809 af40e3 105808->105809 105810 a9459b 59 API calls 105809->105810 105811 af40fa 105810->105811 105842->105434 105844 af9162 __ftell_nolock 105843->105844 105845 ab0db6 Mailbox 59 API calls 105844->105845 105846 af91bf 105845->105846 105847 a9522e 59 API calls 105846->105847 105848 af91c9 105847->105848 105849 af8f5f GetSystemTimeAsFileTime 105848->105849 105850 af91d4 105849->105850 105851 a94ee5 85 API calls 105850->105851 105852 af91e7 _wcscmp 105851->105852 105853 af920b 105852->105853 105854 af92b8 105852->105854 105898->105367 105899->105404 105900->105417 105950 a94c03 105901->105950 105904 a94bdc 105905 a94bec FreeLibrary 105904->105905 105906 a94bf5 105904->105906 105905->105906 105908 ab525b 105906->105908 105907 a94c03 2 API calls 105907->105904 105954 ab5270 105908->105954 105910 a94dfc 105910->105770 105910->105771 106111 a94c36 105911->106111 105914 a94c36 2 API calls 105917 a94b8f 105914->105917 105915 a94baa 105918 a94c70 105915->105918 105916 a94ba1 FreeLibrary 105916->105915 105917->105915 105917->105916 105919 ab0db6 Mailbox 59 API calls 105918->105919 105920 a94c85 105919->105920 105921 a9522e 59 API calls 105920->105921 105922 a94c91 _memmove 105921->105922 105923 a94ccc 105922->105923 105925 a94d89 105922->105925 105926 a94dc1 105922->105926 105924 a94ec7 69 API calls 105923->105924 105934 a94cd5 105924->105934 106115 a94e89 CreateStreamOnHGlobal 105925->106115 106126 af991b 95 API calls 105926->106126 105929 a94f0b 74 API calls 105929->105934 105931 a94d69 105931->105778 105932 acd8a7 105933 a94ee5 85 API calls 105932->105933 105935 acd8bb 105933->105935 105934->105929 105934->105931 105934->105932 106121 a94ee5 105934->106121 105936 a94f0b 74 API calls 105935->105936 105936->105931 105938 acd9cd 105937->105938 105939 a94f1d 105937->105939 106144 ab55e2 105939->106144 105942 af9109 106324 af8f5f 105942->106324 105944 af911f 105944->105786 105946 acd990 105945->105946 105947 a94ed6 105945->105947 106329 ab5c60 105947->106329 105949 a94ede 105951 a94bd0 105950->105951 105952 a94c0c LoadLibraryA 105950->105952 105951->105904 105951->105907 105952->105951 105953 a94c1d GetProcAddress 105952->105953 105953->105951 105957 ab527c __commit 105954->105957 105955 ab528f 106003 ab8b28 58 API calls __getptd_noexit 105955->106003 105957->105955 105959 ab52c0 105957->105959 105958 ab5294 106004 ab8db6 9 API calls __commit 105958->106004 105973 ac04e8 105959->105973 105962 ab52c5 105963 ab52db 105962->105963 105964 ab52ce 105962->105964 105966 ab5305 105963->105966 105967 ab52e5 105963->105967 106005 ab8b28 58 API calls __getptd_noexit 105964->106005 105988 ac0607 105966->105988 106006 ab8b28 58 API calls __getptd_noexit 105967->106006 105970 ab529f __commit @_EH4_CallFilterFunc@8 105970->105910 105974 ac04f4 __commit 105973->105974 105975 ab9c0b __lock 58 API calls 105974->105975 105981 ac0502 105975->105981 105976 ac057d 106013 ab881d 58 API calls 2 library calls 105976->106013 105979 ac0584 105986 ac0576 105979->105986 106014 ab9e2b InitializeCriticalSectionAndSpinCount 105979->106014 105980 ac05f3 __commit 105980->105962 105981->105976 105983 ab9c93 __mtinitlocknum 58 API calls 105981->105983 105981->105986 106011 ab6c50 59 API calls __lock 105981->106011 106012 ab6cba RtlLeaveCriticalSection RtlLeaveCriticalSection _doexit 105981->106012 105983->105981 105985 ac05aa RtlEnterCriticalSection 105985->105986 106008 ac05fe 105986->106008 105997 ac0627 __wopenfile 105988->105997 105989 ac0641 106019 ab8b28 58 API calls __getptd_noexit 105989->106019 105990 ac07fc 105990->105989 105994 ac085f 105990->105994 105992 ac0646 106020 ab8db6 9 API calls __commit 105992->106020 106016 ac85a1 105994->106016 105995 ab5310 106007 ab5332 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 105995->106007 105997->105989 105997->105990 106021 ab37cb 60 API calls 3 library calls 105997->106021 105999 ac07f5 105999->105990 106022 ab37cb 60 API calls 3 library calls 105999->106022 106001 ac0814 106001->105990 106023 ab37cb 60 API calls 3 library calls 106001->106023 106003->105958 106004->105970 106005->105970 106006->105970 106007->105970 106015 ab9d75 RtlLeaveCriticalSection 106008->106015 106010 ac0605 106010->105980 106011->105981 106012->105981 106013->105979 106014->105985 106015->106010 106024 ac7d85 106016->106024 106018 ac85ba 106018->105995 106019->105992 106020->105995 106021->105999 106022->106001 106023->105990 106025 ac7d91 __commit 106024->106025 106026 ac7da7 106025->106026 106029 ac7ddd 106025->106029 106108 ab8b28 58 API calls __getptd_noexit 106026->106108 106028 ac7dac 106109 ab8db6 9 API calls __commit 106028->106109 106035 ac7e4e 106029->106035 106032 ac7db6 __commit 106032->106018 106033 ac7df9 106110 ac7e22 RtlLeaveCriticalSection __unlock_fhandle 106033->106110 106036 ac7e6e 106035->106036 106037 ab44ea __wsopen_nolock 58 API calls 106036->106037 106039 ac7e8a 106037->106039 106038 ab8dc6 __invoke_watson 8 API calls 106040 ac85a0 106038->106040 106041 ac7ec4 106039->106041 106045 ac7ee7 106039->106045 106058 ac7fc1 106039->106058 106042 ac7d85 __wsopen_helper 103 API calls 106040->106042 106043 ab8af4 __set_osfhnd 58 API calls 106041->106043 106044 ac85ba 106042->106044 106046 ac7ec9 106043->106046 106044->106033 106049 ac7fa5 106045->106049 106055 ac7f83 106045->106055 106047 ab8b28 __set_osfhnd 58 API calls 106046->106047 106048 ac7ed6 106047->106048 106050 ab8db6 __commit 9 API calls 106048->106050 106051 ab8af4 __set_osfhnd 58 API calls 106049->106051 106052 ac7ee0 106050->106052 106053 ac7faa 106051->106053 106052->106033 106054 ab8b28 __set_osfhnd 58 API calls 106053->106054 106056 ac7fb7 106054->106056 106059 abd294 __alloc_osfhnd 61 API calls 106055->106059 106057 ab8db6 __commit 9 API calls 106056->106057 106057->106058 106058->106038 106060 ac8051 106059->106060 106061 ac807e 106060->106061 106062 ac805b 106060->106062 106064 ac7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 106061->106064 106063 ab8af4 __set_osfhnd 58 API calls 106062->106063 106065 ac8060 106063->106065 106075 ac80a0 106064->106075 106066 ab8b28 __set_osfhnd 58 API calls 106065->106066 106068 ac806a 106066->106068 106067 ac811e GetFileType 106069 ac8129 GetLastError 106067->106069 106070 ac816b 106067->106070 106073 ab8b28 __set_osfhnd 58 API calls 106068->106073 106074 ab8b07 __dosmaperr 58 API calls 106069->106074 106080 abd52a __set_osfhnd 59 API calls 106070->106080 106071 ac80ec GetLastError 106072 ab8b07 __dosmaperr 58 API calls 106071->106072 106076 ac8111 106072->106076 106073->106052 106077 ac8150 CloseHandle 106074->106077 106075->106067 106075->106071 106078 ac7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 106075->106078 106082 ab8b28 __set_osfhnd 58 API calls 106076->106082 106077->106076 106081 ac815e 106077->106081 106079 ac80e1 106078->106079 106079->106067 106079->106071 106086 ac8189 106080->106086 106083 ab8b28 __set_osfhnd 58 API calls 106081->106083 106082->106058 106084 ac8163 106083->106084 106084->106076 106085 ac8344 106085->106058 106088 ac8517 CloseHandle 106085->106088 106086->106085 106087 ac18c1 __lseeki64_nolock 60 API calls 106086->106087 106105 ac820a 106086->106105 106089 ac81f3 106087->106089 106090 ac7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 106088->106090 106092 ab8af4 __set_osfhnd 58 API calls 106089->106092 106089->106105 106091 ac853e 106090->106091 106093 ac8572 106091->106093 106094 ac8546 GetLastError 106091->106094 106092->106105 106093->106058 106095 ab8b07 __dosmaperr 58 API calls 106094->106095 106096 ac8552 106095->106096 106100 abd43d __free_osfhnd 59 API calls 106096->106100 106097 ac0e5b 70 API calls __read_nolock 106097->106105 106098 ac0add __close_nolock 61 API calls 106098->106105 106099 ac97a2 __chsize_nolock 82 API calls 106099->106105 106100->106093 106101 abd886 __write 78 API calls 106101->106105 106102 ac83c1 106104 ac0add __close_nolock 61 API calls 106102->106104 106103 ac18c1 60 API calls __lseeki64_nolock 106103->106105 106106 ac83c8 106104->106106 106105->106085 106105->106097 106105->106098 106105->106099 106105->106101 106105->106102 106105->106103 106107 ab8b28 __set_osfhnd 58 API calls 106106->106107 106107->106058 106108->106028 106109->106032 106110->106032 106112 a94b83 106111->106112 106113 a94c3f LoadLibraryA 106111->106113 106112->105914 106112->105917 106113->106112 106114 a94c50 GetProcAddress 106113->106114 106114->106112 106116 a94ea3 FindResourceExW 106115->106116 106120 a94ec0 106115->106120 106117 acd933 LoadResource 106116->106117 106116->106120 106118 acd948 SizeofResource 106117->106118 106117->106120 106119 acd95c LockResource 106118->106119 106118->106120 106119->106120 106120->105923 106122 acd9ab 106121->106122 106123 a94ef4 106121->106123 106127 ab584d 106123->106127 106125 a94f02 106125->105934 106126->105923 106131 ab5859 __commit 106127->106131 106128 ab586b 106140 ab8b28 58 API calls __getptd_noexit 106128->106140 106130 ab5891 106133 ab6c11 __lock_file 59 API calls 106130->106133 106131->106128 106131->106130 106132 ab5870 106141 ab8db6 9 API calls __commit 106132->106141 106135 ab5897 106133->106135 106142 ab57be 83 API calls 5 library calls 106135->106142 106137 ab58a6 106143 ab58c8 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 106137->106143 106138 ab587b __commit 106138->106125 106140->106132 106141->106138 106142->106137 106143->106138 106147 ab55fd 106144->106147 106146 a94f2e 106146->105942 106148 ab5609 __commit 106147->106148 106149 ab564c 106148->106149 106150 ab5644 __commit 106148->106150 106155 ab561f _memset 106148->106155 106151 ab6c11 __lock_file 59 API calls 106149->106151 106150->106146 106152 ab5652 106151->106152 106160 ab541d 106152->106160 106174 ab8b28 58 API calls __getptd_noexit 106155->106174 106156 ab5639 106175 ab8db6 9 API calls __commit 106156->106175 106161 ab5453 106160->106161 106165 ab5438 _memset 106160->106165 106176 ab5686 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 106161->106176 106162 ab5443 106265 ab8b28 58 API calls __getptd_noexit 106162->106265 106164 ab5448 106266 ab8db6 9 API calls __commit 106164->106266 106165->106161 106165->106162 106171 ab5493 106165->106171 106168 ab55a4 _memset 106268 ab8b28 58 API calls __getptd_noexit 106168->106268 106169 ab46e6 __flswbuf 58 API calls 106169->106171 106171->106161 106171->106168 106171->106169 106177 ac0e5b 106171->106177 106245 ac0ba7 106171->106245 106267 ac0cc8 58 API calls 4 library calls 106171->106267 106174->106156 106175->106150 106176->106150 106178 ac0e7c 106177->106178 106179 ac0e93 106177->106179 106269 ab8af4 58 API calls __getptd_noexit 106178->106269 106181 ac15cb 106179->106181 106186 ac0ecd 106179->106186 106285 ab8af4 58 API calls __getptd_noexit 106181->106285 106182 ac0e81 106270 ab8b28 58 API calls __getptd_noexit 106182->106270 106184 ac15d0 106286 ab8b28 58 API calls __getptd_noexit 106184->106286 106188 ac0ed5 106186->106188 106194 ac0eec 106186->106194 106271 ab8af4 58 API calls __getptd_noexit 106188->106271 106189 ac0ee1 106287 ab8db6 9 API calls __commit 106189->106287 106190 ac0e88 106190->106171 106192 ac0eda 106272 ab8b28 58 API calls __getptd_noexit 106192->106272 106194->106190 106195 ac0f01 106194->106195 106198 ac0f1b 106194->106198 106199 ac0f39 106194->106199 106273 ab8af4 58 API calls __getptd_noexit 106195->106273 106198->106195 106203 ac0f26 106198->106203 106274 ab881d 58 API calls 2 library calls 106199->106274 106201 ac0f49 106204 ac0f6c 106201->106204 106205 ac0f51 106201->106205 106202 ac5c6b __flswbuf 58 API calls 106206 ac103a 106202->106206 106203->106202 106277 ac18c1 60 API calls 3 library calls 106204->106277 106275 ab8b28 58 API calls __getptd_noexit 106205->106275 106208 ac10b3 ReadFile 106206->106208 106213 ac1050 GetConsoleMode 106206->106213 106211 ac10d5 106208->106211 106212 ac1593 GetLastError 106208->106212 106210 ac0f56 106276 ab8af4 58 API calls __getptd_noexit 106210->106276 106211->106212 106219 ac10a5 106211->106219 106215 ac1093 106212->106215 106216 ac15a0 106212->106216 106217 ac1064 106213->106217 106218 ac10b0 106213->106218 106222 ac1099 106215->106222 106278 ab8b07 58 API calls 2 library calls 106215->106278 106283 ab8b28 58 API calls __getptd_noexit 106216->106283 106217->106218 106221 ac106a ReadConsoleW 106217->106221 106218->106208 106219->106222 106226 ac1377 106219->106226 106230 ac110a 106219->106230 106221->106219 106224 ac108d GetLastError 106221->106224 106222->106190 106228 ab2d55 _free 58 API calls 106222->106228 106223 ac15a5 106284 ab8af4 58 API calls __getptd_noexit 106223->106284 106224->106215 106226->106222 106232 ac147d ReadFile 106226->106232 106228->106190 106231 ac1176 ReadFile 106230->106231 106236 ac11f7 106230->106236 106233 ac1197 GetLastError 106231->106233 106243 ac11a1 106231->106243 106238 ac14a0 GetLastError 106232->106238 106244 ac14ae 106232->106244 106233->106243 106234 ac12b4 106239 ac1264 MultiByteToWideChar 106234->106239 106281 ac18c1 60 API calls 3 library calls 106234->106281 106235 ac12a4 106280 ab8b28 58 API calls __getptd_noexit 106235->106280 106236->106222 106236->106234 106236->106235 106236->106239 106238->106244 106239->106222 106239->106224 106243->106230 106279 ac18c1 60 API calls 3 library calls 106243->106279 106244->106226 106282 ac18c1 60 API calls 3 library calls 106244->106282 106246 ac0bb2 106245->106246 106249 ac0bc7 106245->106249 106321 ab8b28 58 API calls __getptd_noexit 106246->106321 106248 ac0bb7 106322 ab8db6 9 API calls __commit 106248->106322 106251 ac0bfc 106249->106251 106257 ac0bc2 106249->106257 106323 ac5fe4 58 API calls __malloc_crt 106249->106323 106253 ab46e6 __flswbuf 58 API calls 106251->106253 106254 ac0c10 106253->106254 106288 ac0d47 106254->106288 106256 ac0c17 106256->106257 106258 ab46e6 __flswbuf 58 API calls 106256->106258 106257->106171 106259 ac0c3a 106258->106259 106259->106257 106260 ab46e6 __flswbuf 58 API calls 106259->106260 106261 ac0c46 106260->106261 106261->106257 106262 ab46e6 __flswbuf 58 API calls 106261->106262 106263 ac0c53 106262->106263 106264 ab46e6 __flswbuf 58 API calls 106263->106264 106264->106257 106265->106164 106266->106161 106267->106171 106268->106164 106269->106182 106270->106190 106271->106192 106272->106189 106273->106192 106274->106201 106275->106210 106276->106190 106277->106203 106278->106222 106279->106243 106280->106222 106281->106239 106282->106244 106283->106223 106284->106222 106285->106184 106286->106189 106287->106190 106289 ac0d53 __commit 106288->106289 106290 ac0d77 106289->106290 106291 ac0d60 106289->106291 106293 ac0e3b 106290->106293 106296 ac0d8b 106290->106296 106292 ab8af4 __set_osfhnd 58 API calls 106291->106292 106295 ac0d65 106292->106295 106294 ab8af4 __set_osfhnd 58 API calls 106293->106294 106297 ac0dae 106294->106297 106298 ab8b28 __set_osfhnd 58 API calls 106295->106298 106299 ac0da9 106296->106299 106300 ac0db6 106296->106300 106306 ab8b28 __set_osfhnd 58 API calls 106297->106306 106310 ac0d6c __commit 106298->106310 106301 ab8af4 __set_osfhnd 58 API calls 106299->106301 106302 ac0dd8 106300->106302 106303 ac0dc3 106300->106303 106301->106297 106305 abd206 ___lock_fhandle 59 API calls 106302->106305 106304 ab8af4 __set_osfhnd 58 API calls 106303->106304 106307 ac0dc8 106304->106307 106308 ac0dde 106305->106308 106309 ac0dd0 106306->106309 106311 ab8b28 __set_osfhnd 58 API calls 106307->106311 106312 ac0e04 106308->106312 106313 ac0df1 106308->106313 106315 ab8db6 __commit 9 API calls 106309->106315 106310->106256 106311->106309 106316 ab8b28 __set_osfhnd 58 API calls 106312->106316 106314 ac0e5b __read_nolock 70 API calls 106313->106314 106318 ac0dfd 106314->106318 106315->106310 106317 ac0e09 106316->106317 106319 ab8af4 __set_osfhnd 58 API calls 106317->106319 106320 ac0e33 __read RtlLeaveCriticalSection 106318->106320 106319->106318 106320->106310 106321->106248 106322->106257 106323->106251 106327 ab520a GetSystemTimeAsFileTime 106324->106327 106326 af8f6e 106326->105944 106328 ab5238 __aulldiv 106327->106328 106328->106326 106330 ab5c6c __commit 106329->106330 106331 ab5c7e 106330->106331 106332 ab5c93 106330->106332 106343 ab8b28 58 API calls __getptd_noexit 106331->106343 106333 ab6c11 __lock_file 59 API calls 106332->106333 106335 ab5c99 106333->106335 106345 ab58d0 67 API calls 7 library calls 106335->106345 106336 ab5c83 106344 ab8db6 9 API calls __commit 106336->106344 106339 ab5ca4 106346 ab5cc4 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 106339->106346 106341 ab5cb6 106342 ab5c8e __commit 106341->106342 106342->105949 106343->106336 106344->106342 106345->106339 106346->106341 106466 ae60e8 106465->106466 106467 ae60cb 106465->106467 106466->104809 106467->106466 106469 ae60ab 59 API calls Mailbox 106467->106469 106469->106467 106470->104819 106471 a91078 106476 a9708b 106471->106476 106473 a9108c 106507 ab2d40 106473->106507 106477 a9709b __ftell_nolock 106476->106477 106478 a97667 59 API calls 106477->106478 106479 a97151 106478->106479 106510 a94706 106479->106510 106481 a9715a 106517 ab050b 106481->106517 106484 a97cab 59 API calls 106485 a97173 106484->106485 106523 a93f74 106485->106523 106488 a97667 59 API calls 106489 a9718b 106488->106489 106490 a97d8c 59 API calls 106489->106490 106491 a97194 RegOpenKeyExW 106490->106491 106492 ace8b1 RegQueryValueExW 106491->106492 106493 a971b6 Mailbox 106491->106493 106494 ace8ce 106492->106494 106495 ace943 RegCloseKey 106492->106495 106493->106473 106496 ab0db6 Mailbox 59 API calls 106494->106496 106495->106493 106506 ace955 _wcscat Mailbox __NMSG_WRITE 106495->106506 106497 ace8e7 106496->106497 106499 a9522e 59 API calls 106497->106499 106498 a979f2 59 API calls 106498->106506 106500 ace8f2 RegQueryValueExW 106499->106500 106501 ace90f 106500->106501 106503 ace929 106500->106503 106502 a97bcc 59 API calls 106501->106502 106502->106503 106503->106495 106504 a97de1 59 API calls 106504->106506 106505 a93f74 59 API calls 106505->106506 106506->106493 106506->106498 106506->106504 106506->106505 106545 ab2c44 106507->106545 106509 a91096 106529 ac1940 106510->106529 106513 a97de1 59 API calls 106514 a94739 106513->106514 106531 a94750 106514->106531 106516 a94743 Mailbox 106516->106481 106518 ac1940 __ftell_nolock 106517->106518 106519 ab0518 GetFullPathNameW 106518->106519 106520 ab053a 106519->106520 106521 a97bcc 59 API calls 106520->106521 106522 a97165 106521->106522 106522->106484 106524 a93f82 106523->106524 106528 a93fa4 _memmove 106523->106528 106526 ab0db6 Mailbox 59 API calls 106524->106526 106525 ab0db6 Mailbox 59 API calls 106527 a93fb8 106525->106527 106526->106528 106527->106488 106528->106525 106530 a94713 GetModuleFileNameW 106529->106530 106530->106513 106532 ac1940 __ftell_nolock 106531->106532 106533 a9475d GetFullPathNameW 106532->106533 106534 a94799 106533->106534 106535 a9477c 106533->106535 106537 a97d8c 59 API calls 106534->106537 106536 a97bcc 59 API calls 106535->106536 106538 a94788 106536->106538 106537->106538 106541 a97726 106538->106541 106542 a97734 106541->106542 106543 a97d2c 59 API calls 106542->106543 106544 a94794 106543->106544 106544->106516 106546 ab2c50 __commit 106545->106546 106553 ab3217 106546->106553 106552 ab2c77 __commit 106552->106509 106554 ab9c0b __lock 58 API calls 106553->106554 106555 ab2c59 106554->106555 106556 ab2c88 RtlDecodePointer RtlDecodePointer 106555->106556 106557 ab2c65 106556->106557 106558 ab2cb5 106556->106558 106567 ab2c82 106557->106567 106558->106557 106570 ab87a4 59 API calls 2 library calls 106558->106570 106560 ab2d18 RtlEncodePointer RtlEncodePointer 106560->106557 106561 ab2cc7 106561->106560 106563 ab2cec 106561->106563 106571 ab8864 61 API calls 2 library calls 106561->106571 106563->106557 106565 ab2d06 RtlEncodePointer 106563->106565 106572 ab8864 61 API calls 2 library calls 106563->106572 106565->106560 106566 ab2d00 106566->106557 106566->106565 106573 ab3220 106567->106573 106570->106561 106571->106563 106572->106566 106576 ab9d75 RtlLeaveCriticalSection 106573->106576 106575 ab2c87 106575->106552 106576->106575 106577 a9e5ab 106580 a9d100 106577->106580 106579 a9e5b9 106581 a9d11d 106580->106581 106609 a9d37d 106580->106609 106582 ad2691 106581->106582 106583 ad26e0 106581->106583 106612 a9d144 106581->106612 106586 ad2694 106582->106586 106594 ad26af 106582->106594 106628 b0a3e6 331 API calls __cinit 106583->106628 106587 ad26a0 106586->106587 106586->106612 106626 b0a9fa 331 API calls 106587->106626 106588 ab2d40 __cinit 67 API calls 106588->106612 106591 a9d434 106620 a98a52 68 API calls 106591->106620 106592 ad28b5 106592->106592 106593 a9d54b 106593->106579 106594->106609 106627 b0aea2 331 API calls 3 library calls 106594->106627 106598 a9d443 106598->106579 106599 ad27fc 106632 b0a751 89 API calls 106599->106632 106609->106593 106633 af9e4a 89 API calls 4 library calls 106609->106633 106610 a99ea0 331 API calls 106610->106612 106611 a98047 59 API calls 106611->106612 106612->106588 106612->106591 106612->106593 106612->106599 106612->106609 106612->106610 106612->106611 106614 a98740 68 API calls __cinit 106612->106614 106615 a98542 68 API calls 106612->106615 106616 a984c0 106612->106616 106621 a9843a 68 API calls 106612->106621 106622 a9cf7c 331 API calls 106612->106622 106623 a99dda 59 API calls Mailbox 106612->106623 106624 a9cf00 89 API calls 106612->106624 106625 a9cd7d 331 API calls 106612->106625 106629 a98a52 68 API calls 106612->106629 106630 a99d3c 60 API calls Mailbox 106612->106630 106631 ae678d 60 API calls 106612->106631 106614->106612 106615->106612 106617 a984cb 106616->106617 106619 a984f2 106617->106619 106634 a989b3 69 API calls Mailbox 106617->106634 106619->106612 106620->106598 106621->106612 106622->106612 106623->106612 106624->106612 106625->106612 106626->106593 106627->106609 106628->106612 106629->106612 106630->106612 106631->106612 106632->106609 106633->106592 106634->106619 106635 368295b 106638 36825d0 106635->106638 106637 36829a7 106651 3680000 106638->106651 106641 36826a0 CreateFileW 106642 368266f 106641->106642 106648 36826ad 106641->106648 106643 36826c9 VirtualAlloc 106642->106643 106642->106648 106649 36827d0 CloseHandle 106642->106649 106650 36827e0 VirtualFree 106642->106650 106654 36834e0 GetPEB 106642->106654 106644 36826ea ReadFile 106643->106644 106643->106648 106647 3682708 VirtualAlloc 106644->106647 106644->106648 106645 36828ca 106645->106637 106646 36828bc VirtualFree 106646->106645 106647->106642 106647->106648 106648->106645 106648->106646 106649->106642 106650->106642 106656 3683480 GetPEB 106651->106656 106653 368068b 106653->106642 106655 368350a 106654->106655 106655->106641 106657 36834aa 106656->106657 106657->106653 106658 a9552a 106659 a95ab8 59 API calls 106658->106659 106660 a9553c 106659->106660 106661 a954d2 61 API calls 106660->106661 106662 a9554a 106661->106662 106664 a9555a Mailbox 106662->106664 106665 a98061 61 API calls Mailbox 106662->106665 106665->106664 106666 36823b0 106667 3680000 GetPEB 106666->106667 106668 3682453 106667->106668 106680 36822a0 106668->106680 106681 36822a9 Sleep 106680->106681 106682 36822b7 106681->106682 106683 b989c0 106684 b989d0 106683->106684 106685 b98aea LoadLibraryA 106684->106685 106688 b98b2f VirtualProtect VirtualProtect 106684->106688 106686 b98b01 106685->106686 106686->106684 106690 b98b13 GetProcAddress 106686->106690 106689 b98b94 106688->106689 106689->106689 106690->106686 106691 b98b29 ExitProcess 106690->106691 106692 a93633 106693 a9366a 106692->106693 106694 a93688 106693->106694 106695 a936e7 106693->106695 106736 a936e5 106693->106736 106696 a9374b PostQuitMessage 106694->106696 106697 a93695 106694->106697 106699 acd0cc 106695->106699 106700 a936ed 106695->106700 106733 a936d8 106696->106733 106702 acd154 106697->106702 106703 a936a0 106697->106703 106698 a936ca NtdllDefWindowProc_W 106698->106733 106741 aa1070 10 API calls Mailbox 106699->106741 106704 a936f2 106700->106704 106705 a93715 SetTimer RegisterClipboardFormatW 106700->106705 106757 af2527 71 API calls _memset 106702->106757 106707 a936a8 106703->106707 106708 a93755 106703->106708 106711 a936f9 KillTimer 106704->106711 106712 acd06f 106704->106712 106709 a9373e CreatePopupMenu 106705->106709 106705->106733 106706 acd0f3 106742 aa1093 331 API calls Mailbox 106706->106742 106714 acd139 106707->106714 106715 a936b3 106707->106715 106739 a944a0 64 API calls _memset 106708->106739 106709->106733 106737 a9443a Shell_NotifyIconW _memset 106711->106737 106718 acd0a8 MoveWindow 106712->106718 106719 acd074 106712->106719 106714->106698 106756 ae7c36 59 API calls Mailbox 106714->106756 106722 acd124 106715->106722 106729 a936be 106715->106729 106716 acd166 106716->106698 106716->106733 106718->106733 106723 acd078 106719->106723 106724 acd097 SetFocus 106719->106724 106721 a9370c 106738 a93114 DeleteObject DestroyWindow Mailbox 106721->106738 106755 af2d36 81 API calls _memset 106722->106755 106727 acd081 106723->106727 106723->106729 106724->106733 106740 aa1070 10 API calls Mailbox 106727->106740 106729->106698 106743 a9443a Shell_NotifyIconW _memset 106729->106743 106731 a93764 106731->106733 106734 acd118 106744 a9434a 106734->106744 106736->106698 106737->106721 106738->106733 106739->106731 106740->106733 106741->106706 106742->106729 106743->106734 106745 a94375 _memset 106744->106745 106758 a94182 106745->106758 106748 a943fa 106750 a94430 Shell_NotifyIconW 106748->106750 106751 a94414 Shell_NotifyIconW 106748->106751 106752 a94422 106750->106752 106751->106752 106762 a9407c 106752->106762 106754 a94429 106754->106736 106755->106731 106756->106736 106757->106716 106759 acd423 106758->106759 106760 a94196 106758->106760 106759->106760 106761 acd42c DestroyCursor 106759->106761 106760->106748 106784 af2f94 62 API calls _W_store_winword 106760->106784 106761->106760 106763 a94098 106762->106763 106764 a9416f Mailbox 106762->106764 106765 a97a16 59 API calls 106763->106765 106764->106754 106766 a940a6 106765->106766 106767 acd3c8 LoadStringW 106766->106767 106768 a940b3 106766->106768 106771 acd3e2 106767->106771 106769 a97bcc 59 API calls 106768->106769 106770 a940c8 106769->106770 106770->106771 106772 a940d9 106770->106772 106773 a97b2e 59 API calls 106771->106773 106774 a940e3 106772->106774 106775 a94174 106772->106775 106778 acd3ec 106773->106778 106777 a97b2e 59 API calls 106774->106777 106776 a98047 59 API calls 106775->106776 106781 a940ed _memset _wcscpy 106776->106781 106777->106781 106779 a97cab 59 API calls 106778->106779 106778->106781 106780 acd40e 106779->106780 106783 a97cab 59 API calls 106780->106783 106782 a94155 Shell_NotifyIconW 106781->106782 106782->106764 106783->106781 106784->106748 106785 a91055 106790 a92649 106785->106790 106788 ab2d40 __cinit 67 API calls 106789 a91064 106788->106789 106791 a97667 59 API calls 106790->106791 106792 a926b7 106791->106792 106797 a93582 106792->106797 106794 a92754 106795 a9105a 106794->106795 106800 a93416 59 API calls 2 library calls 106794->106800 106795->106788 106801 a935b0 106797->106801 106800->106794 106802 a935bd 106801->106802 106803 a935a1 106801->106803 106802->106803 106804 a935c4 RegOpenKeyExW 106802->106804 106803->106794 106804->106803 106805 a935de RegQueryValueExW 106804->106805 106806 a93614 RegCloseKey 106805->106806 106807 a935ff 106805->106807 106806->106803 106807->106806 106808 ab7c56 106809 ab7c62 __commit 106808->106809 106845 ab9e08 GetStartupInfoW 106809->106845 106811 ab7c67 106847 ab8b7c GetProcessHeap 106811->106847 106813 ab7cbf 106814 ab7cca 106813->106814 106930 ab7da6 58 API calls 3 library calls 106813->106930 106848 ab9ae6 106814->106848 106817 ab7cd0 106818 ab7cdb __RTC_Initialize 106817->106818 106931 ab7da6 58 API calls 3 library calls 106817->106931 106869 abd5d2 106818->106869 106821 ab7cea 106822 ab7cf6 GetCommandLineW 106821->106822 106932 ab7da6 58 API calls 3 library calls 106821->106932 106888 ac4f23 GetEnvironmentStringsW 106822->106888 106825 ab7cf5 106825->106822 106828 ab7d10 106829 ab7d1b 106828->106829 106933 ab30b5 58 API calls 3 library calls 106828->106933 106898 ac4d58 106829->106898 106832 ab7d21 106833 ab7d2c 106832->106833 106934 ab30b5 58 API calls 3 library calls 106832->106934 106912 ab30ef 106833->106912 106836 ab7d34 106837 ab7d3f __wwincmdln 106836->106837 106935 ab30b5 58 API calls 3 library calls 106836->106935 106918 a947d0 106837->106918 106840 ab7d53 106841 ab7d62 106840->106841 106936 ab3358 58 API calls _doexit 106840->106936 106937 ab30e0 58 API calls _doexit 106841->106937 106844 ab7d67 __commit 106846 ab9e1e 106845->106846 106846->106811 106847->106813 106938 ab3187 36 API calls 2 library calls 106848->106938 106850 ab9aeb 106939 ab9d3c InitializeCriticalSectionAndSpinCount __mtinitlocknum 106850->106939 106852 ab9af0 106853 ab9af4 106852->106853 106941 ab9d8a TlsAlloc 106852->106941 106940 ab9b5c 61 API calls 2 library calls 106853->106940 106856 ab9af9 106856->106817 106857 ab9b06 106857->106853 106858 ab9b11 106857->106858 106942 ab87d5 106858->106942 106861 ab9b53 106950 ab9b5c 61 API calls 2 library calls 106861->106950 106864 ab9b32 106864->106861 106866 ab9b38 106864->106866 106865 ab9b58 106865->106817 106949 ab9a33 58 API calls 4 library calls 106866->106949 106868 ab9b40 GetCurrentThreadId 106868->106817 106870 abd5de __commit 106869->106870 106871 ab9c0b __lock 58 API calls 106870->106871 106872 abd5e5 106871->106872 106873 ab87d5 __calloc_crt 58 API calls 106872->106873 106875 abd5f6 106873->106875 106874 abd661 GetStartupInfoW 106882 abd676 106874->106882 106885 abd7a5 106874->106885 106875->106874 106876 abd601 __commit @_EH4_CallFilterFunc@8 106875->106876 106876->106821 106877 abd86d 106964 abd87d RtlLeaveCriticalSection _doexit 106877->106964 106879 ab87d5 __calloc_crt 58 API calls 106879->106882 106880 abd7f2 GetStdHandle 106880->106885 106881 abd805 GetFileType 106881->106885 106882->106879 106884 abd6c4 106882->106884 106882->106885 106883 abd6f8 GetFileType 106883->106884 106884->106883 106884->106885 106962 ab9e2b InitializeCriticalSectionAndSpinCount 106884->106962 106885->106877 106885->106880 106885->106881 106963 ab9e2b InitializeCriticalSectionAndSpinCount 106885->106963 106889 ab7d06 106888->106889 106890 ac4f34 106888->106890 106894 ac4b1b GetModuleFileNameW 106889->106894 106965 ab881d 58 API calls 2 library calls 106890->106965 106892 ac4f5a _memmove 106893 ac4f70 FreeEnvironmentStringsW 106892->106893 106893->106889 106895 ac4b4f _wparse_cmdline 106894->106895 106897 ac4b8f _wparse_cmdline 106895->106897 106966 ab881d 58 API calls 2 library calls 106895->106966 106897->106828 106899 ac4d71 __NMSG_WRITE 106898->106899 106903 ac4d69 106898->106903 106900 ab87d5 __calloc_crt 58 API calls 106899->106900 106908 ac4d9a __NMSG_WRITE 106900->106908 106901 ac4df1 106902 ab2d55 _free 58 API calls 106901->106902 106902->106903 106903->106832 106904 ab87d5 __calloc_crt 58 API calls 106904->106908 106905 ac4e16 106907 ab2d55 _free 58 API calls 106905->106907 106907->106903 106908->106901 106908->106903 106908->106904 106908->106905 106909 ac4e2d 106908->106909 106967 ac4607 58 API calls 2 library calls 106908->106967 106968 ab8dc6 IsProcessorFeaturePresent 106909->106968 106911 ac4e39 106911->106832 106914 ab30fb __IsNonwritableInCurrentImage 106912->106914 106983 aba4d1 106914->106983 106915 ab3119 __initterm_e 106916 ab2d40 __cinit 67 API calls 106915->106916 106917 ab3138 __cinit __IsNonwritableInCurrentImage 106915->106917 106916->106917 106917->106836 106919 a947ea 106918->106919 106929 a94889 106918->106929 106920 a94824 74A3C8D0 106919->106920 106986 ab336c 106920->106986 106924 a94850 106998 a948fd SystemParametersInfoW SystemParametersInfoW 106924->106998 106926 a9485c 106999 a93b3a 106926->106999 106929->106840 106930->106814 106931->106818 106932->106825 106936->106841 106937->106844 106938->106850 106939->106852 106940->106856 106941->106857 106944 ab87dc 106942->106944 106945 ab8817 106944->106945 106947 ab87fa 106944->106947 106951 ac51f6 106944->106951 106945->106861 106948 ab9de6 TlsSetValue 106945->106948 106947->106944 106947->106945 106959 aba132 Sleep 106947->106959 106948->106864 106949->106868 106950->106865 106952 ac5201 106951->106952 106956 ac521c 106951->106956 106953 ac520d 106952->106953 106952->106956 106960 ab8b28 58 API calls __getptd_noexit 106953->106960 106955 ac522c RtlAllocateHeap 106955->106956 106957 ac5212 106955->106957 106956->106955 106956->106957 106961 ab33a1 RtlDecodePointer 106956->106961 106957->106944 106959->106947 106960->106957 106961->106956 106962->106884 106963->106885 106964->106876 106965->106892 106966->106897 106967->106908 106969 ab8dd1 106968->106969 106974 ab8c59 106969->106974 106973 ab8dec 106973->106911 106975 ab8c73 _memset __call_reportfault 106974->106975 106976 ab8c93 IsDebuggerPresent 106975->106976 106982 aba155 SetUnhandledExceptionFilter UnhandledExceptionFilter 106976->106982 106978 abc5f6 ___crtMessageBoxW 6 API calls 106979 ab8d7a 106978->106979 106981 aba140 GetCurrentProcess TerminateProcess 106979->106981 106980 ab8d57 __call_reportfault 106980->106978 106981->106973 106982->106980 106984 aba4d4 RtlEncodePointer 106983->106984 106984->106984 106985 aba4ee 106984->106985 106985->106915 106987 ab9c0b __lock 58 API calls 106986->106987 106988 ab3377 RtlDecodePointer RtlEncodePointer 106987->106988 107051 ab9d75 RtlLeaveCriticalSection 106988->107051 106990 a94849 106991 ab33d4 106990->106991 106992 ab33f8 106991->106992 106993 ab33de 106991->106993 106992->106924 106993->106992 107052 ab8b28 58 API calls __getptd_noexit 106993->107052 106995 ab33e8 107053 ab8db6 9 API calls __commit 106995->107053 106997 ab33f3 106997->106924 106998->106926 107000 a93b47 __ftell_nolock 106999->107000 107001 a97667 59 API calls 107000->107001 107002 a93b51 GetCurrentDirectoryW 107001->107002 107054 a93766 107002->107054 107051->106990 107052->106995 107053->106997 107055 a97667 59 API calls 107054->107055 107056 a9377c 107055->107056 107255 a93d31 107056->107255 107058 a9379a 107059 a94706 61 API calls 107058->107059 107060 a937ae 107059->107060 107061 a97de1 59 API calls 107060->107061 107062 a937bb 107061->107062 107063 a94ddd 136 API calls 107062->107063 107064 a937d4 107063->107064 107065 a937dc Mailbox 107064->107065 107066 acd173 107064->107066 107070 a98047 59 API calls 107065->107070 107297 af955b 107066->107297 107069 acd192 107072 ab2d55 _free 58 API calls 107069->107072 107073 a937ef 107070->107073 107071 a94e4a 84 API calls 107071->107069 107074 acd19f 107072->107074 107269 a9928a 107073->107269 107076 a94e4a 84 API calls 107074->107076 107078 acd1a8 107076->107078 107082 a93ed0 59 API calls 107078->107082 107079 a97de1 59 API calls 107080 a93808 107079->107080 107081 a984c0 69 API calls 107080->107081 107083 a9381a Mailbox 107081->107083 107084 acd1c3 107082->107084 107085 a97de1 59 API calls 107083->107085 107086 a93ed0 59 API calls 107084->107086 107087 a93840 107085->107087 107088 acd1df 107086->107088 107089 a984c0 69 API calls 107087->107089 107090 a94706 61 API calls 107088->107090 107092 a9384f Mailbox 107089->107092 107091 acd204 107090->107091 107093 a93ed0 59 API calls 107091->107093 107095 a97667 59 API calls 107092->107095 107094 acd210 107093->107094 107096 a98047 59 API calls 107094->107096 107097 a9386d 107095->107097 107098 acd21e 107096->107098 107272 a93ed0 107097->107272 107100 a93ed0 59 API calls 107098->107100 107102 acd22d 107100->107102 107108 a98047 59 API calls 107102->107108 107104 a93887 107104->107078 107105 a93891 107104->107105 107106 ab2efd _W_store_winword 60 API calls 107105->107106 107107 a9389c 107106->107107 107107->107084 107109 a938a6 107107->107109 107110 acd24f 107108->107110 107111 ab2efd _W_store_winword 60 API calls 107109->107111 107112 a93ed0 59 API calls 107110->107112 107114 acd25c 107112->107114 107114->107114 107256 a93d3e __ftell_nolock 107255->107256 107257 a97bcc 59 API calls 107256->107257 107261 a93ea4 Mailbox 107256->107261 107259 a93d70 107257->107259 107258 a979f2 59 API calls 107258->107259 107259->107258 107267 a93da6 Mailbox 107259->107267 107260 a93e77 107260->107261 107262 a97de1 59 API calls 107260->107262 107261->107058 107264 a93e98 107262->107264 107263 a97de1 59 API calls 107263->107267 107265 a93f74 59 API calls 107264->107265 107265->107261 107266 a93f74 59 API calls 107266->107267 107267->107260 107267->107261 107267->107263 107267->107266 107268 a979f2 59 API calls 107267->107268 107268->107267 107270 ab0db6 Mailbox 59 API calls 107269->107270 107271 a937fb 107270->107271 107271->107079 107273 a93eda 107272->107273 107274 a93ef3 107272->107274 107276 a98047 59 API calls 107273->107276 107275 a97bcc 59 API calls 107274->107275 107277 a93879 107275->107277 107276->107277 107278 ab2efd 107277->107278 107279 ab2f09 107278->107279 107280 ab2f7e 107278->107280 107287 ab2f2e 107279->107287 107332 ab8b28 58 API calls __getptd_noexit 107279->107332 107334 ab2f90 60 API calls 4 library calls 107280->107334 107282 ab2f8b 107282->107104 107284 ab2f15 107333 ab8db6 9 API calls __commit 107284->107333 107286 ab2f20 107286->107104 107287->107104 107298 a94ee5 85 API calls 107297->107298 107299 af95ca 107298->107299 107300 af9734 96 API calls 107299->107300 107301 af95dc 107300->107301 107302 a94f0b 74 API calls 107301->107302 107330 acd186 107301->107330 107303 af95f7 107302->107303 107304 a94f0b 74 API calls 107303->107304 107305 af9607 107304->107305 107306 a94f0b 74 API calls 107305->107306 107307 af9622 107306->107307 107308 a94f0b 74 API calls 107307->107308 107309 af963d 107308->107309 107310 a94ee5 85 API calls 107309->107310 107311 af9654 107310->107311 107312 ab571c __crtCompareStringA_stat 58 API calls 107311->107312 107313 af965b 107312->107313 107314 ab571c __crtCompareStringA_stat 58 API calls 107313->107314 107315 af9665 107314->107315 107316 a94f0b 74 API calls 107315->107316 107317 af9679 107316->107317 107318 af9109 GetSystemTimeAsFileTime 107317->107318 107319 af968c 107318->107319 107320 af96b6 107319->107320 107321 af96a1 107319->107321 107323 af96bc 107320->107323 107324 af971b 107320->107324 107322 ab2d55 _free 58 API calls 107321->107322 107326 af96a7 107322->107326 107327 af8b06 116 API calls 107323->107327 107325 ab2d55 _free 58 API calls 107324->107325 107325->107330 107328 ab2d55 _free 58 API calls 107326->107328 107329 af9713 107327->107329 107328->107330 107331 ab2d55 _free 58 API calls 107329->107331 107330->107069 107330->107071 107331->107330 107332->107284 107333->107286 107334->107282 107616 a91016 107621 a94974 107616->107621 107619 ab2d40 __cinit 67 API calls 107620 a91025 107619->107620 107622 ab0db6 Mailbox 59 API calls 107621->107622 107623 a9497c 107622->107623 107625 a9101b 107623->107625 107628 a94936 107623->107628 107625->107619 107629 a9493f 107628->107629 107630 a94951 107628->107630 107631 ab2d40 __cinit 67 API calls 107629->107631 107632 a949a0 107630->107632 107631->107630 107633 a97667 59 API calls 107632->107633 107634 a949b8 GetVersionExW 107633->107634 107635 a97bcc 59 API calls 107634->107635 107636 a949fb 107635->107636 107637 a97d2c 59 API calls 107636->107637 107642 a94a28 107636->107642 107638 a94a1c 107637->107638 107639 a97726 59 API calls 107638->107639 107639->107642 107640 a94a93 GetCurrentProcess IsWow64Process 107641 a94aac 107640->107641 107644 a94b2b GetSystemInfo 107641->107644 107645 a94ac2 107641->107645 107642->107640 107643 acd864 107642->107643 107646 a94af8 107644->107646 107656 a94b37 107645->107656 107646->107625 107649 a94b1f GetSystemInfo 107651 a94ae9 107649->107651 107650 a94ad4 107652 a94b37 2 API calls 107650->107652 107651->107646 107654 a94aef FreeLibrary 107651->107654 107653 a94adc GetNativeSystemInfo 107652->107653 107653->107651 107654->107646 107657 a94ad0 107656->107657 107658 a94b40 LoadLibraryA 107656->107658 107657->107649 107657->107650 107658->107657 107659 a94b51 GetProcAddress 107658->107659 107659->107657 107660 a91066 107665 a9f76f 107660->107665 107662 a9106c 107663 ab2d40 __cinit 67 API calls 107662->107663 107664 a91076 107663->107664 107666 a9f790 107665->107666 107698 aaff03 107666->107698 107670 a9f7d7 107671 a97667 59 API calls 107670->107671 107672 a9f7e1 107671->107672 107673 a97667 59 API calls 107672->107673 107674 a9f7eb 107673->107674 107675 a97667 59 API calls 107674->107675 107676 a9f7f5 107675->107676 107677 a97667 59 API calls 107676->107677 107678 a9f833 107677->107678 107679 a97667 59 API calls 107678->107679 107680 a9f8fe 107679->107680 107708 aa5f87 107680->107708 107684 a9f930 107685 a97667 59 API calls 107684->107685 107686 a9f93a 107685->107686 107736 aafd9e 107686->107736 107688 a9f981 107689 a9f991 GetStdHandle 107688->107689 107690 a9f9dd 107689->107690 107691 ad45ab 107689->107691 107693 a9f9e5 OleInitialize 107690->107693 107691->107690 107692 ad45b4 107691->107692 107743 af6b38 64 API calls Mailbox 107692->107743 107693->107662 107695 ad45bb 107744 af7207 CreateThread 107695->107744 107697 ad45c7 CloseHandle 107697->107693 107745 aaffdc 107698->107745 107701 aaffdc 59 API calls 107702 aaff45 107701->107702 107703 a97667 59 API calls 107702->107703 107704 aaff51 107703->107704 107705 a97bcc 59 API calls 107704->107705 107706 a9f796 107705->107706 107707 ab0162 6 API calls 107706->107707 107707->107670 107709 a97667 59 API calls 107708->107709 107710 aa5f97 107709->107710 107711 a97667 59 API calls 107710->107711 107712 aa5f9f 107711->107712 107752 aa5a9d 107712->107752 107715 aa5a9d 59 API calls 107716 aa5faf 107715->107716 107717 a97667 59 API calls 107716->107717 107718 aa5fba 107717->107718 107719 ab0db6 Mailbox 59 API calls 107718->107719 107720 a9f908 107719->107720 107721 aa60f9 107720->107721 107722 aa6107 107721->107722 107723 a97667 59 API calls 107722->107723 107724 aa6112 107723->107724 107725 a97667 59 API calls 107724->107725 107726 aa611d 107725->107726 107727 a97667 59 API calls 107726->107727 107728 aa6128 107727->107728 107729 a97667 59 API calls 107728->107729 107730 aa6133 107729->107730 107731 aa5a9d 59 API calls 107730->107731 107732 aa613e 107731->107732 107733 ab0db6 Mailbox 59 API calls 107732->107733 107734 aa6145 RegisterClipboardFormatW 107733->107734 107734->107684 107737 ae576f 107736->107737 107738 aafdae 107736->107738 107755 af9ae7 60 API calls 107737->107755 107739 ab0db6 Mailbox 59 API calls 107738->107739 107741 aafdb6 107739->107741 107741->107688 107742 ae577a 107743->107695 107744->107697 107756 af71ed 65 API calls 107744->107756 107746 a97667 59 API calls 107745->107746 107747 aaffe7 107746->107747 107748 a97667 59 API calls 107747->107748 107749 aaffef 107748->107749 107750 a97667 59 API calls 107749->107750 107751 aaff3b 107750->107751 107751->107701 107753 a97667 59 API calls 107752->107753 107754 aa5aa5 107753->107754 107754->107715 107755->107742

                              Control-flow Graph

                              APIs
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A93B68
                              • IsDebuggerPresent.KERNEL32 ref: 00A93B7A
                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,00B552F8,00B552E0,?,?), ref: 00A93BEB
                                • Part of subcall function 00A97BCC: _memmove.LIBCMT ref: 00A97C06
                                • Part of subcall function 00AA092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00A93C14,00B552F8,?,?,?), ref: 00AA096E
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A93C6F
                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00B47770,00000010), ref: 00ACD281
                              • SetCurrentDirectoryW.KERNEL32(?,00B552F8,?,?,?), ref: 00ACD2B9
                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00B44260,00B552F8,?,?,?), ref: 00ACD33F
                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 00ACD346
                                • Part of subcall function 00A93A46: GetSysColorBrush.USER32(0000000F), ref: 00A93A50
                                • Part of subcall function 00A93A46: LoadCursorW.USER32(00000000,00007F00), ref: 00A93A5F
                                • Part of subcall function 00A93A46: LoadIconW.USER32(00000063), ref: 00A93A76
                                • Part of subcall function 00A93A46: LoadIconW.USER32(000000A4), ref: 00A93A88
                                • Part of subcall function 00A93A46: LoadIconW.USER32(000000A2), ref: 00A93A9A
                                • Part of subcall function 00A93A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A93AC0
                                • Part of subcall function 00A93A46: RegisterClassExW.USER32(?), ref: 00A93B16
                                • Part of subcall function 00A939D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A93A03
                                • Part of subcall function 00A939D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A93A24
                                • Part of subcall function 00A939D5: ShowWindow.USER32(00000000,?,?), ref: 00A93A38
                                • Part of subcall function 00A939D5: ShowWindow.USER32(00000000,?,?), ref: 00A93A41
                                • Part of subcall function 00A9434A: _memset.LIBCMT ref: 00A94370
                                • Part of subcall function 00A9434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A94415
                              Strings
                              • runas, xrefs: 00ACD33A
                              • This is a third-party compiled AutoIt script., xrefs: 00ACD279
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                              • String ID: This is a third-party compiled AutoIt script.$runas
                              • API String ID: 529118366-3287110873
                              • Opcode ID: 1170e20327682cc8c97ddc5b6040a710edf545ee3806e07071406d7c21367143
                              • Instruction ID: ce50fc6822f324df07dec887966036ffb41bc1251de28c220c16701a7c3ca4e9
                              • Opcode Fuzzy Hash: 1170e20327682cc8c97ddc5b6040a710edf545ee3806e07071406d7c21367143
                              • Instruction Fuzzy Hash: 9D51E471A04649AACF11EBB4DD16FFD7BF8AF09702F4040E9F411A71A1DE715A49CB21

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 765 a93633-a93681 767 a936e1-a936e3 765->767 768 a93683-a93686 765->768 767->768 771 a936e5 767->771 769 a93688-a9368f 768->769 770 a936e7 768->770 772 a9374b-a93753 PostQuitMessage 769->772 773 a93695-a9369a 769->773 775 acd0cc-acd0fa call aa1070 call aa1093 770->775 776 a936ed-a936f0 770->776 774 a936ca-a936d2 NtdllDefWindowProc_W 771->774 780 a93711-a93713 772->780 778 acd154-acd168 call af2527 773->778 779 a936a0-a936a2 773->779 781 a936d8-a936de 774->781 810 acd0ff-acd106 775->810 782 a936f2-a936f3 776->782 783 a93715-a9373c SetTimer RegisterClipboardFormatW 776->783 778->780 804 acd16e 778->804 785 a936a8-a936ad 779->785 786 a93755-a93764 call a944a0 779->786 780->781 789 a936f9-a9370c KillTimer call a9443a call a93114 782->789 790 acd06f-acd072 782->790 783->780 787 a9373e-a93749 CreatePopupMenu 783->787 792 acd139-acd140 785->792 793 a936b3-a936b8 785->793 786->780 787->780 789->780 796 acd0a8-acd0c7 MoveWindow 790->796 797 acd074-acd076 790->797 792->774 800 acd146-acd14f call ae7c36 792->800 802 a936be-a936c4 793->802 803 acd124-acd134 call af2d36 793->803 796->780 806 acd078-acd07b 797->806 807 acd097-acd0a3 SetFocus 797->807 800->774 802->774 802->810 803->780 804->774 806->802 811 acd081-acd092 call aa1070 806->811 807->780 810->774 814 acd10c-acd11f call a9443a call a9434a 810->814 811->780 814->774
                              APIs
                              • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 00A936D2
                              • KillTimer.USER32(?,00000001), ref: 00A936FC
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A9371F
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 00A9372A
                              • CreatePopupMenu.USER32 ref: 00A9373E
                              • PostQuitMessage.USER32(00000000), ref: 00A9374D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Timer$ClipboardCreateFormatKillMenuMessageNtdllPopupPostProc_QuitRegisterWindow
                              • String ID: TaskbarCreated
                              • API String ID: 157504867-2362178303
                              • Opcode ID: 80e111d9caf80a2ce3d843e9cc2bb48c80a3fb3b9851dc60c1e5a2a851570b03
                              • Instruction ID: afe0a87a9b8974862d112ea67cc7d70bdee6f15a7818a6a5b94643ae9f9479b2
                              • Opcode Fuzzy Hash: 80e111d9caf80a2ce3d843e9cc2bb48c80a3fb3b9851dc60c1e5a2a851570b03
                              • Instruction Fuzzy Hash: 9F4126B3300605BBDF209FA8DD59BBA37F4EB05302F540169FB02972E1DE619E459762

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1002 a949a0-a94a00 call a97667 GetVersionExW call a97bcc 1007 a94b0b-a94b0d 1002->1007 1008 a94a06 1002->1008 1009 acd767-acd773 1007->1009 1010 a94a09-a94a0e 1008->1010 1011 acd774-acd778 1009->1011 1012 a94b12-a94b13 1010->1012 1013 a94a14 1010->1013 1015 acd77a 1011->1015 1016 acd77b-acd787 1011->1016 1014 a94a15-a94a4c call a97d2c call a97726 1012->1014 1013->1014 1024 acd864-acd867 1014->1024 1025 a94a52-a94a53 1014->1025 1015->1016 1016->1011 1018 acd789-acd78e 1016->1018 1018->1010 1020 acd794-acd79b 1018->1020 1020->1009 1022 acd79d 1020->1022 1026 acd7a2-acd7a5 1022->1026 1027 acd869 1024->1027 1028 acd880-acd884 1024->1028 1025->1026 1029 a94a59-a94a64 1025->1029 1030 acd7ab-acd7c9 1026->1030 1031 a94a93-a94aaa GetCurrentProcess IsWow64Process 1026->1031 1036 acd86c 1027->1036 1032 acd86f-acd878 1028->1032 1033 acd886-acd88f 1028->1033 1037 a94a6a-a94a6c 1029->1037 1038 acd7ea-acd7f0 1029->1038 1030->1031 1039 acd7cf-acd7d5 1030->1039 1034 a94aac 1031->1034 1035 a94aaf-a94ac0 1031->1035 1032->1028 1033->1036 1046 acd891-acd894 1033->1046 1034->1035 1047 a94b2b-a94b35 GetSystemInfo 1035->1047 1048 a94ac2-a94ad2 call a94b37 1035->1048 1036->1032 1040 acd805-acd811 1037->1040 1041 a94a72-a94a75 1037->1041 1044 acd7fa-acd800 1038->1044 1045 acd7f2-acd7f5 1038->1045 1042 acd7df-acd7e5 1039->1042 1043 acd7d7-acd7da 1039->1043 1052 acd81b-acd821 1040->1052 1053 acd813-acd816 1040->1053 1049 a94a7b-a94a8a 1041->1049 1050 acd831-acd834 1041->1050 1042->1031 1043->1031 1044->1031 1045->1031 1046->1032 1051 a94af8-a94b08 1047->1051 1059 a94b1f-a94b29 GetSystemInfo 1048->1059 1060 a94ad4-a94ae1 call a94b37 1048->1060 1055 a94a90 1049->1055 1056 acd826-acd82c 1049->1056 1050->1031 1058 acd83a-acd84f 1050->1058 1052->1031 1053->1031 1055->1031 1056->1031 1061 acd859-acd85f 1058->1061 1062 acd851-acd854 1058->1062 1063 a94ae9-a94aed 1059->1063 1067 a94b18-a94b1d 1060->1067 1068 a94ae3-a94ae7 GetNativeSystemInfo 1060->1068 1061->1031 1062->1031 1063->1051 1066 a94aef-a94af2 FreeLibrary 1063->1066 1066->1051 1067->1068 1068->1063
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 00A949CD
                                • Part of subcall function 00A97BCC: _memmove.LIBCMT ref: 00A97C06
                              • GetCurrentProcess.KERNEL32(?,00B1FAEC,00000000,00000000,?), ref: 00A94A9A
                              • IsWow64Process.KERNEL32(00000000), ref: 00A94AA1
                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00A94AE7
                              • FreeLibrary.KERNEL32(00000000), ref: 00A94AF2
                              • GetSystemInfo.KERNEL32(00000000), ref: 00A94B23
                              • GetSystemInfo.KERNEL32(00000000), ref: 00A94B2F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                              • String ID:
                              • API String ID: 1986165174-0
                              • Opcode ID: d38df35ea18602228e4e61cae7e127e78d07ae29a2017a4bd1e303b50fb11b0a
                              • Instruction ID: 029ca7f843f18a23055143638b851227c73145a2d32546611d92d5b732902705
                              • Opcode Fuzzy Hash: d38df35ea18602228e4e61cae7e127e78d07ae29a2017a4bd1e303b50fb11b0a
                              • Instruction Fuzzy Hash: FE91C631A897C1DECB31DB788550AAAFFF5AF2E300B4449ADD0CB93A41D630A509C769

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1069 a94e89-a94ea1 CreateStreamOnHGlobal 1070 a94ec1-a94ec6 1069->1070 1071 a94ea3-a94eba FindResourceExW 1069->1071 1072 a94ec0 1071->1072 1073 acd933-acd942 LoadResource 1071->1073 1072->1070 1073->1072 1074 acd948-acd956 SizeofResource 1073->1074 1074->1072 1075 acd95c-acd967 LockResource 1074->1075 1075->1072 1076 acd96d-acd975 1075->1076 1077 acd979-acd98b 1076->1077 1077->1072
                              APIs
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00A94E99
                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00A94D8E,?,?,00000000,00000000), ref: 00A94EB0
                              • LoadResource.KERNEL32(?,00000000,?,?,00A94D8E,?,?,00000000,00000000,?,?,?,?,?,?,00A94E2F), ref: 00ACD937
                              • SizeofResource.KERNEL32(?,00000000,?,?,00A94D8E,?,?,00000000,00000000,?,?,?,?,?,?,00A94E2F), ref: 00ACD94C
                              • LockResource.KERNEL32(00A94D8E,?,?,00A94D8E,?,?,00000000,00000000,?,?,?,?,?,?,00A94E2F,00000000), ref: 00ACD95F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                              • String ID: SCRIPT
                              • API String ID: 3051347437-3967369404
                              • Opcode ID: 48d7f975022bcb6452d112a8763a0d76f48da68557edfb3f83377dd4345d91be
                              • Instruction ID: 12823ba753df2796f62a554a860e4505b4b64b3fc9d01defed31deab2eb50212
                              • Opcode Fuzzy Hash: 48d7f975022bcb6452d112a8763a0d76f48da68557edfb3f83377dd4345d91be
                              • Instruction Fuzzy Hash: C9111C75244701ABDB218B65EC48FA77BBAEBC9B55F208268F40596260DB71EC01C660

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1139 b989c0-b989cd 1140 b989da-b989df 1139->1140 1141 b989e1 1140->1141 1142 b989d0-b989d5 1141->1142 1143 b989e3 1141->1143 1144 b989d6-b989d8 1142->1144 1145 b989e8-b989ea 1143->1145 1144->1140 1144->1141 1146 b989ec-b989f1 1145->1146 1147 b989f3-b989f7 1145->1147 1146->1147 1148 b989f9 1147->1148 1149 b98a04-b98a07 1147->1149 1150 b989fb-b98a02 1148->1150 1151 b98a23-b98a28 1148->1151 1152 b98a09-b98a0e 1149->1152 1153 b98a10-b98a12 1149->1153 1150->1149 1150->1151 1154 b98a3b-b98a3d 1151->1154 1155 b98a2a-b98a33 1151->1155 1152->1153 1153->1145 1158 b98a3f-b98a44 1154->1158 1159 b98a46 1154->1159 1156 b98aaa-b98aad 1155->1156 1157 b98a35-b98a39 1155->1157 1160 b98ab2-b98ab5 1156->1160 1157->1159 1158->1159 1161 b98a48-b98a4b 1159->1161 1162 b98a14-b98a16 1159->1162 1163 b98ab7-b98ab9 1160->1163 1164 b98a4d-b98a52 1161->1164 1165 b98a54 1161->1165 1166 b98a18-b98a1d 1162->1166 1167 b98a1f-b98a21 1162->1167 1163->1160 1169 b98abb-b98abe 1163->1169 1164->1165 1165->1162 1170 b98a56-b98a58 1165->1170 1166->1167 1168 b98a75-b98a84 1167->1168 1171 b98a94-b98aa1 1168->1171 1172 b98a86-b98a8d 1168->1172 1169->1160 1173 b98ac0-b98adc 1169->1173 1174 b98a5a-b98a5f 1170->1174 1175 b98a61-b98a65 1170->1175 1171->1171 1177 b98aa3-b98aa5 1171->1177 1172->1172 1176 b98a8f 1172->1176 1173->1163 1178 b98ade 1173->1178 1174->1175 1175->1170 1179 b98a67 1175->1179 1176->1144 1177->1144 1180 b98ae4-b98ae8 1178->1180 1181 b98a69-b98a70 1179->1181 1182 b98a72 1179->1182 1183 b98aea-b98b00 LoadLibraryA 1180->1183 1184 b98b2f-b98b32 1180->1184 1181->1170 1181->1182 1182->1168 1186 b98b01-b98b06 1183->1186 1185 b98b35-b98b3c 1184->1185 1187 b98b3e-b98b40 1185->1187 1188 b98b60-b98b90 VirtualProtect * 2 1185->1188 1186->1180 1189 b98b08-b98b0a 1186->1189 1190 b98b53-b98b5e 1187->1190 1191 b98b42-b98b51 1187->1191 1192 b98b94-b98b98 1188->1192 1193 b98b0c-b98b12 1189->1193 1194 b98b13-b98b20 GetProcAddress 1189->1194 1190->1191 1191->1185 1192->1192 1197 b98b9a 1192->1197 1193->1194 1195 b98b29 ExitProcess 1194->1195 1196 b98b22-b98b27 1194->1196 1196->1186
                              APIs
                              • LoadLibraryA.KERNEL32(?), ref: 00B98AFA
                              • GetProcAddress.KERNEL32(?,00B91FF9), ref: 00B98B18
                              • ExitProcess.KERNEL32(?,00B91FF9), ref: 00B98B29
                              • VirtualProtect.KERNELBASE(00A90000,00001000,00000004,?,00000000), ref: 00B98B77
                              • VirtualProtect.KERNELBASE(00A90000,00001000), ref: 00B98B8C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                              • String ID:
                              • API String ID: 1996367037-0
                              • Opcode ID: ef7908e473b318f07746c9270bc2a2b508fc49b775a785d9eacc27ba32ed99d4
                              • Instruction ID: 11d9f69de865b3f2b2466bd43555c1ebd8d6e522237773898cd7d71c14623e24
                              • Opcode Fuzzy Hash: ef7908e473b318f07746c9270bc2a2b508fc49b775a785d9eacc27ba32ed99d4
                              • Instruction Fuzzy Hash: D25107B2A453524BDF218AB8DCC067577D5EB5332072C07BAD5E6C73C6EFA4580687A0
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,00ACE398), ref: 00AF446A
                              • FindFirstFileW.KERNELBASE(?,?), ref: 00AF447B
                              • FindClose.KERNEL32(00000000), ref: 00AF448B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirst
                              • String ID:
                              • API String ID: 48322524-0
                              • Opcode ID: ce3a568d6417bc7f6cd48552fa2486dd2f9bc92549a7fb05c0b2450dae54333e
                              • Instruction ID: 75808163cc2d6f34a5bddd7f98e5b3710015d76636182f88a38ad2e39d872e9c
                              • Opcode Fuzzy Hash: ce3a568d6417bc7f6cd48552fa2486dd2f9bc92549a7fb05c0b2450dae54333e
                              • Instruction Fuzzy Hash: 48E0D8324109056752106B78EC0D4FA775C9E09336F508725F935D20D0EB745900D5D5
                              Strings
                              • Variable must be of type 'Object'., xrefs: 00AD3E62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID: Variable must be of type 'Object'.
                              • API String ID: 0-109567571
                              • Opcode ID: 5e312fa4f5b5a5b6fc99e838ff85d7d008115d2a37464e2763c0392bbd791505
                              • Instruction ID: 31bf97bd6a5332ec4d8db31e47fb87612da0d09e85c0d98898d777621063cf05
                              • Opcode Fuzzy Hash: 5e312fa4f5b5a5b6fc99e838ff85d7d008115d2a37464e2763c0392bbd791505
                              • Instruction Fuzzy Hash: 9CA25875B00205DFCF24CF98C480AAAB7F2FB58314F64856AE906AB352D775ED42CB91
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AA0A5B
                              • timeGetTime.WINMM ref: 00AA0D16
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AA0E53
                              • Sleep.KERNEL32(0000000A), ref: 00AA0E61
                              • LockWindowUpdate.USER32(00000000,?,?), ref: 00AA0EFA
                              • DestroyWindow.USER32 ref: 00AA0F06
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00AA0F20
                              • Sleep.KERNEL32(0000000A,?,?), ref: 00AD4E83
                              • TranslateMessage.USER32(?), ref: 00AD5C60
                              • DispatchMessageW.USER32(?), ref: 00AD5C6E
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00AD5C82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                              • API String ID: 4212290369-3242690629
                              • Opcode ID: 34795f37b93b6fab1daca9b260d6fb01c0111ef3d14dffab21635c0ece3285b8
                              • Instruction ID: 3464e2ac54b1a1d2e2dcf5587ea3227d0c68c6cc2c4332f004f3ba9412724cf6
                              • Opcode Fuzzy Hash: 34795f37b93b6fab1daca9b260d6fb01c0111ef3d14dffab21635c0ece3285b8
                              • Instruction Fuzzy Hash: F4B2B070A08741DFDB24DF24C984FAAB7E5BF85304F14891EE49A973A1DB71E844CB92

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00AF8F5F: __time64.LIBCMT ref: 00AF8F69
                                • Part of subcall function 00A94EE5: _fseek.LIBCMT ref: 00A94EFD
                              • __wsplitpath.LIBCMT ref: 00AF9234
                                • Part of subcall function 00AB40FB: __wsplitpath_helper.LIBCMT ref: 00AB413B
                              • _wcscpy.LIBCMT ref: 00AF9247
                              • _wcscat.LIBCMT ref: 00AF925A
                              • __wsplitpath.LIBCMT ref: 00AF927F
                              • _wcscat.LIBCMT ref: 00AF9295
                              • _wcscat.LIBCMT ref: 00AF92A8
                                • Part of subcall function 00AF8FA5: _memmove.LIBCMT ref: 00AF8FDE
                                • Part of subcall function 00AF8FA5: _memmove.LIBCMT ref: 00AF8FED
                              • _wcscmp.LIBCMT ref: 00AF91EF
                                • Part of subcall function 00AF9734: _wcscmp.LIBCMT ref: 00AF9824
                                • Part of subcall function 00AF9734: _wcscmp.LIBCMT ref: 00AF9837
                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00AF9452
                              • _wcsncpy.LIBCMT ref: 00AF94C5
                              • DeleteFileW.KERNEL32(?,?), ref: 00AF94FB
                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00AF9511
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00AF9522
                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00AF9534
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                              • String ID:
                              • API String ID: 1500180987-0
                              • Opcode ID: d1139379e840d0f3ea9824845edca422224c2a10a9de6f270a866ba3fe956ae0
                              • Instruction ID: d5c17e01e47c1248c683fa4ad3e7939a0ed864661d279c65e0f5223b7e27ba85
                              • Opcode Fuzzy Hash: d1139379e840d0f3ea9824845edca422224c2a10a9de6f270a866ba3fe956ae0
                              • Instruction Fuzzy Hash: FDC12BB1E0021DAADF21DF95CD85EEEBBBDAF49310F0040AAF609E7151DB309A458F65

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00A94706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00B552F8,?,00A937AE,?), ref: 00A94724
                                • Part of subcall function 00AB050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00A97165), ref: 00AB052D
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00A971A8
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00ACE8C8
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00ACE909
                              • RegCloseKey.ADVAPI32(?), ref: 00ACE947
                              • _wcscat.LIBCMT ref: 00ACE9A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                              • API String ID: 2673923337-2727554177
                              • Opcode ID: d575f006efe0ab58d81fe830657e31f398a0cf197cb655f743796c4068278d16
                              • Instruction ID: 779d64fb287ff998fa97eb905a2369dccd0ee217c0c8f65d33c3a995db155913
                              • Opcode Fuzzy Hash: d575f006efe0ab58d81fe830657e31f398a0cf197cb655f743796c4068278d16
                              • Instruction Fuzzy Hash: 36715B716083019ED704EF65E941AAFBBE8FF88350F80496EF445871B1EF729948CB62

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00A93A50
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00A93A5F
                              • LoadIconW.USER32(00000063), ref: 00A93A76
                              • LoadIconW.USER32(000000A4), ref: 00A93A88
                              • LoadIconW.USER32(000000A2), ref: 00A93A9A
                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A93AC0
                              • RegisterClassExW.USER32(?), ref: 00A93B16
                                • Part of subcall function 00A93041: GetSysColorBrush.USER32(0000000F), ref: 00A93074
                                • Part of subcall function 00A93041: RegisterClassExW.USER32(00000030), ref: 00A9309E
                                • Part of subcall function 00A93041: RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 00A930AF
                                • Part of subcall function 00A93041: LoadIconW.USER32(000000A9), ref: 00A930F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Load$Icon$Register$BrushClassColor$ClipboardCursorFormatImage
                              • String ID: #$0$AutoIt v3
                              • API String ID: 2880975755-4155596026
                              • Opcode ID: 0c3b189af30e237bd096fd06ead5da04eb02695ca745bfcc6f2983917e16aa83
                              • Instruction ID: d0befdd350e239d4acd1fef99451a94e18bc8a5a4ea4733a8b0028aacacca2d0
                              • Opcode Fuzzy Hash: 0c3b189af30e237bd096fd06ead5da04eb02695ca745bfcc6f2983917e16aa83
                              • Instruction Fuzzy Hash: BB212A71E10705AFEF20DFA4EC19B9D7BB4EB08712F0041AAE504A72A1DBB65A40CF84

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                              • API String ID: 1825951767-3513169116
                              • Opcode ID: 0edba0d4ae524df05f0729a97cea0dcb6c356b6328de5b5afd5063f461bbac52
                              • Instruction ID: 92fd3c0ff5e921ecc3b7ad4b87cab983aabbdf61e82d0b5954bfd487d5335540
                              • Opcode Fuzzy Hash: 0edba0d4ae524df05f0729a97cea0dcb6c356b6328de5b5afd5063f461bbac52
                              • Instruction Fuzzy Hash: 59A16C72A1021DAADF14EBA4DD92EFEB7F8BF14300F440429F416A7191EF749A08CB60

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00A93074
                              • RegisterClassExW.USER32(00000030), ref: 00A9309E
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 00A930AF
                              • LoadIconW.USER32(000000A9), ref: 00A930F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Register$BrushClassClipboardColorFormatIconLoad
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 975902462-1005189915
                              • Opcode ID: 037c7b169898aeca4f82c51429e754153c18f66f7dad11626d7c2ac0b3e9c824
                              • Instruction ID: 2ccf389d9965120a9a25fbe3ce34c66ade09169e77718e017b1bbcd78cc114a4
                              • Opcode Fuzzy Hash: 037c7b169898aeca4f82c51429e754153c18f66f7dad11626d7c2ac0b3e9c824
                              • Instruction Fuzzy Hash: 5A3147B180034AAFDB11CFA4E889BD9BBF4FB08312F14856EE580A72A1DBB50585CF50

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00A93074
                              • RegisterClassExW.USER32(00000030), ref: 00A9309E
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 00A930AF
                              • LoadIconW.USER32(000000A9), ref: 00A930F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Register$BrushClassClipboardColorFormatIconLoad
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 975902462-1005189915
                              • Opcode ID: a17c3e4aef71cf370abc8348dece5fd815f0bc6171bd5dac4bf0cb578a85b895
                              • Instruction ID: b1c7fcc574c39e8eda70853dacca336e923c715ae803787e8c96058a702bf5cf
                              • Opcode Fuzzy Hash: a17c3e4aef71cf370abc8348dece5fd815f0bc6171bd5dac4bf0cb578a85b895
                              • Instruction Fuzzy Hash: F421E5B1911309AFDB10DFA4E848BEDBBF4FB08702F50816AF510A72A0DBB14544CF91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 948 36825d0-368267e call 3680000 951 3682685-36826ab call 36834e0 CreateFileW 948->951 954 36826ad 951->954 955 36826b2-36826c2 951->955 956 36827fd-3682801 954->956 962 36826c9-36826e3 VirtualAlloc 955->962 963 36826c4 955->963 957 3682843-3682846 956->957 958 3682803-3682807 956->958 964 3682849-3682850 957->964 960 3682809-368280c 958->960 961 3682813-3682817 958->961 960->961 967 3682819-3682823 961->967 968 3682827-368282b 961->968 969 36826ea-3682701 ReadFile 962->969 970 36826e5 962->970 963->956 965 3682852-368285d 964->965 966 36828a5-36828ba 964->966 971 368285f 965->971 972 3682861-368286d 965->972 973 36828ca-36828d2 966->973 974 36828bc-36828c7 VirtualFree 966->974 967->968 975 368283b 968->975 976 368282d-3682837 968->976 977 3682708-3682748 VirtualAlloc 969->977 978 3682703 969->978 970->956 971->966 981 368286f-368287f 972->981 982 3682881-368288d 972->982 974->973 975->957 976->975 979 368274a 977->979 980 368274f-368276a call 3683730 977->980 978->956 979->956 988 3682775-368277f 980->988 984 36828a3 981->984 985 368289a-36828a0 982->985 986 368288f-3682898 982->986 984->964 985->984 986->984 989 3682781-36827b0 call 3683730 988->989 990 36827b2-36827c6 call 3683540 988->990 989->988 996 36827c8 990->996 997 36827ca-36827ce 990->997 996->956 998 36827da-36827de 997->998 999 36827d0-36827d4 CloseHandle 997->999 1000 36827ee-36827f7 998->1000 1001 36827e0-36827eb VirtualFree 998->1001 999->998 1000->951 1000->956 1001->1000
                              APIs
                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 036826A1
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 036828C7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2179690556.0000000003680000.00000040.00001000.00020000.00000000.sdmp, Offset: 03680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3680000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CreateFileFreeVirtual
                              • String ID:
                              • API String ID: 204039940-0
                              • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                              • Instruction ID: d2a5d4c4f6a7f53289f6e3459bc944d9f10758ff14bda7bc789724286b3dbc8e
                              • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                              • Instruction Fuzzy Hash: 3BA12874E00209EBDF14DFA4C9A8BEEB7B5BF48704F248A59E501BB280C7759A85CB54

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1079 a939d5-a93a45 CreateWindowExW * 2 ShowWindow * 2
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A93A03
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A93A24
                              • ShowWindow.USER32(00000000,?,?), ref: 00A93A38
                              • ShowWindow.USER32(00000000,?,?), ref: 00A93A41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: b3273b66c66c8ca6afb2a953ebf2ce7052d4ab718af8c35ea578a46d093a112b
                              • Instruction ID: 6b7992234e1993b53f3e921ece3b1443d162fe2603b2c6fda5b6b3fedc355e98
                              • Opcode Fuzzy Hash: b3273b66c66c8ca6afb2a953ebf2ce7052d4ab718af8c35ea578a46d093a112b
                              • Instruction Fuzzy Hash: 38F03A71540790BEEA315B23AC18F7B2E7DD7C6F52F0040AAB908A31B0CAA21840CBB0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1080 36823b0-36824c9 call 3680000 call 36822a0 CreateFileW 1087 36824cb 1080->1087 1088 36824d0-36824e0 1080->1088 1089 3682580-3682585 1087->1089 1091 36824e2 1088->1091 1092 36824e7-3682501 VirtualAlloc 1088->1092 1091->1089 1093 3682503 1092->1093 1094 3682505-368251c ReadFile 1092->1094 1093->1089 1095 368251e 1094->1095 1096 3682520-368255a call 36822e0 call 36812a0 1094->1096 1095->1089 1101 368255c-3682571 call 3682330 1096->1101 1102 3682576-368257e ExitProcess 1096->1102 1101->1102 1102->1089
                              APIs
                                • Part of subcall function 036822A0: Sleep.KERNELBASE(000001F4), ref: 036822B1
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 036824BF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2179690556.0000000003680000.00000040.00001000.00020000.00000000.sdmp, Offset: 03680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3680000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CreateFileSleep
                              • String ID: QLRM6H50OGY0CO1L
                              • API String ID: 2694422964-3201667348
                              • Opcode ID: 4ad0f2e4f054389717c0eb06c60b179421f15463e29bb194c2cfb7a7790ec514
                              • Instruction ID: 62ddd587630fd03046ec3aadfbe68cb4f24925f30fa5432ebc60e65355792e2c
                              • Opcode Fuzzy Hash: 4ad0f2e4f054389717c0eb06c60b179421f15463e29bb194c2cfb7a7790ec514
                              • Instruction Fuzzy Hash: 23517471D54249DBEF11EBA4C814BEFBBB9AF09300F004599E6097B2C0D7B91B45CB65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1104 a9407c-a94092 1105 a94098-a940ad call a97a16 1104->1105 1106 a9416f-a94173 1104->1106 1109 acd3c8-acd3d7 LoadStringW 1105->1109 1110 a940b3-a940d3 call a97bcc 1105->1110 1113 acd3e2-acd3fa call a97b2e call a96fe3 1109->1113 1110->1113 1114 a940d9-a940dd 1110->1114 1123 a940ed-a9416a call ab2de0 call a9454e call ab2dbc Shell_NotifyIconW call a95904 1113->1123 1126 acd400-acd41e call a97cab call a96fe3 call a97cab 1113->1126 1116 a940e3-a940e8 call a97b2e 1114->1116 1117 a94174-a9417d call a98047 1114->1117 1116->1123 1117->1123 1123->1106 1126->1123
                              APIs
                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00ACD3D7
                                • Part of subcall function 00A97BCC: _memmove.LIBCMT ref: 00A97C06
                              • _memset.LIBCMT ref: 00A940FC
                              • _wcscpy.LIBCMT ref: 00A94150
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A94160
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                              • String ID: Line:
                              • API String ID: 3942752672-1585850449
                              • Opcode ID: fc9ce52ca9be50aa66a26b8da6acca9c3f6e4b5a443cee61f3148d3f6b677a17
                              • Instruction ID: d50e5983ad406207afd9e8b2b5d63f187e69b65ac47fecdc7e789af677c193dc
                              • Opcode Fuzzy Hash: fc9ce52ca9be50aa66a26b8da6acca9c3f6e4b5a443cee61f3148d3f6b677a17
                              • Instruction Fuzzy Hash: 6331DE71208300AAEB31EB60DD46FEF77E8AF44301F10461EF585920A1EF74A649CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                              • String ID:
                              • API String ID: 1559183368-0
                              • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                              • Instruction ID: b088b9157ae2c45c6a403958be0abb0af956f383015854b29423b07f05be2ffb
                              • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                              • Instruction Fuzzy Hash: 39519270E00B05DBDB249F79D9807EE77BAAF45322F248729F825962D2D771DE908B40
                              APIs
                                • Part of subcall function 00A94DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00B552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A94E0F
                              • _free.LIBCMT ref: 00ACE263
                              • _free.LIBCMT ref: 00ACE2AA
                                • Part of subcall function 00A96A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00A96BAD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _free$CurrentDirectoryLibraryLoad
                              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                              • API String ID: 2861923089-1757145024
                              • Opcode ID: 0a12ad5930594539ab93f9fe2f0daa74f2224981b27a817b74d7725fafe04d88
                              • Instruction ID: c89fa62d12b0e0b299a6496737e4bb64e2444aa50116c4b94eb0fd495982d119
                              • Opcode Fuzzy Hash: 0a12ad5930594539ab93f9fe2f0daa74f2224981b27a817b74d7725fafe04d88
                              • Instruction Fuzzy Hash: 1E918D71A10219AFCF04EFA4CD81EEEB7B8FF18310B14456EF815AB2A1DB70A915CB50
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00A935A1,SwapMouseButtons,00000004,?), ref: 00A935D4
                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00A935A1,SwapMouseButtons,00000004,?,?,?,?,00A92754), ref: 00A935F5
                              • RegCloseKey.KERNELBASE(00000000,?,?,00A935A1,SwapMouseButtons,00000004,?,?,?,?,00A92754), ref: 00A93617
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 3677997916-824357125
                              • Opcode ID: 85b20eeb2f669870a2ce311bee1f12481918257c74a1dae26bc8775c4ee2d96f
                              • Instruction ID: 6f5f44e19259b12508cb06f2e2692baaa716902c0dfb3e50f06d67333444f0a5
                              • Opcode Fuzzy Hash: 85b20eeb2f669870a2ce311bee1f12481918257c74a1dae26bc8775c4ee2d96f
                              • Instruction Fuzzy Hash: 47113372610208BADF208FA8D884AEBBBB8EF04740F008469EA05D7210E6719E409BA0
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 03681ACD
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03681AF1
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03681B13
                              Memory Dump Source
                              • Source File: 00000000.00000002.2179690556.0000000003680000.00000040.00001000.00020000.00000000.sdmp, Offset: 03680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3680000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 99ff7f62c7c0315fa1339eff959a02870827681df0665961f4f58c830292e5bf
                              • Instruction ID: 0af0cb1a8bb0da3677fba15caa21c9e1cd7008649442ef79421631c53f1525bc
                              • Opcode Fuzzy Hash: 99ff7f62c7c0315fa1339eff959a02870827681df0665961f4f58c830292e5bf
                              • Instruction Fuzzy Hash: C6621934A14218DBEB24DFA4C854BDEB376EF58300F1091A9D10DEB390E77A9E81CB59
                              APIs
                                • Part of subcall function 00A94EE5: _fseek.LIBCMT ref: 00A94EFD
                                • Part of subcall function 00AF9734: _wcscmp.LIBCMT ref: 00AF9824
                                • Part of subcall function 00AF9734: _wcscmp.LIBCMT ref: 00AF9837
                              • _free.LIBCMT ref: 00AF96A2
                              • _free.LIBCMT ref: 00AF96A9
                              • _free.LIBCMT ref: 00AF9714
                                • Part of subcall function 00AB2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00AB9A24), ref: 00AB2D69
                                • Part of subcall function 00AB2D55: GetLastError.KERNEL32(00000000,?,00AB9A24), ref: 00AB2D7B
                              • _free.LIBCMT ref: 00AF971C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                              • String ID:
                              • API String ID: 1552873950-0
                              • Opcode ID: 99d6c06c233ec92fe9fc1174e35969bf30f803f1a403c61ccf98500b1a9c1837
                              • Instruction ID: 7b7ecef0ff141ecfab421df20d5f2e753c3198d9f5b54af06a0665c6ef0770be
                              • Opcode Fuzzy Hash: 99d6c06c233ec92fe9fc1174e35969bf30f803f1a403c61ccf98500b1a9c1837
                              • Instruction Fuzzy Hash: E25152B1D14218AFDF249FA4CC81BAEBBB9EF48300F10449EF209A7241DB715981CF58
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                              • String ID:
                              • API String ID: 2782032738-0
                              • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                              • Instruction ID: 1f4db738438c5a181c91238d2fc541912ffd42d7b56e570ad9a4b3ccd61b5201
                              • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                              • Instruction Fuzzy Hash: 7541B375A007459BDB18CFA9C9909EE7BBDEF4A360B24813DE85587643DB70DD81CB40
                              APIs
                              • _memset.LIBCMT ref: 00ACEA39
                              • 75D3D0D0.COMDLG32(?), ref: 00ACEA83
                                • Part of subcall function 00A94750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A94743,?,?,00A937AE,?), ref: 00A94770
                                • Part of subcall function 00AB0791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AB07B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: NamePath$FullLong_memset
                              • String ID: X
                              • API String ID: 3051022977-3081909835
                              • Opcode ID: 5d03fe8e809a2eab0bba29d81f18525109fbc3b3133b1224dbecbf56762a179f
                              • Instruction ID: caf924300286d4a81cca4e1ef510708e9af70a4e0bb9ae3d0f4d5e36c3f4ac1a
                              • Opcode Fuzzy Hash: 5d03fe8e809a2eab0bba29d81f18525109fbc3b3133b1224dbecbf56762a179f
                              • Instruction Fuzzy Hash: 9521C031A10248AFCF41DF94C845BEE7BF8AF49714F00805AE408AB242DFB45A89DFA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __fread_nolock_memmove
                              • String ID: EA06
                              • API String ID: 1988441806-3962188686
                              • Opcode ID: e92063ce5da8e81c7e009c6ca82e79c751a2321e463fb0415ac54a28ebf00930
                              • Instruction ID: 6e3dc4e3d1078bae124666979a34443d3c723c2c6345343db6185875d76be55a
                              • Opcode Fuzzy Hash: e92063ce5da8e81c7e009c6ca82e79c751a2321e463fb0415ac54a28ebf00930
                              • Instruction Fuzzy Hash: 5201B971D042187EDB28CBA8CC56EFE7BFCDF15311F00459AF552D2181E979E6048760
                              APIs
                                • Part of subcall function 00AB571C: __FF_MSGBANNER.LIBCMT ref: 00AB5733
                                • Part of subcall function 00AB571C: __NMSG_WRITE.LIBCMT ref: 00AB573A
                                • Part of subcall function 00AB571C: RtlAllocateHeap.NTDLL(00C70000,00000000,00000001), ref: 00AB575F
                              • std::exception::exception.LIBCMT ref: 00AB0DEC
                              • __CxxThrowException@8.LIBCMT ref: 00AB0E01
                                • Part of subcall function 00AB859B: RaiseException.KERNEL32(?,?,00000000,00B49E78,?,00000001,?,?,?,00AB0E06,00000000,00B49E78,00A99E8C,00000001), ref: 00AB85F0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                              • String ID: bad allocation
                              • API String ID: 3902256705-2104205924
                              • Opcode ID: 51e10145b1984d0b3d425e533989577d82e026a4fdecc93ba216c0ce841278c6
                              • Instruction ID: 107b5a995cdc4c39632b7bad9a7485632acb0096bc96f9343e7a1b3bc15d747f
                              • Opcode Fuzzy Hash: 51e10145b1984d0b3d425e533989577d82e026a4fdecc93ba216c0ce841278c6
                              • Instruction Fuzzy Hash: D8F0A43290021D76DB10ABA8ED069DF77EC9F01351F504569F908D6193DF719A90D2D1
                              APIs
                              • GetTempPathW.KERNEL32(00000104,?), ref: 00AF98F8
                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00AF990F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Temp$FileNamePath
                              • String ID: aut
                              • API String ID: 3285503233-3010740371
                              • Opcode ID: 062a7cd27cd48e241706b1d52b1e74de7d634eafab87b918aa36aa682e6c6163
                              • Instruction ID: ff7d359bc6ecee7c8d841ad7b9347722c9aaee968770f35ea77e9b7252a69ca9
                              • Opcode Fuzzy Hash: 062a7cd27cd48e241706b1d52b1e74de7d634eafab87b918aa36aa682e6c6163
                              • Instruction Fuzzy Hash: A2D05E7994030EABDB509BA0DC0EFEA777CE704700F4042B1BA94920A1EEB09698CBD1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a7202a28d302c79915cd1dbf868482f0f64e1eea29d96cab8daf15abb6121c67
                              • Instruction ID: 4b486fe977722bfe40791e7f9dc1f021ac4846969bafedf1f71270d19dab8c34
                              • Opcode Fuzzy Hash: a7202a28d302c79915cd1dbf868482f0f64e1eea29d96cab8daf15abb6121c67
                              • Instruction Fuzzy Hash: 42F15A716083059FCB14DF28C580A6ABBE5FF89314F548A6EF8999B391D730E945CF82
                              APIs
                                • Part of subcall function 00AB0162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AB0193
                                • Part of subcall function 00AB0162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00AB019B
                                • Part of subcall function 00AB0162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AB01A6
                                • Part of subcall function 00AB0162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AB01B1
                                • Part of subcall function 00AB0162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00AB01B9
                                • Part of subcall function 00AB0162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00AB01C1
                                • Part of subcall function 00AA60F9: RegisterClipboardFormatW.USER32(WM_GETCONTROLNAME), ref: 00AA6154
                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00A9F9CD
                              • OleInitialize.OLE32(00000000), ref: 00A9FA4A
                              • CloseHandle.KERNEL32(00000000), ref: 00AD45C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Virtual$Handle$ClipboardCloseFormatInitializeRegister
                              • String ID:
                              • API String ID: 3094916012-0
                              • Opcode ID: 1d9b04951d5bafe3391c893f07a4514583930ae5604422a489302c9b880d4b61
                              • Instruction ID: 3626204f58803498f490a082f699a68654c57a7fa9ce66db038205d62c2c2967
                              • Opcode Fuzzy Hash: 1d9b04951d5bafe3391c893f07a4514583930ae5604422a489302c9b880d4b61
                              • Instruction Fuzzy Hash: 3481DBB0911B40CFC7A4DF29A9607287BE5FB98307B9081EA9409CB379EFB01485CF24
                              APIs
                              • _memset.LIBCMT ref: 00A94370
                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A94415
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00A94432
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$_memset
                              • String ID:
                              • API String ID: 1505330794-0
                              • Opcode ID: ed4120bae469645976e06c19e60ed561a9c2644c8853b266dce457340cb2e71b
                              • Instruction ID: 9e7caa1da5752bc4c8a33f5473b46d3d13f012ba602d9da232cc8e6440a236b9
                              • Opcode Fuzzy Hash: ed4120bae469645976e06c19e60ed561a9c2644c8853b266dce457340cb2e71b
                              • Instruction Fuzzy Hash: 5D3161706047019FDB21DF34D884B9BBBF8FB4830AF00096EE69A87251DB71A945CB52
                              APIs
                              • __FF_MSGBANNER.LIBCMT ref: 00AB5733
                                • Part of subcall function 00ABA16B: __NMSG_WRITE.LIBCMT ref: 00ABA192
                                • Part of subcall function 00ABA16B: __NMSG_WRITE.LIBCMT ref: 00ABA19C
                              • __NMSG_WRITE.LIBCMT ref: 00AB573A
                                • Part of subcall function 00ABA1C8: GetModuleFileNameW.KERNEL32(00000000,00B533BA,00000104,00000000,00000001,00000000), ref: 00ABA25A
                                • Part of subcall function 00ABA1C8: ___crtMessageBoxW.LIBCMT ref: 00ABA308
                                • Part of subcall function 00AB309F: ___crtCorExitProcess.LIBCMT ref: 00AB30A5
                                • Part of subcall function 00AB309F: ExitProcess.KERNEL32 ref: 00AB30AE
                                • Part of subcall function 00AB8B28: __getptd_noexit.LIBCMT ref: 00AB8B28
                              • RtlAllocateHeap.NTDLL(00C70000,00000000,00000001), ref: 00AB575F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                              • String ID:
                              • API String ID: 1372826849-0
                              • Opcode ID: 7561b11b170e3b49ee85609c1abc8b63b71ed3e3988c1d2125ab9d22068bd83d
                              • Instruction ID: 8c6e22696d197af68eda741d14f5ee0c9dfb4ae5f05fd11543319f5820e9cd3b
                              • Opcode Fuzzy Hash: 7561b11b170e3b49ee85609c1abc8b63b71ed3e3988c1d2125ab9d22068bd83d
                              • Instruction Fuzzy Hash: 6001F536B00B01EEDA112B79ED42BEE779CCF42762F100925F5059B283DE70CC808660
                              APIs
                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00AF9548,?,?,?,?,?,00000004), ref: 00AF98BB
                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00AF9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00AF98D1
                              • CloseHandle.KERNEL32(00000000,?,00AF9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00AF98D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleTime
                              • String ID:
                              • API String ID: 3397143404-0
                              • Opcode ID: 7e036aae9124999dd578d5defc79ca34fd00821b68ba32a4ea83782a3bd5240e
                              • Instruction ID: 2f62534a758d0f137647d7bd52159a8a2ce6d1104e46b97bd2c68fe743161300
                              • Opcode Fuzzy Hash: 7e036aae9124999dd578d5defc79ca34fd00821b68ba32a4ea83782a3bd5240e
                              • Instruction Fuzzy Hash: 2EE08632180619B7D7211B94EC09FEA7B59AB06760F108220FB24BA0E0CBB11921D7D8
                              APIs
                              • _free.LIBCMT ref: 00AF8D1B
                                • Part of subcall function 00AB2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00AB9A24), ref: 00AB2D69
                                • Part of subcall function 00AB2D55: GetLastError.KERNEL32(00000000,?,00AB9A24), ref: 00AB2D7B
                              • _free.LIBCMT ref: 00AF8D2C
                              • _free.LIBCMT ref: 00AF8D3E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: c56cf7ee783aa8295308e84720220828ccc4d403300e1e82c1220f1652f177a4
                              • Instruction ID: 39f1008a09b0b4bb5f00aaaca7928a68709009f03de967cf14be776795c7288f
                              • Opcode Fuzzy Hash: c56cf7ee783aa8295308e84720220828ccc4d403300e1e82c1220f1652f177a4
                              • Instruction Fuzzy Hash: BBE017B161160547CB24A7B8AA40BEB23EC4F98752B14091EB60DD7187CE68F8828228
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID: CALL
                              • API String ID: 0-4196123274
                              • Opcode ID: a55b89c65e0f30fef1df7330aa75893acd3af973e8a0145bdec09e605b0bdbf6
                              • Instruction ID: 3a5dfa316915f5939d1671d1f014124ef4a489aefa9e64d3d4657aeb14bd05ce
                              • Opcode Fuzzy Hash: a55b89c65e0f30fef1df7330aa75893acd3af973e8a0145bdec09e605b0bdbf6
                              • Instruction Fuzzy Hash: 13223670608201DFCB24DF14C594B6ABBF1BF95304F15896EE89A9B362DB31EC45CB82
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: EA06
                              • API String ID: 4104443479-3962188686
                              • Opcode ID: 2dd9e5cf4436e31fe34ce185dfc251aae918e4c34a4ad0036eb801ab2bf3cdcc
                              • Instruction ID: ff8b13128daa9f49100a70a43310cab18be143896e1b6b796ecd254d0c48782e
                              • Opcode Fuzzy Hash: 2dd9e5cf4436e31fe34ce185dfc251aae918e4c34a4ad0036eb801ab2bf3cdcc
                              • Instruction Fuzzy Hash: 35415B35B041586BDF269B6489A1FBF7FF2DB4D300F284575EC829B286D6209D4683A1
                              APIs
                              • 74A3C8D0.UXTHEME ref: 00A94834
                                • Part of subcall function 00AB336C: __lock.LIBCMT ref: 00AB3372
                                • Part of subcall function 00AB336C: RtlDecodePointer.NTDLL(00000001), ref: 00AB337E
                                • Part of subcall function 00AB336C: RtlEncodePointer.NTDLL(?), ref: 00AB3389
                                • Part of subcall function 00A948FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00A94915
                                • Part of subcall function 00A948FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00A9492A
                                • Part of subcall function 00A93B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A93B68
                                • Part of subcall function 00A93B3A: IsDebuggerPresent.KERNEL32 ref: 00A93B7A
                                • Part of subcall function 00A93B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,00B552F8,00B552E0,?,?), ref: 00A93BEB
                                • Part of subcall function 00A93B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00A93C6F
                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00A94874
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$DebuggerDecodeEncodeFullNamePathPresent__lock
                              • String ID:
                              • API String ID: 2688871447-0
                              • Opcode ID: 1202ed8208bbcbfa49545dfc0f21a42fc3b9c759abd27d94d4268eac92e5f518
                              • Instruction ID: 27493fcd1d6eb5ced1b4f05f93e97bbf8852047ccaba2aa9ec0dd045ea21330f
                              • Opcode Fuzzy Hash: 1202ed8208bbcbfa49545dfc0f21a42fc3b9c759abd27d94d4268eac92e5f518
                              • Instruction Fuzzy Hash: F1119D72A183419BCB10DF29D905A4EBBE8EF88751F10895EF044872B1DFB19945CB92
                              APIs
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00A95821,?,?,?,?), ref: 00A95CC7
                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00A95821,?,?,?,?), ref: 00ACDD73
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: b26eaa65f3d0501c714995f6c787242cb499288a6be7d0eaacb4bb4843d2a3f5
                              • Instruction ID: a92ed504bd8a13fb89a6182d2cfc7da8a159087b92da4749e3539c2a202b5017
                              • Opcode Fuzzy Hash: b26eaa65f3d0501c714995f6c787242cb499288a6be7d0eaacb4bb4843d2a3f5
                              • Instruction Fuzzy Hash: 3E018470684708BEF7210F24CC8AFB636DCAB01768F108719BAD5AA1E0C6B41C54CB54
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __lock_file_memset
                              • String ID:
                              • API String ID: 26237723-0
                              • Opcode ID: b017ab22c9b60d688c7b3678271a460659cfc950fbbc456b6f070c48e290f171
                              • Instruction ID: 39f7de074b7273bec63410d7fe9eb3ece050fb663e2f917db528f2d3025e3ce1
                              • Opcode Fuzzy Hash: b017ab22c9b60d688c7b3678271a460659cfc950fbbc456b6f070c48e290f171
                              • Instruction Fuzzy Hash: 9B018471C00608ABCF22BF789D026DE7F69AF51361F584115F8141B193EB358A51EF91
                              APIs
                                • Part of subcall function 00AB8B28: __getptd_noexit.LIBCMT ref: 00AB8B28
                              • __lock_file.LIBCMT ref: 00AB53EB
                                • Part of subcall function 00AB6C11: __lock.LIBCMT ref: 00AB6C34
                              • __fclose_nolock.LIBCMT ref: 00AB53F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                              • String ID:
                              • API String ID: 2800547568-0
                              • Opcode ID: 1e39983eaef3810da423695e24f11d702c472969b0690feffa3428c242c9172d
                              • Instruction ID: f7754bd96af8966c967ed897b75a8f989bc5d4f8e075fdbc8e37e7d1628473cc
                              • Opcode Fuzzy Hash: 1e39983eaef3810da423695e24f11d702c472969b0690feffa3428c242c9172d
                              • Instruction Fuzzy Hash: FEF09631C00A049ADB206F7999017ED6BEC6F41374F248105A424AF2C3CBBC8941AF51
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 03681ACD
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 03681AF1
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 03681B13
                              Memory Dump Source
                              • Source File: 00000000.00000002.2179690556.0000000003680000.00000040.00001000.00020000.00000000.sdmp, Offset: 03680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3680000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                              • Instruction ID: 01bf33f9578c0bf5df8ea33d3c1a840251e2a5ef4d8a7ecd3176681f8ec139dc
                              • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                              • Instruction Fuzzy Hash: 0912DD24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A5E77A4E81CF5A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6831a760d2e4ac4232d1d758c220dea0b533ae102c3cb4a7163890f1990134c9
                              • Instruction ID: 3e8e2263673cf9017c5bf0f4620e6e460bb4b975d221175a06bdb249046dad4c
                              • Opcode Fuzzy Hash: 6831a760d2e4ac4232d1d758c220dea0b533ae102c3cb4a7163890f1990134c9
                              • Instruction Fuzzy Hash: E6514E31B00604AFCF15EB68CA92FAE77E6AF45310F158569F906AB392DB31ED01CB51
                              APIs
                              • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00A95B96
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 3f156d5204ebceddbe9a4c4c7dafa322759a324392ab8e8b2032fb9e81702a4a
                              • Instruction ID: 731de71242b706edccfa91d57a634998d59623f20df3333a0e55dc631f375d43
                              • Opcode Fuzzy Hash: 3f156d5204ebceddbe9a4c4c7dafa322759a324392ab8e8b2032fb9e81702a4a
                              • Instruction Fuzzy Hash: D2313931B00A09ABCF19DF6DC485AADB7F5FF48310F158629E81997710E770A9A0CB90
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 8d16c7f75faa389a532c88668b226ada7a7d6cb2b337b0988c94ed4fe5c27552
                              • Instruction ID: 86a63e0ba803596ffdf33929d9d73ce6bd817d69ec1f770ee19f1b5d3cc08e42
                              • Opcode Fuzzy Hash: 8d16c7f75faa389a532c88668b226ada7a7d6cb2b337b0988c94ed4fe5c27552
                              • Instruction Fuzzy Hash: 6D410674604341DFDB24DF18C544F1ABBE1BF45318F0988ADE89A8B362C731E845CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: bb80fbf6219a989719f6379534b1973ca8658fdf07f2445397d2de76dbf00265
                              • Instruction ID: d4ff7ee03ce929f8d76b34ff2f4aab73e7433a55389a0129e05e8c7ab7902bbc
                              • Opcode Fuzzy Hash: bb80fbf6219a989719f6379534b1973ca8658fdf07f2445397d2de76dbf00265
                              • Instruction Fuzzy Hash: E221C371A08A08EBDF109F76E881BAA7BF8FB05350F22846EE489D6511EB70D5D0D745
                              APIs
                                • Part of subcall function 00A94BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00A94BEF
                                • Part of subcall function 00AB525B: __wfsopen.LIBCMT ref: 00AB5266
                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00B552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A94E0F
                                • Part of subcall function 00A94B6A: FreeLibrary.KERNEL32(00000000), ref: 00A94BA4
                                • Part of subcall function 00A94C70: _memmove.LIBCMT ref: 00A94CBA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Library$Free$Load__wfsopen_memmove
                              • String ID:
                              • API String ID: 1396898556-0
                              • Opcode ID: 0eddacc46c70d49df304ac3e3d9fdf3b2082e6daea2abb791884992f1c4371f3
                              • Instruction ID: bd8afc04a4dcd6006d4086fb7de41c5b723eda1a3756d401a542bc220dc12975
                              • Opcode Fuzzy Hash: 0eddacc46c70d49df304ac3e3d9fdf3b2082e6daea2abb791884992f1c4371f3
                              • Instruction Fuzzy Hash: 1411A331700206ABCF15BF74C956FEE77E9AF48710F10892DF541A7181DA719A029B51
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 1fa5a6e069a90bb0bfaf59ac70434f5f888a6d9fb37e99b56abbb122d1f105e9
                              • Instruction ID: e6daeec4262b60df6e51ace8a2e3069d7f384735c676204bde625771cd5a7756
                              • Opcode Fuzzy Hash: 1fa5a6e069a90bb0bfaf59ac70434f5f888a6d9fb37e99b56abbb122d1f105e9
                              • Instruction Fuzzy Hash: 6621F0B4A08341DFCB24DF64C544F5ABBE1BF89314F05896DE88A9B762D731E805CB92
                              APIs
                              • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00A956A7,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00A95C16
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: d1f308be23f9b4aa9bb197434ee90995eec32cfc9b0c5ef2a774c4d4b749729f
                              • Instruction ID: f9dbc70f1efb84c8c8a75f4ac7b60cb6ae2b32a923a534fb7cc0074cc88deb69
                              • Opcode Fuzzy Hash: d1f308be23f9b4aa9bb197434ee90995eec32cfc9b0c5ef2a774c4d4b749729f
                              • Instruction Fuzzy Hash: 57113A71600B059FDB228F29D881B62B7F5EF44760F10C92DE99A8AA51E770E844CB60
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 14d5dc22de30b69a2dca6a7e42185d7ce86be11b0e2de9582ebe648f8a374807
                              • Instruction ID: e8fb4b055817b1f0fa26586f6c249b582a604815f17939abd8a63e81ae764bf0
                              • Opcode Fuzzy Hash: 14d5dc22de30b69a2dca6a7e42185d7ce86be11b0e2de9582ebe648f8a374807
                              • Instruction Fuzzy Hash: BA018FB9700942AFC705EB29C552D2AF7A9FF8A3107148569E869C7702DB31FC21CBE0
                              APIs
                              • __lock_file.LIBCMT ref: 00AB48A6
                                • Part of subcall function 00AB8B28: __getptd_noexit.LIBCMT ref: 00AB8B28
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __getptd_noexit__lock_file
                              • String ID:
                              • API String ID: 2597487223-0
                              • Opcode ID: 7f97470b994a8f6a1622cea8356bd91056d76c131ce2e9369606ab98ed4611ee
                              • Instruction ID: ffa34f7d70a8ed069882df8e51bbb78410d2cae0aa6a2803f6273d95bdcaca34
                              • Opcode Fuzzy Hash: 7f97470b994a8f6a1622cea8356bd91056d76c131ce2e9369606ab98ed4611ee
                              • Instruction Fuzzy Hash: 7AF0AF31900649ABEF11AFF88D067EE3AADAF05325F158414F4249A193CB7C8A51DB51
                              APIs
                              • FreeLibrary.KERNEL32(?,?,00B552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A94E7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: ce0013b4d3869418989e1cc6ba67f11450165c3908bf28d0ebe170542b210a83
                              • Instruction ID: c948ef655181690ccc7e8b56eb65470c3067e5a8fe0b248eb064811012cbfa84
                              • Opcode Fuzzy Hash: ce0013b4d3869418989e1cc6ba67f11450165c3908bf28d0ebe170542b210a83
                              • Instruction Fuzzy Hash: 68F03975601712CFDF349F64E494CA6BBF5BF183293208A3EE1D682620C7329881DF40
                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AB07B0
                                • Part of subcall function 00A97BCC: _memmove.LIBCMT ref: 00A97C06
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: LongNamePath_memmove
                              • String ID:
                              • API String ID: 2514874351-0
                              • Opcode ID: d2eddb97ea4d7d876badde7c316b770ba3560158ea04f84c1fcc11b332528d76
                              • Instruction ID: 8dcab9c511875b083177501698d959bcda95299507ff1142a2309feb876ff6f2
                              • Opcode Fuzzy Hash: d2eddb97ea4d7d876badde7c316b770ba3560158ea04f84c1fcc11b332528d76
                              • Instruction Fuzzy Hash: 9CE08636A0422857C72096589C05FEA77DDDB896A0F0541B5FC08D7205DD709C8086D0
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __fread_nolock
                              • String ID:
                              • API String ID: 2638373210-0
                              • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                              • Instruction ID: a0e69def4cfdbdb58c25f00657123b087ec4bcf0bbdbc477cccc868c44b0494c
                              • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                              • Instruction Fuzzy Hash: 3AE092B1504B045BDB388B24D800BE373E1AB09305F00091DF2AA83242EB62B8418759
                              APIs
                              • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00ACDD42,?,?,00000000), ref: 00A95C5F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: dfb507258c0c906be35aa4bae35762212715f43d851f2cdc5c687a7a443e238e
                              • Instruction ID: 02130b9493ffb0bd1688ce086d079d205171a09e753cd0c9b4ab75dff8dcf013
                              • Opcode Fuzzy Hash: dfb507258c0c906be35aa4bae35762212715f43d851f2cdc5c687a7a443e238e
                              • Instruction Fuzzy Hash: F4D0C77464020CBFE710DB80DC46FA9777CD705710F500194FD04A7290D6B27D508795
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __wfsopen
                              • String ID:
                              • API String ID: 197181222-0
                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction ID: 782a5231137238dbbd8e9e1c9e11678a4d68d1871c8a3d6b5fb2e80aa385acf4
                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction Fuzzy Hash: 48B092B684020C77CE022A92EC02B893B1D9B41764F408020FB0C18163A673AA649A89
                              APIs
                              • GetLastError.KERNEL32(00000002,00000000), ref: 00AFD1FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID:
                              • API String ID: 1452528299-0
                              • Opcode ID: 93d38b317c8e4f511ebbbf641b7ac889aa550bafa65fef23545d5dc58d5f3e29
                              • Instruction ID: b24a2da49db2643904139948b883cd3d3d330c01f6af388a281cfda0d13a08b6
                              • Opcode Fuzzy Hash: 93d38b317c8e4f511ebbbf641b7ac889aa550bafa65fef23545d5dc58d5f3e29
                              • Instruction Fuzzy Hash: 177181306043058FDB05EFA4C591ABEB7E5AF89354F04492DF9969B3A2DB30ED05CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction ID: e09431aef5720d4269a29dc50746e0ba0cffe10d16bd19d4995aa55b8770f4ca
                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction Fuzzy Hash: 7231B570A001059FC718DF59C4849AAFBBAFB5A300B6497A5E84ACB356DB31EDC1DBC0
                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 036822B1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2179690556.0000000003680000.00000040.00001000.00020000.00000000.sdmp, Offset: 03680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3680000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                              • Instruction ID: 3fe06a8c6a06104a4d349d71fb37181cc46484585c49c11f7372b200ef471b2d
                              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                              • Instruction Fuzzy Hash: FCE0BF7494010EEFDB00EFA8D5496DE7BB4EF04711F1006A1FD05D7680DB309E548A66
                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 036822B1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2179690556.0000000003680000.00000040.00001000.00020000.00000000.sdmp, Offset: 03680000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3680000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction ID: 13c3d2728d670d4dac60050ea7ae45c6119e82cb2fbd58be1612d48666da727d
                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction Fuzzy Hash: 84E0E67494010EDFDB00EFB8D54969E7FB4EF04701F1006A1FD01D2280D6309D508A72
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • NtdllDialogWndProc_W.NTDLL(?,0000004E,?,?,?,?,?,?), ref: 00B1CB37
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B1CB95
                              • GetWindowLongW.USER32(?,000000F0), ref: 00B1CBD6
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B1CC00
                              • SendMessageW.USER32 ref: 00B1CC29
                              • _wcsncpy.LIBCMT ref: 00B1CC95
                              • GetKeyState.USER32(00000011), ref: 00B1CCB6
                              • GetKeyState.USER32(00000009), ref: 00B1CCC3
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B1CCD9
                              • GetKeyState.USER32(00000010), ref: 00B1CCE3
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B1CD0C
                              • SendMessageW.USER32 ref: 00B1CD33
                              • SendMessageW.USER32(?,00001030,?,00B1B348), ref: 00B1CE37
                              • SetCapture.USER32(?), ref: 00B1CE69
                              • ClientToScreen.USER32(?,?), ref: 00B1CECE
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B1CEF5
                              • ReleaseCapture.USER32 ref: 00B1CF00
                              • GetCursorPos.USER32(?), ref: 00B1CF3A
                              • ScreenToClient.USER32(?,?), ref: 00B1CF47
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B1CFA3
                              • SendMessageW.USER32 ref: 00B1CFD1
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B1D00E
                              • SendMessageW.USER32 ref: 00B1D03D
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B1D05E
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B1D06D
                              • GetCursorPos.USER32(?), ref: 00B1D08D
                              • ScreenToClient.USER32(?,?), ref: 00B1D09A
                              • GetParent.USER32(?), ref: 00B1D0BA
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B1D123
                              • SendMessageW.USER32 ref: 00B1D154
                              • ClientToScreen.USER32(?,?), ref: 00B1D1B2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B1D1E2
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B1D20C
                              • SendMessageW.USER32 ref: 00B1D22F
                              • ClientToScreen.USER32(?,?), ref: 00B1D281
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B1D2B5
                                • Part of subcall function 00A925DB: GetWindowLongW.USER32(?,000000EB), ref: 00A925EC
                              • GetWindowLongW.USER32(?,000000F0), ref: 00B1D351
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$LongWindow$State$CaptureCursorMenuPopupTrack$DialogInvalidateNtdllParentProc_RectRelease_wcsncpy
                              • String ID: @GUI_DRAGID$F
                              • API String ID: 302779176-4164748364
                              • Opcode ID: c705f37dca09463f29e00dc1edfc9229cdc50c83776474351be30531b1f0d665
                              • Instruction ID: a6566b386314e3f62037aa10e87165f6982bdea51153363978954b0d8c0c532b
                              • Opcode Fuzzy Hash: c705f37dca09463f29e00dc1edfc9229cdc50c83776474351be30531b1f0d665
                              • Instruction Fuzzy Hash: 72429A34208345AFDB20CF24D884BAABFE5FF49311F9445A9F595C72A0CB31E895DB92
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memmove$_memset
                              • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                              • API String ID: 1357608183-1798697756
                              • Opcode ID: 99e7c1ceed70d85ef4950e65709b909442f08e22562d1abc840aa718c728c6a9
                              • Instruction ID: 40934e22589abfe1ba4d0dd2880d10964bbfef9c79b4f7b5dbb469d41ba0c88a
                              • Opcode Fuzzy Hash: 99e7c1ceed70d85ef4950e65709b909442f08e22562d1abc840aa718c728c6a9
                              • Instruction Fuzzy Hash: F2939F72E00259DFDF24CF99C885BADB7B1FF48310F25816AE945AB281E7749E81CB50
                              APIs
                              • GetForegroundWindow.USER32(00000000,?), ref: 00A948DF
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00ACD665
                              • IsIconic.USER32(?), ref: 00ACD66E
                              • ShowWindow.USER32(?,00000009), ref: 00ACD67B
                              • SetForegroundWindow.USER32(?), ref: 00ACD685
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00ACD69B
                              • GetCurrentThreadId.KERNEL32 ref: 00ACD6A2
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00ACD6AE
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00ACD6BF
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00ACD6C7
                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 00ACD6CF
                              • SetForegroundWindow.USER32(?), ref: 00ACD6D2
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ACD6E7
                              • keybd_event.USER32(00000012,00000000), ref: 00ACD6F2
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ACD6FC
                              • keybd_event.USER32(00000012,00000000), ref: 00ACD701
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ACD70A
                              • keybd_event.USER32(00000012,00000000), ref: 00ACD70F
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ACD719
                              • keybd_event.USER32(00000012,00000000), ref: 00ACD71E
                              • SetForegroundWindow.USER32(?), ref: 00ACD721
                              • AttachThreadInput.USER32(?,?,00000000), ref: 00ACD748
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 4125248594-2988720461
                              • Opcode ID: 231e1de89e3a17fb164d0f0f9c8d651e2979a99c94e8a7a12686641e81d67098
                              • Instruction ID: 261e101cc079f88e48cd22ced164917a9ce06c2c4a893021dc9fa0f59550dd4b
                              • Opcode Fuzzy Hash: 231e1de89e3a17fb164d0f0f9c8d651e2979a99c94e8a7a12686641e81d67098
                              • Instruction Fuzzy Hash: 8D317571A40318BAEB205F619C49FBF7E6DEB44B50F518035FA04EB1D1DAB05D01EBA0
                              APIs
                                • Part of subcall function 00AE87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AE882B
                                • Part of subcall function 00AE87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AE8858
                                • Part of subcall function 00AE87E1: GetLastError.KERNEL32 ref: 00AE8865
                              • _memset.LIBCMT ref: 00AE8353
                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00AE83A5
                              • CloseHandle.KERNEL32(?), ref: 00AE83B6
                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00AE83CD
                              • GetProcessWindowStation.USER32 ref: 00AE83E6
                              • SetProcessWindowStation.USER32(00000000), ref: 00AE83F0
                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00AE840A
                                • Part of subcall function 00AE81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00AE8309), ref: 00AE81E0
                                • Part of subcall function 00AE81CB: CloseHandle.KERNEL32(?,?,00AE8309), ref: 00AE81F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                              • String ID: $default$winsta0
                              • API String ID: 2063423040-1027155976
                              • Opcode ID: d320a5fa8847c5f08f4c86aa606af9cd4d1e2d8d0bb0535fb16b349f19d335c3
                              • Instruction ID: b878456ac6fd0769697d2c7e2faf7798e4fff762dfd45073efa66b9ad179c5cb
                              • Opcode Fuzzy Hash: d320a5fa8847c5f08f4c86aa606af9cd4d1e2d8d0bb0535fb16b349f19d335c3
                              • Instruction Fuzzy Hash: B5816971900289AFDF11DFA5CD45AFEBBB9EF04304F148169F919A62A1DF398E14DB20
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00AFC78D
                              • FindClose.KERNEL32(00000000), ref: 00AFC7E1
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00AFC806
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00AFC81D
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00AFC844
                              • __swprintf.LIBCMT ref: 00AFC890
                              • __swprintf.LIBCMT ref: 00AFC8D3
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                              • __swprintf.LIBCMT ref: 00AFC927
                                • Part of subcall function 00AB3698: __woutput_l.LIBCMT ref: 00AB36F1
                              • __swprintf.LIBCMT ref: 00AFC975
                                • Part of subcall function 00AB3698: __flsbuf.LIBCMT ref: 00AB3713
                                • Part of subcall function 00AB3698: __flsbuf.LIBCMT ref: 00AB372B
                              • __swprintf.LIBCMT ref: 00AFC9C4
                              • __swprintf.LIBCMT ref: 00AFCA13
                              • __swprintf.LIBCMT ref: 00AFCA62
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                              • API String ID: 3953360268-2428617273
                              • Opcode ID: a15de5484d9ff7fc68f5fe1deefc2af4ad83ff5a067e01c401a6dbad8a10596c
                              • Instruction ID: 6e52945a9e3aebc6d63a5d27360fd4ec02a9f810ee2998239a14ec05b385131a
                              • Opcode Fuzzy Hash: a15de5484d9ff7fc68f5fe1deefc2af4ad83ff5a067e01c401a6dbad8a10596c
                              • Instruction Fuzzy Hash: 69A12FB2504205ABDB00EFA5CA96DBFB7ECEF95700F40491DF595C6152EA34EA08CB62
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00AFEFB6
                              • _wcscmp.LIBCMT ref: 00AFEFCB
                              • _wcscmp.LIBCMT ref: 00AFEFE2
                              • GetFileAttributesW.KERNEL32(?), ref: 00AFEFF4
                              • SetFileAttributesW.KERNEL32(?,?), ref: 00AFF00E
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00AFF026
                              • FindClose.KERNEL32(00000000), ref: 00AFF031
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00AFF04D
                              • _wcscmp.LIBCMT ref: 00AFF074
                              • _wcscmp.LIBCMT ref: 00AFF08B
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00AFF09D
                              • SetCurrentDirectoryW.KERNEL32(00B48920), ref: 00AFF0BB
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AFF0C5
                              • FindClose.KERNEL32(00000000), ref: 00AFF0D2
                              • FindClose.KERNEL32(00000000), ref: 00AFF0E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1803514871-438819550
                              • Opcode ID: 22448aaec53be03652f17e136bb04fbdf0d5e50eaa2e76c58c2e5f78e2d92504
                              • Instruction ID: ac52ad29ef1d00cfa014a4dea20ad37bee07b2a49bcefbd7fe6359aa781e92ab
                              • Opcode Fuzzy Hash: 22448aaec53be03652f17e136bb04fbdf0d5e50eaa2e76c58c2e5f78e2d92504
                              • Instruction Fuzzy Hash: 3931803250161D7EDB24EBA4EC49AFE77AC9F48360F1441B5F904E30A2EF70DA44DA65
                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B10953
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00B1F910,00000000,?,00000000,?,?), ref: 00B109C1
                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00B10A09
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00B10A92
                              • RegCloseKey.ADVAPI32(?), ref: 00B10DB2
                              • RegCloseKey.ADVAPI32(00000000), ref: 00B10DBF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Close$ConnectCreateRegistryValue
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 536824911-966354055
                              • Opcode ID: cf65036a5a35af4cf67e43e7c79f1af622a974f857490dbdd63e79a1d3ab1837
                              • Instruction ID: fe92212a35214441f5d0062ce7e133eff8c7809039fb24706b2e6b3a22fc58a5
                              • Opcode Fuzzy Hash: cf65036a5a35af4cf67e43e7c79f1af622a974f857490dbdd63e79a1d3ab1837
                              • Instruction Fuzzy Hash: 21026C75614601AFCB14EF28C985E6AB7E9FF89314F04845DF8899B362DB70ED81CB81
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • DragQueryPoint.SHELL32(?,?), ref: 00B1C627
                                • Part of subcall function 00B1AB37: ClientToScreen.USER32(?,?), ref: 00B1AB60
                                • Part of subcall function 00B1AB37: GetWindowRect.USER32(?,?), ref: 00B1ABD6
                                • Part of subcall function 00B1AB37: PtInRect.USER32(?,?,00B1C014), ref: 00B1ABE6
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00B1C690
                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B1C69B
                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B1C6BE
                              • _wcscat.LIBCMT ref: 00B1C6EE
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B1C705
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00B1C71E
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00B1C735
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00B1C757
                              • DragFinish.SHELL32(?), ref: 00B1C75E
                              • NtdllDialogWndProc_W.NTDLL(?,00000233,?,00000000,?,?,?), ref: 00B1C851
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientDialogFinishLongNtdllPointProc_Screen_wcscat
                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                              • API String ID: 2166380349-3440237614
                              • Opcode ID: eedbf8364dc409ae0a299e567e18900e19fbfb39da085fb43dfc028e3b1cbb1f
                              • Instruction ID: 561c319587d4ce0c897fbb2905c625d7f0a6678464fa337f0770e1bfbe9d7859
                              • Opcode Fuzzy Hash: eedbf8364dc409ae0a299e567e18900e19fbfb39da085fb43dfc028e3b1cbb1f
                              • Instruction Fuzzy Hash: A9617E71208301AFCB01EF64DD85EAFBBE8EF89710F40496EF595931A1DB709A49CB52
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00AFF113
                              • _wcscmp.LIBCMT ref: 00AFF128
                              • _wcscmp.LIBCMT ref: 00AFF13F
                                • Part of subcall function 00AF4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00AF43A0
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00AFF16E
                              • FindClose.KERNEL32(00000000), ref: 00AFF179
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00AFF195
                              • _wcscmp.LIBCMT ref: 00AFF1BC
                              • _wcscmp.LIBCMT ref: 00AFF1D3
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00AFF1E5
                              • SetCurrentDirectoryW.KERNEL32(00B48920), ref: 00AFF203
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AFF20D
                              • FindClose.KERNEL32(00000000), ref: 00AFF21A
                              • FindClose.KERNEL32(00000000), ref: 00AFF22C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 1824444939-438819550
                              • Opcode ID: d9b827650f46bd4927d58c2467b0203893e3abe33b41ce69321fe71110f3026e
                              • Instruction ID: d3c86749c080e4d1210cb279d987d47267e72adb35b51807876462c02375dd9f
                              • Opcode Fuzzy Hash: d9b827650f46bd4927d58c2467b0203893e3abe33b41ce69321fe71110f3026e
                              • Instruction Fuzzy Hash: 5B31A43650061E7EDF20AFA4EC49AFE77AC9F45360F1042B5FA14A30A1DB70DA45CA58
                              APIs
                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00AFA20F
                              • __swprintf.LIBCMT ref: 00AFA231
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00AFA26E
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00AFA293
                              • _memset.LIBCMT ref: 00AFA2B2
                              • _wcsncpy.LIBCMT ref: 00AFA2EE
                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00AFA323
                              • CloseHandle.KERNEL32(00000000), ref: 00AFA32E
                              • RemoveDirectoryW.KERNEL32(?), ref: 00AFA337
                              • CloseHandle.KERNEL32(00000000), ref: 00AFA341
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                              • String ID: :$\$\??\%s
                              • API String ID: 2733774712-3457252023
                              • Opcode ID: aab7a4e7062bf0b722eb8bfc263266e3146f740cea44fa18096b6d33ef760201
                              • Instruction ID: 6120959cb1a10681f956d30e9ec2f8f3793733d06f90f1130e8ce6c3e6128f3d
                              • Opcode Fuzzy Hash: aab7a4e7062bf0b722eb8bfc263266e3146f740cea44fa18096b6d33ef760201
                              • Instruction Fuzzy Hash: EC31A0B550010AABDB209FA0DC49FFB37BCEF89700F5041B6FA08D6161EB709644CB65
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B1C1FC
                              • GetFocus.USER32 ref: 00B1C20C
                              • GetDlgCtrlID.USER32(00000000), ref: 00B1C217
                              • _memset.LIBCMT ref: 00B1C342
                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00B1C36D
                              • GetMenuItemCount.USER32(?), ref: 00B1C38D
                              • GetMenuItemID.USER32(?,00000000), ref: 00B1C3A0
                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00B1C3D4
                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00B1C41C
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B1C454
                              • NtdllDialogWndProc_W.NTDLL(?,00000111,?,?,?,?,?,?,?), ref: 00B1C489
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountCtrlDialogFocusLongMessageNtdllPostProc_RadioWindow_memset
                              • String ID: 0
                              • API String ID: 3616455698-4108050209
                              • Opcode ID: 9ac1a0669b33ae0374cee07c73ae0dcf14723b7c5d8c474b55f4a264610020a7
                              • Instruction ID: 47b20eb9dc30e7b8d048bce05bd70862aca52b5992bafd3d3fa3a76dd666656a
                              • Opcode Fuzzy Hash: 9ac1a0669b33ae0374cee07c73ae0dcf14723b7c5d8c474b55f4a264610020a7
                              • Instruction Fuzzy Hash: 0E818E70248311AFDB10CF14D894ABBBFE9FB88714F5049ADF99597291DB30D944CB92
                              APIs
                                • Part of subcall function 00AE8202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AE821E
                                • Part of subcall function 00AE8202: GetLastError.KERNEL32(?,00AE7CE2,?,?,?), ref: 00AE8228
                                • Part of subcall function 00AE8202: GetProcessHeap.KERNEL32(00000008,?,?,00AE7CE2,?,?,?), ref: 00AE8237
                                • Part of subcall function 00AE8202: RtlAllocateHeap.NTDLL(00000000,?,00AE7CE2), ref: 00AE823E
                                • Part of subcall function 00AE8202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AE8255
                                • Part of subcall function 00AE829F: GetProcessHeap.KERNEL32(00000008,00AE7CF8,00000000,00000000,?,00AE7CF8,?), ref: 00AE82AB
                                • Part of subcall function 00AE829F: RtlAllocateHeap.NTDLL(00000000,?,00AE7CF8), ref: 00AE82B2
                                • Part of subcall function 00AE829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00AE7CF8,?), ref: 00AE82C3
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00AE7D13
                              • _memset.LIBCMT ref: 00AE7D28
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00AE7D47
                              • GetLengthSid.ADVAPI32(?), ref: 00AE7D58
                              • GetAce.ADVAPI32(?,00000000,?), ref: 00AE7D95
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00AE7DB1
                              • GetLengthSid.ADVAPI32(?), ref: 00AE7DCE
                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00AE7DDD
                              • RtlAllocateHeap.NTDLL(00000000), ref: 00AE7DE4
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00AE7E05
                              • CopySid.ADVAPI32(00000000), ref: 00AE7E0C
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00AE7E3D
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00AE7E63
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00AE7E77
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: HeapSecurity$AllocateDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                              • String ID:
                              • API String ID: 2347767575-0
                              • Opcode ID: bab34ee641566527ab9a46205dc6c03498f470e9fac7e80e21f3ff7716a1c3cb
                              • Instruction ID: dd140bddfe6e531445157ad988f512162e46e93c71a6ce4a40053ececaeddf33
                              • Opcode Fuzzy Hash: bab34ee641566527ab9a46205dc6c03498f470e9fac7e80e21f3ff7716a1c3cb
                              • Instruction Fuzzy Hash: DB612B7190424AAFDF00DFA5DC85AFEBBB9FF08300F148269E915A7291DB359E15CB60
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                              • API String ID: 0-4052911093
                              • Opcode ID: b4c7482da2e59d14247106b799976de3532ed7980c6be5bd32276f159402560d
                              • Instruction ID: 008ff3aedb1f8585424379843b1634116edcdd13064cd09a937f6e02b6d7f211
                              • Opcode Fuzzy Hash: b4c7482da2e59d14247106b799976de3532ed7980c6be5bd32276f159402560d
                              • Instruction Fuzzy Hash: E4725FB5E00269DBDB14CF59C8807AEB7F5FF49710F14816AE905EB291EB349A81CF90
                              APIs
                              • GetKeyboardState.USER32(?), ref: 00AF0097
                              • SetKeyboardState.USER32(?), ref: 00AF0102
                              • GetAsyncKeyState.USER32(000000A0), ref: 00AF0122
                              • GetKeyState.USER32(000000A0), ref: 00AF0139
                              • GetAsyncKeyState.USER32(000000A1), ref: 00AF0168
                              • GetKeyState.USER32(000000A1), ref: 00AF0179
                              • GetAsyncKeyState.USER32(00000011), ref: 00AF01A5
                              • GetKeyState.USER32(00000011), ref: 00AF01B3
                              • GetAsyncKeyState.USER32(00000012), ref: 00AF01DC
                              • GetKeyState.USER32(00000012), ref: 00AF01EA
                              • GetAsyncKeyState.USER32(0000005B), ref: 00AF0213
                              • GetKeyState.USER32(0000005B), ref: 00AF0221
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: 045098cb4b02804ace43eedfcf2c032bda5394d30ff2eeff9852216c17610668
                              • Instruction ID: e2d7bba3d24eaea85262caf9fdebe7a0c84b99c0ea90e0507a60be06a6ca386d
                              • Opcode Fuzzy Hash: 045098cb4b02804ace43eedfcf2c032bda5394d30ff2eeff9852216c17610668
                              • Instruction Fuzzy Hash: D751EA2490478C19FB35DBE08954BFABFB49F11380F084699A7C1571C3DA649B8CC761
                              APIs
                                • Part of subcall function 00B10E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B0FDAD,?,?), ref: 00B10E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B104AC
                                • Part of subcall function 00A99837: __itow.LIBCMT ref: 00A99862
                                • Part of subcall function 00A99837: __swprintf.LIBCMT ref: 00A998AC
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00B1054B
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00B105E3
                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00B10822
                              • RegCloseKey.ADVAPI32(00000000), ref: 00B1082F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                              • String ID:
                              • API String ID: 1240663315-0
                              • Opcode ID: 460032181dd43081a7e0d2697de503df0db67c874439fb97aad6e3de89e2afe5
                              • Instruction ID: 899d02310697fa9443032f51acb3bda086dc7b06563eef32a9edde333b541446
                              • Opcode Fuzzy Hash: 460032181dd43081a7e0d2697de503df0db67c874439fb97aad6e3de89e2afe5
                              • Instruction Fuzzy Hash: A1E14E31614200AFCB14EF28C995D6BBBE9EF89314F44C96DF449DB2A1DA70ED41CB91
                              APIs
                                • Part of subcall function 00A99837: __itow.LIBCMT ref: 00A99862
                                • Part of subcall function 00A99837: __swprintf.LIBCMT ref: 00A998AC
                              • CoInitialize.OLE32 ref: 00B08403
                              • CoUninitialize.COMBASE ref: 00B0840E
                              • CoCreateInstance.COMBASE(?,00000000,00000017,00B22BEC,?), ref: 00B0846E
                              • IIDFromString.COMBASE(?,?), ref: 00B084E1
                              • VariantInit.OLEAUT32(?), ref: 00B0857B
                              • VariantClear.OLEAUT32(?), ref: 00B085DC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 834269672-1287834457
                              • Opcode ID: 218806b5b3c0d1d89003f9c33e2f3ef53fe517a6c600f366278f53986077dd67
                              • Instruction ID: 9eb650581439f796c1b56a74497f8bd166b63ccd4d6a19a2c5decc490e8e6685
                              • Opcode Fuzzy Hash: 218806b5b3c0d1d89003f9c33e2f3ef53fe517a6c600f366278f53986077dd67
                              • Instruction Fuzzy Hash: 3B61AD70608312AFC710DF54D989B6EBBE8EF55754F00449DF9859B2A1CB70EE44CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: 263619c355b8033bd873a477cc303e50bac9ab539ffef6ec6ee0ca1483fa2580
                              • Instruction ID: abc5e0ed61427b14ee46ddb0d6753958359b356de716c39e46efde4279bb288e
                              • Opcode Fuzzy Hash: 263619c355b8033bd873a477cc303e50bac9ab539ffef6ec6ee0ca1483fa2580
                              • Instruction Fuzzy Hash: D4218D75300211AFDB10AF24DC49BAA7BE8EF45751F10C06AFA46DB2A1DF70AC00CB94
                              APIs
                                • Part of subcall function 00A94750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A94743,?,?,00A937AE,?), ref: 00A94770
                                • Part of subcall function 00AF4A31: GetFileAttributesW.KERNEL32(?,00AF370B), ref: 00AF4A32
                              • FindFirstFileW.KERNEL32(?,?), ref: 00AF38A3
                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00AF394B
                              • MoveFileW.KERNEL32(?,?), ref: 00AF395E
                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00AF397B
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AF399D
                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00AF39B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                              • String ID: \*.*
                              • API String ID: 4002782344-1173974218
                              • Opcode ID: 2ee764b0c660ca59b31e71742fed3932d9d6a1675ec6bce2b39880c5db012b4a
                              • Instruction ID: 104af4add1bb28aaa68258364fcbc1bc76a10d8a125e393225f2835726904451
                              • Opcode Fuzzy Hash: 2ee764b0c660ca59b31e71742fed3932d9d6a1675ec6bce2b39880c5db012b4a
                              • Instruction Fuzzy Hash: 95514A3290514DAACF05EBE0DA929FDB7B9AF14300F604069F50677191EF616F09CBA0
                              APIs
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00AFF440
                              • Sleep.KERNEL32(0000000A), ref: 00AFF470
                              • _wcscmp.LIBCMT ref: 00AFF484
                              • _wcscmp.LIBCMT ref: 00AFF49F
                              • FindNextFileW.KERNEL32(?,?), ref: 00AFF53D
                              • FindClose.KERNEL32(00000000), ref: 00AFF553
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                              • String ID: *.*
                              • API String ID: 713712311-438819550
                              • Opcode ID: da457e5b9938ec7ca6de3aecab792c2022074b6bfe9bf7bd3a94a14229b093c2
                              • Instruction ID: fcf92c496c678ff205df098dda6be4367d23f6cdfea35d6430984da280ea2abc
                              • Opcode Fuzzy Hash: da457e5b9938ec7ca6de3aecab792c2022074b6bfe9bf7bd3a94a14229b093c2
                              • Instruction Fuzzy Hash: 2041587194020EAFCF14DFA4CC45AFEBBB8EF05310F544566F919A71A1EB309A84CBA0
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • GetSystemMetrics.USER32(0000000F), ref: 00B1D47C
                              • GetSystemMetrics.USER32(0000000F), ref: 00B1D49C
                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00B1D6D7
                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00B1D6F5
                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00B1D716
                              • ShowWindow.USER32(00000003,00000000), ref: 00B1D735
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00B1D75A
                              • NtdllDialogWndProc_W.NTDLL(?,00000005,?,?), ref: 00B1D77D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$MessageMetricsSendSystem$DialogInvalidateLongMoveNtdllProc_RectShow
                              • String ID:
                              • API String ID: 830902736-0
                              • Opcode ID: b101fb5fd440e7c72fd9f0d71781cd98103e103c262de032573845c75f2c2e7c
                              • Instruction ID: 0bdda60c6e77d7fa28bd911c48c6964629fd2707c3a78c9deeb0387e4781cb5c
                              • Opcode Fuzzy Hash: b101fb5fd440e7c72fd9f0d71781cd98103e103c262de032573845c75f2c2e7c
                              • Instruction Fuzzy Hash: FCB15775600226ABDF14CF68C9C57E97BF1FF04711F5881A9EC489B295DB34AD90CB90
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: c6ba5f1cab27f4c891c9919760aee212f4d82c02c8a5b0a03bfba01e6e55614f
                              • Instruction ID: 743d1254d129120a4c0416821cb01752bf0a68eae9ab75e137ff7d6976620546
                              • Opcode Fuzzy Hash: c6ba5f1cab27f4c891c9919760aee212f4d82c02c8a5b0a03bfba01e6e55614f
                              • Instruction Fuzzy Hash: 35129A70E00A09DFDF14DFA6DA81AEEB7F5FF48300F104529E806A7291EB75A951CB64
                              APIs
                                • Part of subcall function 00A94750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A94743,?,?,00A937AE,?), ref: 00A94770
                                • Part of subcall function 00AF4A31: GetFileAttributesW.KERNEL32(?,00AF370B), ref: 00AF4A32
                              • FindFirstFileW.KERNEL32(?,?), ref: 00AF3B89
                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00AF3BD9
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AF3BEA
                              • FindClose.KERNEL32(00000000), ref: 00AF3C01
                              • FindClose.KERNEL32(00000000), ref: 00AF3C0A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                              • String ID: \*.*
                              • API String ID: 2649000838-1173974218
                              • Opcode ID: c18dbde0603a8e7bd540c3e55660087c57527ff22d01942d1194fea7bccb4ae2
                              • Instruction ID: 07091748919f550e90144f8a334bf4fb520f09bfd986b19807eab9b6e0386578
                              • Opcode Fuzzy Hash: c18dbde0603a8e7bd540c3e55660087c57527ff22d01942d1194fea7bccb4ae2
                              • Instruction Fuzzy Hash: AD319E320083899BCB01EFA4D991CBFB7E8AE95304F404D2DF5D593191EB219A09C7A3
                              APIs
                                • Part of subcall function 00AE87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AE882B
                                • Part of subcall function 00AE87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AE8858
                                • Part of subcall function 00AE87E1: GetLastError.KERNEL32 ref: 00AE8865
                              • ExitWindowsEx.USER32(?,00000000), ref: 00AF51F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                              • String ID: $@$SeShutdownPrivilege
                              • API String ID: 2234035333-194228
                              • Opcode ID: 8212f21a156e9d39b84e5e73374ccb2d53a0a99df6a1de138ad7e35c416f8aab
                              • Instruction ID: e08545434efd25b9f9e2e539495ae9ecce8166505b42b6801d581271a097aef2
                              • Opcode Fuzzy Hash: 8212f21a156e9d39b84e5e73374ccb2d53a0a99df6a1de138ad7e35c416f8aab
                              • Instruction Fuzzy Hash: 9D01F731E91A1A6BF72867F8DC9AFFA72A8EB05340F600624FB07E20D2DE611C018590
                              APIs
                              • socket.WS2_32(00000002,00000001,00000006), ref: 00B062DC
                              • WSAGetLastError.WS2_32(00000000), ref: 00B062EB
                              • bind.WS2_32(00000000,?,00000010), ref: 00B06307
                              • listen.WS2_32(00000000,00000005), ref: 00B06316
                              • WSAGetLastError.WS2_32(00000000), ref: 00B06330
                              • closesocket.WS2_32(00000000), ref: 00B06344
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketlistensocket
                              • String ID:
                              • API String ID: 1279440585-0
                              • Opcode ID: c8ab1229974dbbbcc3bf4e16f5fd303e595fdfa7b190fee37743e6f5966a4525
                              • Instruction ID: 2c54959a9bc89e3635a3f94c7004c5165a171f7589c08c93256efb29e4c935d6
                              • Opcode Fuzzy Hash: c8ab1229974dbbbcc3bf4e16f5fd303e595fdfa7b190fee37743e6f5966a4525
                              • Instruction Fuzzy Hash: E7219E71600205AFCB10EF68C985B7EBBE9EF49720F5481A9E816A72D1CB70AD01CB91
                              APIs
                                • Part of subcall function 00AB0DB6: std::exception::exception.LIBCMT ref: 00AB0DEC
                                • Part of subcall function 00AB0DB6: __CxxThrowException@8.LIBCMT ref: 00AB0E01
                              • _memmove.LIBCMT ref: 00AE0258
                              • _memmove.LIBCMT ref: 00AE036D
                              • _memmove.LIBCMT ref: 00AE0414
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throwstd::exception::exception
                              • String ID:
                              • API String ID: 1300846289-0
                              • Opcode ID: 14343b15a200c56422ab02cd79ca316e84493ad9f2615f9bb6b76887791f5b89
                              • Instruction ID: 8f683fd5f517104a573b53650d1f2b9d6b605d599d06ce648f5ac5db8cc74122
                              • Opcode Fuzzy Hash: 14343b15a200c56422ab02cd79ca316e84493ad9f2615f9bb6b76887791f5b89
                              • Instruction Fuzzy Hash: 8E029D70E00209DFCF04DF65DA81AAEBBF5EF45300F148069E80AEB295EB75DA54CB95
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • NtdllDialogWndProc_W.NTDLL(?,?,?,?,?), ref: 00A919FA
                              • GetSysColor.USER32(0000000F), ref: 00A91A4E
                              • SetBkColor.GDI32(?,00000000), ref: 00A91A61
                                • Part of subcall function 00A91290: NtdllDialogWndProc_W.NTDLL(?,00000020,?), ref: 00A912D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ColorDialogNtdllProc_$LongWindow
                              • String ID:
                              • API String ID: 591255283-0
                              • Opcode ID: 39a993c3331e0253a773ae5fd632597b26a19a104611118665bf422c9f7863c7
                              • Instruction ID: b22c1a51d53cd0a9310b0808444ef975c46f7856f121aff985d3866ed01d81b1
                              • Opcode Fuzzy Hash: 39a993c3331e0253a773ae5fd632597b26a19a104611118665bf422c9f7863c7
                              • Instruction Fuzzy Hash: 29A17671322546BEEE38AB288C55FBF29EDDB423C2F51011DF502D6592CB229D4192B2
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00AFBCE6
                              • _wcscmp.LIBCMT ref: 00AFBD16
                              • _wcscmp.LIBCMT ref: 00AFBD2B
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00AFBD3C
                              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00AFBD6C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Find$File_wcscmp$CloseFirstNext
                              • String ID:
                              • API String ID: 2387731787-0
                              • Opcode ID: 3981ecc97888b0c4805efb9487d6d78a5b46536de34113c672cff4511720bd2c
                              • Instruction ID: c61cce4cd033eb8bace11605946703c371d6f7c54382c6f3fd1b59ebe92f25e0
                              • Opcode Fuzzy Hash: 3981ecc97888b0c4805efb9487d6d78a5b46536de34113c672cff4511720bd2c
                              • Instruction Fuzzy Hash: 3F519D356146069FDB14DF68C490EAAB3F8EF49320F14465DFA56873A1DB30ED04CBA2
                              APIs
                                • Part of subcall function 00B07D8B: inet_addr.WS2_32(00000000), ref: 00B07DB6
                              • socket.WS2_32(00000002,00000002,00000011), ref: 00B0679E
                              • WSAGetLastError.WS2_32(00000000), ref: 00B067C7
                              • bind.WS2_32(00000000,?,00000010), ref: 00B06800
                              • WSAGetLastError.WS2_32(00000000), ref: 00B0680D
                              • closesocket.WS2_32(00000000), ref: 00B06821
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 99427753-0
                              • Opcode ID: 5497609d2683fa13e6570c9b84067cf117fd14e24686e03e84b35405a08e28ac
                              • Instruction ID: 3e1480dcc15fa71310a31cc1dffbc6b44104e3868206458215483a20441f325e
                              • Opcode Fuzzy Hash: 5497609d2683fa13e6570c9b84067cf117fd14e24686e03e84b35405a08e28ac
                              • Instruction Fuzzy Hash: 0F41AF75B00210AFDF10AF288D86F7E77E8DB05B54F44846CF919AB3D2DA749D018791
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: 5eb2b4ba1de4ef67f676c16c48111a0168a949fd9dccbbdb117824c1d0377447
                              • Instruction ID: afadaad2cdfd5eec092ccc7dba5afee9fff225e9b18306d7083b8217e395e0e1
                              • Opcode Fuzzy Hash: 5eb2b4ba1de4ef67f676c16c48111a0168a949fd9dccbbdb117824c1d0377447
                              • Instruction Fuzzy Hash: A111B231700911ABDB315F26AC44AAABBD9EF857A1B808479F856D3241DB709D81C6A4
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00AE80C0
                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00AE80CA
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00AE80D9
                              • RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 00AE80E0
                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00AE80F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocateErrorLastProcess
                              • String ID:
                              • API String ID: 47921759-0
                              • Opcode ID: 62093f91b38c99481f8df1311c53ae34f9bde96e4dd8ed7f70443b18e84395fe
                              • Instruction ID: 96028d61d91fb6ee2dfd2313fd9cf25fd12447c3f14fb40f214a3eaf41d509d3
                              • Opcode Fuzzy Hash: 62093f91b38c99481f8df1311c53ae34f9bde96e4dd8ed7f70443b18e84395fe
                              • Instruction Fuzzy Hash: B8F0C270280205BFEB104FA5EC8CEB73BACEF49754B404129F909C3160CF609D01DA60
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __itow__swprintf
                              • String ID:
                              • API String ID: 674341424-0
                              • Opcode ID: 8716f3d5283a311376e41ef0bc4a7371fc0ecccbbc40b9663633eb2390c9d3cd
                              • Instruction ID: 57919dbfbc0d7a99b48090e0720fbfc2bf1f3a2474b5cc1d96e1acb2fb9c0d5b
                              • Opcode Fuzzy Hash: 8716f3d5283a311376e41ef0bc4a7371fc0ecccbbc40b9663633eb2390c9d3cd
                              • Instruction Fuzzy Hash: 01228C726083019FDB24DF24C981BAFB7E4AF8A710F14491DF89A97391DB71E944CB92
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00B0EE3D
                              • Process32FirstW.KERNEL32(00000000,?), ref: 00B0EE4B
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                              • Process32NextW.KERNEL32(00000000,?), ref: 00B0EF0B
                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00B0EF1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                              • String ID:
                              • API String ID: 2576544623-0
                              • Opcode ID: db0f349aff534bab70e51d02aa7709c285c976061b0e213c1bebb8b64cfb95bf
                              • Instruction ID: 20d80bcb9ce4294a542706461bbdfa23aee10dfb8f0fa6e7e7f197d27f2a49d9
                              • Opcode Fuzzy Hash: db0f349aff534bab70e51d02aa7709c285c976061b0e213c1bebb8b64cfb95bf
                              • Instruction Fuzzy Hash: 0A517E71604311AFD710EF24DC86EABBBE8EF94710F50492DF595972A1EB70E908CB92
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • GetCursorPos.USER32(?), ref: 00B1C4D2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00ACB9AB,?,?,?,?,?), ref: 00B1C4E7
                              • GetCursorPos.USER32(?), ref: 00B1C534
                              • NtdllDialogWndProc_W.NTDLL(?,0000007B,?,?,?,?,?,?,?,?,?,?,00ACB9AB,?,?,?), ref: 00B1C56E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Cursor$DialogLongMenuNtdllPopupProc_TrackWindow
                              • String ID:
                              • API String ID: 1423138444-0
                              • Opcode ID: 1d2c8e9ce5a546f56cb3224ed9751703148499add17168b47ad3167988f281dc
                              • Instruction ID: a84e050910b1a30fbe841e515e1e790db7abfcb1e860bb8f3022212a48461645
                              • Opcode Fuzzy Hash: 1d2c8e9ce5a546f56cb3224ed9751703148499add17168b47ad3167988f281dc
                              • Instruction Fuzzy Hash: FC319535600418AFCB25CF58D855EFE7FF6EB09311F8440A5F9058B261CB316D90DBA4
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • NtdllDialogWndProc_W.NTDLL(?,00000020,?), ref: 00A912D8
                              • GetClientRect.USER32(?,?), ref: 00ACB5FB
                              • GetCursorPos.USER32(?), ref: 00ACB605
                              • ScreenToClient.USER32(?,?), ref: 00ACB610
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Client$CursorDialogLongNtdllProc_RectScreenWindow
                              • String ID:
                              • API String ID: 1010295502-0
                              • Opcode ID: 06eca2fd7749f822dbda0cba7ca36a8c00d5124fe58f6cbfc41a4437e46a169d
                              • Instruction ID: 13c81860088afed0a1d60a6cc76ddf61209db3fb0d6f46a181c5951a54cea8eb
                              • Opcode Fuzzy Hash: 06eca2fd7749f822dbda0cba7ca36a8c00d5124fe58f6cbfc41a4437e46a169d
                              • Instruction Fuzzy Hash: 7311283560011AABCF10EF98D9859FE77F9EB05301F9044A5FA01E7141CB30BA52CBA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID:
                              • API String ID: 3964851224-0
                              • Opcode ID: 8666bc60f0364977b6afb7ce103d155641c6579d1c6c53afab62cadfc54963c7
                              • Instruction ID: e82692d2376f775b6feb81f4cc0858c0796d093d50308230d0c53d12ed64cb07
                              • Opcode Fuzzy Hash: 8666bc60f0364977b6afb7ce103d155641c6579d1c6c53afab62cadfc54963c7
                              • Instruction Fuzzy Hash: 0E925B706083419FDB20DF18C580B6BB7E5BF89304F14896DE89A9B392D775EC45CB92
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00AEE628
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: ($|
                              • API String ID: 1659193697-1631851259
                              • Opcode ID: c3ada084f56fb120bfaedb0d42fd5971650e8a4c60b1bd7a4ee7a92e6f26eb47
                              • Instruction ID: d7ff9a4c0f73c883c2910820f3d30357c9a3e1e99678edab61cad81b4f344616
                              • Opcode Fuzzy Hash: c3ada084f56fb120bfaedb0d42fd5971650e8a4c60b1bd7a4ee7a92e6f26eb47
                              • Instruction Fuzzy Hash: 83323575A007459FDB28CF1AC4819AAB7F1FF48320B15C56EE89ADB3A1E770E941CB44
                              APIs
                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00B0180A,00000000), ref: 00B023E1
                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00B02418
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Internet$AvailableDataFileQueryRead
                              • String ID:
                              • API String ID: 599397726-0
                              • Opcode ID: 148bff6c364a6a8443393223f8987152239f0715a59247e8c6925916688f9df0
                              • Instruction ID: b5b995569dff213e98062fbefee9ae6aec38331d036790dd019d0ba3c3252ddc
                              • Opcode Fuzzy Hash: 148bff6c364a6a8443393223f8987152239f0715a59247e8c6925916688f9df0
                              • Instruction Fuzzy Hash: B741E271904209BFEB209F95DCC9EBFBBECEB40314F1040AAF605A72C1DA749E499664
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00AFB40B
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00AFB465
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00AFB4B2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID:
                              • API String ID: 1682464887-0
                              • Opcode ID: 5f531b3ab14822b6d605fbee939aaaeca3e0256adc12ed41e548c26ce04735d1
                              • Instruction ID: e1e833b9dd0852a467b39c87f1e54516761738e6197964db56348b42d16206cc
                              • Opcode Fuzzy Hash: 5f531b3ab14822b6d605fbee939aaaeca3e0256adc12ed41e548c26ce04735d1
                              • Instruction Fuzzy Hash: 61215C35A10108EFCB00EFA5D981AFEBBF8FF49310F1480A9E905AB361DB319955CB51
                              APIs
                                • Part of subcall function 00AB0DB6: std::exception::exception.LIBCMT ref: 00AB0DEC
                                • Part of subcall function 00AB0DB6: __CxxThrowException@8.LIBCMT ref: 00AB0E01
                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00AE882B
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00AE8858
                              • GetLastError.KERNEL32 ref: 00AE8865
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                              • String ID:
                              • API String ID: 1922334811-0
                              • Opcode ID: e6f8f5c7ec3084cd2d55066ce0e887f7effb1a4acdc8e92d529121fc9018ac97
                              • Instruction ID: f6df0e4dbeb414791241e8e6f9691199b89885292030287f7a6bd231e0cf4286
                              • Opcode Fuzzy Hash: e6f8f5c7ec3084cd2d55066ce0e887f7effb1a4acdc8e92d529121fc9018ac97
                              • Instruction Fuzzy Hash: 76116DB2814205AFE718DFA5DC85D6BB7BCEB44750B60852EE89997251EA34AC408B60
                              APIs
                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00AE8774
                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00AE878B
                              • FreeSid.ADVAPI32(?), ref: 00AE879B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AllocateCheckFreeInitializeMembershipToken
                              • String ID:
                              • API String ID: 3429775523-0
                              • Opcode ID: 7725c94d3dc56660f498a3822fde2e893949127cf8ea22b416a5173beedbc6de
                              • Instruction ID: ecc5cd2a84c04f7963b17c4269c40ef6a850da9beb0ae37eb710a734e48cfde7
                              • Opcode Fuzzy Hash: 7725c94d3dc56660f498a3822fde2e893949127cf8ea22b416a5173beedbc6de
                              • Instruction Fuzzy Hash: C6F03775A11209BBDB00DFE49D89ABEBBB8EF08211F5084A9A901E2191EA756A448B50
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                                • Part of subcall function 00A925DB: GetWindowLongW.USER32(?,000000EB), ref: 00A925EC
                              • GetParent.USER32(?), ref: 00ACB7BA
                              • NtdllDialogWndProc_W.NTDLL(?,00000133,?,?,?,?,?,?,?,?,00A919B3,?,?,?,00000006,?), ref: 00ACB834
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: LongWindow$DialogNtdllParentProc_
                              • String ID:
                              • API String ID: 314495775-0
                              • Opcode ID: cefe0409f6550ac846b1341720c0c25f674277296ac021498da8b2ce4b2731ff
                              • Instruction ID: c459e40dce50d987366e21ccb7aed07771b928dfad9d950dbf6b3a564ea55d05
                              • Opcode Fuzzy Hash: cefe0409f6550ac846b1341720c0c25f674277296ac021498da8b2ce4b2731ff
                              • Instruction Fuzzy Hash: 1D21B434301106AFCF209F68D995FA93BE6EF49321F554294F9255B2F2CB319D12DB50
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00AFC6FB
                              • FindClose.KERNEL32(00000000), ref: 00AFC72B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 058e08ea8795282cbfd0787fb7de98a672863192eee528284355a85f4017aa39
                              • Instruction ID: 2132a5daf9870ec1eadae07a352e74ea0d51aa3503c9b31387d32ff0d3982058
                              • Opcode Fuzzy Hash: 058e08ea8795282cbfd0787fb7de98a672863192eee528284355a85f4017aa39
                              • Instruction Fuzzy Hash: 17115E726106049FDB10EF29D945A6AF7E9EF85324F00C91DF9A997291DB30A805CF91
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • NtdllDialogWndProc_W.NTDLL(?,0000002B,?,?,?,?,?,?,?,00ACB93A,?,?,?), ref: 00B1C5F1
                                • Part of subcall function 00A925DB: GetWindowLongW.USER32(?,000000EB), ref: 00A925EC
                              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00B1C5D7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: LongWindow$DialogMessageNtdllProc_Send
                              • String ID:
                              • API String ID: 1273190321-0
                              • Opcode ID: af38e0da2ea7be9737f48be65d3c304ae83571b66e4bcbb86c568c8870223f55
                              • Instruction ID: cb31aa77d58cd509b75fbc35d03cea77ec628f03ab11af98043eeeaae85b8f9a
                              • Opcode Fuzzy Hash: af38e0da2ea7be9737f48be65d3c304ae83571b66e4bcbb86c568c8870223f55
                              • Instruction Fuzzy Hash: 5501B131240204ABCB219F14DC95FAA7FE7FB99365F5441A8FA415B2E1CB31B881DB90
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 00B1C961
                              • NtdllDialogWndProc_W.NTDLL(?,00000200,?,?,?,?,?,?,?,00ACBA16,?,?,?,?,?), ref: 00B1C98A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ClientDialogNtdllProc_Screen
                              • String ID:
                              • API String ID: 3420055661-0
                              • Opcode ID: 224a8c87c9cd8abcf941e88fe322ff9fd4e9d7f9b690ec89d131737bb1094e85
                              • Instruction ID: 73177f03ac4f0d954fcb7dfac3b0a6cc3ebdac17f09c53f7442e618979bac911
                              • Opcode Fuzzy Hash: 224a8c87c9cd8abcf941e88fe322ff9fd4e9d7f9b690ec89d131737bb1094e85
                              • Instruction Fuzzy Hash: 02F01772400218FFEB058F85DC09AFE7FB9FB48311F50416AF905A2161D7716A60EBA4
                              APIs
                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00B09468,?,00B1FB84,?), ref: 00AFA097
                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00B09468,?,00B1FB84,?), ref: 00AFA0A9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID:
                              • API String ID: 3479602957-0
                              • Opcode ID: c19d2330b776a573a098b45c0006f9c29d8069343e5a954913862884c095a45d
                              • Instruction ID: 8108153f51c95cdfcdd80eca93733e61ef6d51980fa6f51758479afe0439e267
                              • Opcode Fuzzy Hash: c19d2330b776a573a098b45c0006f9c29d8069343e5a954913862884c095a45d
                              • Instruction Fuzzy Hash: C7F0823560522EABDB219FA4DC48FFA776CBF09361F008165F919D7181DA309940CBE1
                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 00B1CA84
                              • NtdllDialogWndProc_W.NTDLL(?,00000084,00000000,?,?,00ACB995,?,?,?,?), ref: 00B1CAB2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: 6ed6e4e5a4fe3d75861768832f271e512fedfe2341970d45809c77583180d3d3
                              • Instruction ID: 7b2db21a4d9dac52554d559ddc4e1c8d31a86d0a49d28ed42781f4e9318ed7ba
                              • Opcode Fuzzy Hash: 6ed6e4e5a4fe3d75861768832f271e512fedfe2341970d45809c77583180d3d3
                              • Instruction Fuzzy Hash: 98E08670140219BFEB159F19DC0AFFA3F94EB04791F908219F956DA1E5CB709890D760
                              APIs
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00AE8309), ref: 00AE81E0
                              • CloseHandle.KERNEL32(?,?,00AE8309), ref: 00AE81F2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AdjustCloseHandlePrivilegesToken
                              • String ID:
                              • API String ID: 81990902-0
                              • Opcode ID: 33f5c7652503579adc505c623604bf014aaa7d33beea459c26d2c67c1e811872
                              • Instruction ID: b003a96f64ce5bf28f4ac02b03b364aee151e3d7f046e5e821df371cfd1963fc
                              • Opcode Fuzzy Hash: 33f5c7652503579adc505c623604bf014aaa7d33beea459c26d2c67c1e811872
                              • Instruction Fuzzy Hash: 17E0EC72011611AFE7252B61FC09DB77BEEEF04350714C92DF8AA85471DB62AC91DB14
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,00B24178,00AB8D57,t of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.,?,?,00000001), ref: 00ABA15A
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00ABA163
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 47ddd3af3bac6cede32b4aa29651ffe607db9678e72e806e6d5c86d0b4b2b118
                              • Instruction ID: bf328d4bf9b1ef852f193c4a32385ad1d48be946d486de62f60a977f5abf9a9d
                              • Opcode Fuzzy Hash: 47ddd3af3bac6cede32b4aa29651ffe607db9678e72e806e6d5c86d0b4b2b118
                              • Instruction Fuzzy Hash: 39B0923105420AEBCA002B91FC09BE83F68FB44BA2F808020F61D86064CF625450CA99
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 38b9a303dac2bb2e1d4fcd50f90eb3ef0143e090e42a387c64ab4d9e8807099c
                              • Instruction ID: f010a53dc58f60afe5c3205cdad06d52ad2563f5dda65c44a912f8bf810edbf7
                              • Opcode Fuzzy Hash: 38b9a303dac2bb2e1d4fcd50f90eb3ef0143e090e42a387c64ab4d9e8807099c
                              • Instruction Fuzzy Hash: F132DF32D69F414DD7239639DC36366A24DAFA73C4F19D737E819B69AAEF2884834100
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 22029987f655aa4c15423483f6e50ded5dc1858e1f5698b15f4e1445bd2e5ffc
                              • Instruction ID: 116fdc27f196e75b62b982a33e13ea3c0069b33a13c07da982605bcccc6f9b44
                              • Opcode Fuzzy Hash: 22029987f655aa4c15423483f6e50ded5dc1858e1f5698b15f4e1445bd2e5ffc
                              • Instruction Fuzzy Hash: E1B10221D2AF414ED723A6398831336BB5CAFBB2D5F52D71BFC2675D22EB2185834241
                              APIs
                              • __time64.LIBCMT ref: 00AF889B
                                • Part of subcall function 00AB520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00AF8F6E,00000000,?,?,?,?,00AF911F,00000000,?), ref: 00AB5213
                                • Part of subcall function 00AB520A: __aulldiv.LIBCMT ref: 00AB5233
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Time$FileSystem__aulldiv__time64
                              • String ID:
                              • API String ID: 2893107130-0
                              • Opcode ID: 47cccfa1fc9c30df6d221a6d743f940413310f4c342e23516c4de0d3afd8ae97
                              • Instruction ID: 01dacef431efe6def4e4fa4f6f3be323c087a8877bb3c8166843d4483901510b
                              • Opcode Fuzzy Hash: 47cccfa1fc9c30df6d221a6d743f940413310f4c342e23516c4de0d3afd8ae97
                              • Instruction Fuzzy Hash: 8E21A2326256148BC729CF75D841B62B3E1EBA5351B688E6CE1F5CB2C0DE34A905CB94
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • NtdllDialogWndProc_W.NTDLL(?,00000112,?,00000000), ref: 00B1D838
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: 6a51dae5c9c7d35a8522c83a13ca08311c0251a6804781bac3f2177317af4402
                              • Instruction ID: c23a2fae8af6c86e91689c2a1437bc9240495abfb16bd2124ff15237ed8d2062
                              • Opcode Fuzzy Hash: 6a51dae5c9c7d35a8522c83a13ca08311c0251a6804781bac3f2177317af4402
                              • Instruction Fuzzy Hash: F2110A35204215BBEB255A2CCD46FFA3BD4D741720FA043A4F9219B5E2CE60AD9093A5
                              APIs
                                • Part of subcall function 00A925DB: GetWindowLongW.USER32(?,000000EB), ref: 00A925EC
                              • NtdllDialogWndProc_W.NTDLL(?,00000115,?,?,?,?,?,?,00ACB952,?,?,?,?,00000000,?), ref: 00B1D432
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: 834c43271845204d61db920b26a2766f4391c71d3bc798978141a9ba81fa66ab
                              • Instruction ID: 79d1532b8e3b2febbf517cd75b09c4a59a8ef1aff9e82cc7401def814578b9bf
                              • Opcode Fuzzy Hash: 834c43271845204d61db920b26a2766f4391c71d3bc798978141a9ba81fa66ab
                              • Instruction Fuzzy Hash: F701B531600114ABDB149E29D849BFA3BD2EF46321F8441A5F9565B391C731BC9197A0
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • NtdllDialogWndProc_W.NTDLL(?,00000006,00000000,?,?,?,00A91B04,?,?,?,?,?), ref: 00A918E2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: cc66ab1fb29c5d2177e375f5d5872e7a1f678365fbca706c22e4ff5d9b4fc72e
                              • Instruction ID: 9352cc040790a51ca70ee31ce770d1c2506a06bf694e1d023affef60149fede5
                              • Opcode Fuzzy Hash: cc66ab1fb29c5d2177e375f5d5872e7a1f678365fbca706c22e4ff5d9b4fc72e
                              • Instruction Fuzzy Hash: E6F0BE30200216EFDF28DF04C860A763BE2EB04322F508168F9524B2A1CB31EC50EB50
                              APIs
                              • NtdllDialogWndProc_W.NTDLL(?,00000232,?,?), ref: 00B1C8FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 1c4b385bc36361a9a2954bb7a1779e5449b6889c6675efbbb30dde4298cf1974
                              • Instruction ID: edbed56e9a67a6407f2c598efa75d13ce803f38de899084a77035ae7543ae124
                              • Opcode Fuzzy Hash: 1c4b385bc36361a9a2954bb7a1779e5449b6889c6675efbbb30dde4298cf1974
                              • Instruction Fuzzy Hash: 6EF06D31240295BFDB21DF58DC45FD63F95EB19321F548098BA11672E2CBB07820D7A0
                              APIs
                              • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00AF4C4A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: mouse_event
                              • String ID:
                              • API String ID: 2434400541-0
                              • Opcode ID: e41421bb7f629e536bee8a56a18d99ecbf86adb38662f8d246a7b66fd8a026d7
                              • Instruction ID: f23bc9489e40258abe6911229fa417143c2c353eda799cc0a9bd4afad7ff3e8e
                              • Opcode Fuzzy Hash: e41421bb7f629e536bee8a56a18d99ecbf86adb38662f8d246a7b66fd8a026d7
                              • Instruction Fuzzy Hash: 3AD05EA116520E78FC2C07A09E0FF7B0108E308782FD0A18973018A0D2EC855C429030
                              APIs
                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00AE8389), ref: 00AE87D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: LogonUser
                              • String ID:
                              • API String ID: 1244722697-0
                              • Opcode ID: 40cab0286a65f4b0ee8adfb488408b644f9adf0e2ad5cf5275e523db6a0a8d4d
                              • Instruction ID: 030881f080c62d99adb495f5227e84a6c2ff9417ae2bc00839a9057d77fbb759
                              • Opcode Fuzzy Hash: 40cab0286a65f4b0ee8adfb488408b644f9adf0e2ad5cf5275e523db6a0a8d4d
                              • Instruction Fuzzy Hash: 20D09E3226450EABEF019EA4DD05EFE3B69EB04B01F808511FE15D61A1C775D935EB60
                              APIs
                              • NtdllDialogWndProc_W.NTDLL(?,00000053,?,?,?,00ACB9BC,?,?,?,?,?,?), ref: 00B1C934
                                • Part of subcall function 00B1B635: _memset.LIBCMT ref: 00B1B644
                                • Part of subcall function 00B1B635: _memset.LIBCMT ref: 00B1B653
                                • Part of subcall function 00B1B635: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00B56F20,00B56F64), ref: 00B1B682
                                • Part of subcall function 00B1B635: CloseHandle.KERNEL32 ref: 00B1B694
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memset$CloseCreateDialogHandleNtdllProc_Process
                              • String ID:
                              • API String ID: 2364484715-0
                              • Opcode ID: cb2de6e6c8192f58298bd436642cf4596b52263fcb9488fd361969f741f0a02b
                              • Instruction ID: 3caa4b2ff4f969476a325cc7672e0f8b4b733e12bf0905ccc895cd1fca00bd8a
                              • Opcode Fuzzy Hash: cb2de6e6c8192f58298bd436642cf4596b52263fcb9488fd361969f741f0a02b
                              • Instruction Fuzzy Hash: 48E04632100208EFCB02AF44DC51E953BB2FB1C341F818094FA05072B2CB31A9A0EF50
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • NtdllDialogWndProc_W.NTDLL(?,00000007,?,00000000,00000000,?,?,?,00A91AEE,?,?,?), ref: 00A916AB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: a2e97bf8606ff5e2172c208dc3644aada600ad9f397b8315e6b9784fae3ee8bc
                              • Instruction ID: d3e3fd7ce1b2c8ccb4659a77ec5ef6d4a6dae8462637b836819f26f438a8e1d4
                              • Opcode Fuzzy Hash: a2e97bf8606ff5e2172c208dc3644aada600ad9f397b8315e6b9784fae3ee8bc
                              • Instruction Fuzzy Hash: 63E0EC35200208FBCF15AF90DC61F653F66FB58315F508468FA550B2A2CE32A921DB50
                              APIs
                              • NtdllDialogWndProc_W.NTDLL ref: 00B1C8B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 17e75602b859f34333b017f4a2e82337334769d452450aade9619e361d57951c
                              • Instruction ID: 158ae4491a6d0a77cfe7e76b08cc752aacad1b6fb5f7a07af46bc6f96c403ec4
                              • Opcode Fuzzy Hash: 17e75602b859f34333b017f4a2e82337334769d452450aade9619e361d57951c
                              • Instruction Fuzzy Hash: E9E04275240249EFDB01DF88D955ED63BA5AB1D701F418094FA1547262CB71A860EBA1
                              APIs
                              • NtdllDialogWndProc_W.NTDLL ref: 00B1C885
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 82c7aa989db3b71f16f24c58f3e02cb54dc41035f6041c337b45a0bca8849635
                              • Instruction ID: ccdf7fff78a71cfda5706f7c1214a6db7f204fb8bf8772e6cb6c6afe357714a4
                              • Opcode Fuzzy Hash: 82c7aa989db3b71f16f24c58f3e02cb54dc41035f6041c337b45a0bca8849635
                              • Instruction Fuzzy Hash: 81E04275244249EFDB01DF88D895E963BA5AB1D701F414094FA1557262CB71A820EB61
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                                • Part of subcall function 00A9201B: DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00A920D3
                                • Part of subcall function 00A9201B: KillTimer.USER32(-00000001,?,?,?,?,00A916CB,00000000,?,?,00A91AE2,?,?), ref: 00A9216E
                              • NtdllDialogWndProc_W.NTDLL(?,00000002,00000000,00000000,00000000,?,?,00A91AE2,?,?), ref: 00A916D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$DestroyDialogKillLongNtdllProc_Timer
                              • String ID:
                              • API String ID: 2797419724-0
                              • Opcode ID: 70b1959add85bed700c2f2594b982f9074404b1a89b741fb3907d38cad45f646
                              • Instruction ID: 96c2f34b828d6cb2b45ef60d822c2b6ddf51ed76c2db1c6f3d86608a2e9d6df9
                              • Opcode Fuzzy Hash: 70b1959add85bed700c2f2594b982f9074404b1a89b741fb3907d38cad45f646
                              • Instruction Fuzzy Hash: D0D01231240308BBDE202B51DD17F593E59DB18751F90C030BB04291D3CA716C10A658
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00ABA12A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 2bab4f1528e17522c18b6164d927d73c506ada56235e849914017aac18fddb16
                              • Instruction ID: 293fd1a20a23cb9df10f1c71044665f9bc9296a7f78a000cd9460fa4c6c4fe52
                              • Opcode Fuzzy Hash: 2bab4f1528e17522c18b6164d927d73c506ada56235e849914017aac18fddb16
                              • Instruction Fuzzy Hash: 79A0123000010DA78A001B41FC044947F5CE6002907408020F40C41021CB3254108584
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2f8778ff8b67c660ffefef19e5b10bab3af3fe5bc0db0f4da0246fe7879cc544
                              • Instruction ID: 8c91e8b91b1aa6f3da8c4f7f2ae262c6e631e78eb91985b09d1a6e9c5b9fa605
                              • Opcode Fuzzy Hash: 2f8778ff8b67c660ffefef19e5b10bab3af3fe5bc0db0f4da0246fe7879cc544
                              • Instruction Fuzzy Hash: D5225430A04696CBDF389B29D4947BDB7B1FF02388F29806BD9528B5D2DB389D91C741
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction ID: df16c8c731ff4d6972fa003c2088e0e3d35bee0ed09c4a6c09d4476611dcb9e7
                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction Fuzzy Hash: CBC185322050930ADF2D473984741BEBFA99EA27B135A076ED4B3CF1D6EE24C965D720
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction ID: e3e417e40417380f7642b9494ba0390992cf1cdf5fe5fa784dbe551c1ea92b16
                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction Fuzzy Hash: 63C196322151930ADF2D473AC4341BEBFA99EA27B135A076ED4B3DB1D6EE10C925D720
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction ID: 0569474a63626f21eb4d37dbc72165e99e9d570f142c3fa55290308108eb0d28
                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction Fuzzy Hash: E3C1923231519309DF2D473AC4741BEBFA99EA27B139A076DD4B3CB1C6EE20D925D620
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 00B0785B
                              • DeleteObject.GDI32(00000000), ref: 00B0786D
                              • DestroyWindow.USER32 ref: 00B0787B
                              • GetDesktopWindow.USER32 ref: 00B07895
                              • GetWindowRect.USER32(00000000), ref: 00B0789C
                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00B079DD
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00B079ED
                              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B07A35
                              • GetClientRect.USER32(00000000,?), ref: 00B07A41
                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00B07A7B
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B07A9D
                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B07AB0
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B07ABB
                              • GlobalLock.KERNEL32(00000000), ref: 00B07AC4
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B07AD3
                              • GlobalUnlock.KERNEL32(00000000), ref: 00B07ADC
                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B07AE3
                              • GlobalFree.KERNEL32(00000000), ref: 00B07AEE
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,88C00000), ref: 00B07B00
                              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00B22CAC,00000000), ref: 00B07B16
                              • GlobalFree.KERNEL32(00000000), ref: 00B07B26
                              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00B07B4C
                              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00B07B6B
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B07B8D
                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B07D7A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                              • String ID: $AutoIt v3$DISPLAY$static
                              • API String ID: 2211948467-2373415609
                              • Opcode ID: 7118baf7e53fa81273918b9cb42da0df5926871ecbb4e192fe1d7912c647cce5
                              • Instruction ID: 57d5c336596f70e5d4c6349975c15616734666ee6e427fedabd393484c371012
                              • Opcode Fuzzy Hash: 7118baf7e53fa81273918b9cb42da0df5926871ecbb4e192fe1d7912c647cce5
                              • Instruction Fuzzy Hash: FF025171900115EFDB14DFA8DD89EAEBBB9EF48310F548198F915AB2A1CF71AD01CB60
                              APIs
                              • CharUpperBuffW.USER32(?,?,00B1F910), ref: 00B13627
                              • IsWindowVisible.USER32(?), ref: 00B1364B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: BuffCharUpperVisibleWindow
                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                              • API String ID: 4105515805-45149045
                              • Opcode ID: ccceb441cef9a6317556227c234b95a6576d5e2bee3cfafbf524ea2abfb30fc9
                              • Instruction ID: 2ea9662dbaa9e5954ba14a6e51f79b68171709c37d7bf28233b4bcbe53e91dc6
                              • Opcode Fuzzy Hash: ccceb441cef9a6317556227c234b95a6576d5e2bee3cfafbf524ea2abfb30fc9
                              • Instruction Fuzzy Hash: DED17E312143019BCB04EF14C552EAF77E5EF95794F5448ACF8865B2A2EB31EE8ACB41
                              APIs
                              • SetTextColor.GDI32(?,00000000), ref: 00B1A630
                              • GetSysColorBrush.USER32(0000000F), ref: 00B1A661
                              • GetSysColor.USER32(0000000F), ref: 00B1A66D
                              • SetBkColor.GDI32(?,000000FF), ref: 00B1A687
                              • SelectObject.GDI32(?,00000000), ref: 00B1A696
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00B1A6C1
                              • GetSysColor.USER32(00000010), ref: 00B1A6C9
                              • CreateSolidBrush.GDI32(00000000), ref: 00B1A6D0
                              • FrameRect.USER32(?,?,00000000), ref: 00B1A6DF
                              • DeleteObject.GDI32(00000000), ref: 00B1A6E6
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00B1A731
                              • FillRect.USER32(?,?,00000000), ref: 00B1A763
                              • GetWindowLongW.USER32(?,000000F0), ref: 00B1A78E
                                • Part of subcall function 00B1A8CA: GetSysColor.USER32(00000012), ref: 00B1A903
                                • Part of subcall function 00B1A8CA: SetTextColor.GDI32(?,?), ref: 00B1A907
                                • Part of subcall function 00B1A8CA: GetSysColorBrush.USER32(0000000F), ref: 00B1A91D
                                • Part of subcall function 00B1A8CA: GetSysColor.USER32(0000000F), ref: 00B1A928
                                • Part of subcall function 00B1A8CA: GetSysColor.USER32(00000011), ref: 00B1A945
                                • Part of subcall function 00B1A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B1A953
                                • Part of subcall function 00B1A8CA: SelectObject.GDI32(?,00000000), ref: 00B1A964
                                • Part of subcall function 00B1A8CA: SetBkColor.GDI32(?,00000000), ref: 00B1A96D
                                • Part of subcall function 00B1A8CA: SelectObject.GDI32(?,?), ref: 00B1A97A
                                • Part of subcall function 00B1A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 00B1A999
                                • Part of subcall function 00B1A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B1A9B0
                                • Part of subcall function 00B1A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 00B1A9C5
                                • Part of subcall function 00B1A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B1A9ED
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                              • String ID:
                              • API String ID: 3521893082-0
                              • Opcode ID: db54211754253775ccae9c92cedbcc55914e3ef793c9e15f0ae6ccaed5b5d7aa
                              • Instruction ID: 40e426f147441882b407b577fedfa83c29a09010e809f0a2437b67ebdec85470
                              • Opcode Fuzzy Hash: db54211754253775ccae9c92cedbcc55914e3ef793c9e15f0ae6ccaed5b5d7aa
                              • Instruction Fuzzy Hash: 68916D71409302FFC7109F64DC48AAB7BEAFB49321F904A29F966971E1DB31E944CB52
                              APIs
                              • DestroyWindow.USER32(00000000), ref: 00B074DE
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00B0759D
                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00B075DB
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00B075ED
                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00B07633
                              • GetClientRect.USER32(00000000,?), ref: 00B0763F
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00B07683
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00B07692
                              • GetStockObject.GDI32(00000011), ref: 00B076A2
                              • SelectObject.GDI32(00000000,00000000), ref: 00B076A6
                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00B076B6
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B076BF
                              • DeleteDC.GDI32(00000000), ref: 00B076C8
                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00B076F4
                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00B0770B
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00B07746
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00B0775A
                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00B0776B
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00B0779B
                              • GetStockObject.GDI32(00000011), ref: 00B077A6
                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00B077B1
                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00B077BB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 2910397461-517079104
                              • Opcode ID: 905d1e95592ac9f142fa2acbae92efb4cf1824932bf940fcc5eb5c86a882f940
                              • Instruction ID: 556f9e866d97a1807b1cf8db26b09f4812943ff6343c317f072206d4fb2350a3
                              • Opcode Fuzzy Hash: 905d1e95592ac9f142fa2acbae92efb4cf1824932bf940fcc5eb5c86a882f940
                              • Instruction Fuzzy Hash: 10A15071A40619BFEB14DBA4DD4AFEEBBB9EB04711F008154FA15A72E0DB71AD40CB60
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00AFAD1E
                              • GetDriveTypeW.KERNEL32(?,00B1FAC0,?,\\.\,00B1F910), ref: 00AFADFB
                              • SetErrorMode.KERNEL32(00000000,00B1FAC0,?,\\.\,00B1F910), ref: 00AFAF59
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                              • API String ID: 2907320926-4222207086
                              • Opcode ID: 22f6aa8994a273ae985c26ac84f116fe69c95aef85025d16b3b3340e8ad2bc5d
                              • Instruction ID: 17472423aa20495d7a1e0a46c8f9c1553ca4bad141b620529a9122c8c1092355
                              • Opcode Fuzzy Hash: 22f6aa8994a273ae985c26ac84f116fe69c95aef85025d16b3b3340e8ad2bc5d
                              • Instruction Fuzzy Hash: F55166F074420DAB8B10DB94C942DFD73F1EB687107208496F60FAB2A1DA719E41EB63
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                              • API String ID: 1038674560-86951937
                              • Opcode ID: 81c6eca89ea654b821c7f07b0dc60af9e1c057e4f7c4616f03a725929c4a513d
                              • Instruction ID: cbb58f3ea0d4d2db79a798c4a7a78e0491e7c8e00a5a3dfba8473261067611e8
                              • Opcode Fuzzy Hash: 81c6eca89ea654b821c7f07b0dc60af9e1c057e4f7c4616f03a725929c4a513d
                              • Instruction Fuzzy Hash: 9F81E2B1740205AADF21EB60EE43FFF37E8AF15740F444029F905AA192EF61DA85D6A1
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00B19AD2
                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00B19B8B
                              • SendMessageW.USER32(?,00001102,00000002,?), ref: 00B19BA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: 0
                              • API String ID: 2326795674-4108050209
                              • Opcode ID: 1fdb52387b1de6eec4ccf328406cee6f29c4098c4293010d66ec3e9507c1c786
                              • Instruction ID: a5ba744df8f969ee0a99d5c563fa3f26141a3d2ca392cba9bbbeceb637c8cdd8
                              • Opcode Fuzzy Hash: 1fdb52387b1de6eec4ccf328406cee6f29c4098c4293010d66ec3e9507c1c786
                              • Instruction Fuzzy Hash: A702BD31104381AFD725CF24C8A8BEABBE5FF49310F8485ADF995972A1C734D985CB92
                              APIs
                              • GetSysColor.USER32(00000012), ref: 00B1A903
                              • SetTextColor.GDI32(?,?), ref: 00B1A907
                              • GetSysColorBrush.USER32(0000000F), ref: 00B1A91D
                              • GetSysColor.USER32(0000000F), ref: 00B1A928
                              • CreateSolidBrush.GDI32(?), ref: 00B1A92D
                              • GetSysColor.USER32(00000011), ref: 00B1A945
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B1A953
                              • SelectObject.GDI32(?,00000000), ref: 00B1A964
                              • SetBkColor.GDI32(?,00000000), ref: 00B1A96D
                              • SelectObject.GDI32(?,?), ref: 00B1A97A
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00B1A999
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B1A9B0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00B1A9C5
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B1A9ED
                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B1AA14
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00B1AA32
                              • DrawFocusRect.USER32(?,?), ref: 00B1AA3D
                              • GetSysColor.USER32(00000011), ref: 00B1AA4B
                              • SetTextColor.GDI32(?,00000000), ref: 00B1AA53
                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00B1AA67
                              • SelectObject.GDI32(?,00B1A5FA), ref: 00B1AA7E
                              • DeleteObject.GDI32(?), ref: 00B1AA89
                              • SelectObject.GDI32(?,?), ref: 00B1AA8F
                              • DeleteObject.GDI32(?), ref: 00B1AA94
                              • SetTextColor.GDI32(?,?), ref: 00B1AA9A
                              • SetBkColor.GDI32(?,?), ref: 00B1AAA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                              • String ID:
                              • API String ID: 1996641542-0
                              • Opcode ID: a2ce117ef68bdcb9e04a045f136de18b396a212f530c686dfa0a8f63f549ec9e
                              • Instruction ID: 196018a270ad1bb309ef9fb387000ee1e904fe894c5b825c994cbed211713fd5
                              • Opcode Fuzzy Hash: a2ce117ef68bdcb9e04a045f136de18b396a212f530c686dfa0a8f63f549ec9e
                              • Instruction Fuzzy Hash: 1B513E71901209FFDB119FA4DC48EEE7BB9EF08320F518265F915AB2A1DB719940DF50
                              APIs
                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B18AC1
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B18AD2
                              • CharNextW.USER32(0000014E), ref: 00B18B01
                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B18B42
                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B18B58
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B18B69
                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00B18B86
                              • SetWindowTextW.USER32(?,0000014E), ref: 00B18BD8
                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00B18BEE
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B18C1F
                              • _memset.LIBCMT ref: 00B18C44
                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00B18C8D
                              • _memset.LIBCMT ref: 00B18CEC
                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00B18D16
                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B18D6E
                              • SendMessageW.USER32(?,0000133D,?,?), ref: 00B18E1B
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00B18E3D
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B18E87
                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B18EB4
                              • DrawMenuBar.USER32(?), ref: 00B18EC3
                              • SetWindowTextW.USER32(?,0000014E), ref: 00B18EEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                              • String ID: 0
                              • API String ID: 1073566785-4108050209
                              • Opcode ID: 67b7424dae8ba841f85d8294eeec34722bd4fd54efae3de21b867055e6fc6546
                              • Instruction ID: 896883dd15150895b45c09ea215c825f819f10d98e0b27f233405a796dc90558
                              • Opcode Fuzzy Hash: 67b7424dae8ba841f85d8294eeec34722bd4fd54efae3de21b867055e6fc6546
                              • Instruction Fuzzy Hash: 7FE15D71900209ABDB20DF60DC84EEE7BB9FF09710F90819AF915AB291DF709985DF60
                              APIs
                              • GetCursorPos.USER32(?), ref: 00B149CA
                              • GetDesktopWindow.USER32 ref: 00B149DF
                              • GetWindowRect.USER32(00000000), ref: 00B149E6
                              • GetWindowLongW.USER32(?,000000F0), ref: 00B14A48
                              • DestroyWindow.USER32(?), ref: 00B14A74
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B14A9D
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B14ABB
                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00B14AE1
                              • SendMessageW.USER32(?,00000421,?,?), ref: 00B14AF6
                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00B14B09
                              • IsWindowVisible.USER32(?), ref: 00B14B29
                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00B14B44
                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00B14B58
                              • GetWindowRect.USER32(?,?), ref: 00B14B70
                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00B14B96
                              • GetMonitorInfoW.USER32(00000000,?), ref: 00B14BB0
                              • CopyRect.USER32(?,?), ref: 00B14BC7
                              • SendMessageW.USER32(?,00000412,00000000), ref: 00B14C32
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                              • String ID: ($0$tooltips_class32
                              • API String ID: 698492251-4156429822
                              • Opcode ID: 2c630e0e40d092c6328277d031f48e0ce1f0a7b0ab6899b5f49f85855991dc3f
                              • Instruction ID: 9598dfd33aab9b7afaeee06aedfcd2f597553eeeab673e58785b45350aa52535
                              • Opcode Fuzzy Hash: 2c630e0e40d092c6328277d031f48e0ce1f0a7b0ab6899b5f49f85855991dc3f
                              • Instruction Fuzzy Hash: ECB18970608341AFDB04DF68C985BABBBE4FF88310F40895CF5999B2A1DB71E845CB95
                              APIs
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00A928BC
                              • GetSystemMetrics.USER32(00000007), ref: 00A928C4
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00A928EF
                              • GetSystemMetrics.USER32(00000008), ref: 00A928F7
                              • GetSystemMetrics.USER32(00000004), ref: 00A9291C
                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00A92939
                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00A92949
                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00A9297C
                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00A92990
                              • GetClientRect.USER32(00000000,000000FF), ref: 00A929AE
                              • GetStockObject.GDI32(00000011), ref: 00A929CA
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00A929D5
                                • Part of subcall function 00A92344: GetCursorPos.USER32(?), ref: 00A92357
                                • Part of subcall function 00A92344: ScreenToClient.USER32(00B557B0,?), ref: 00A92374
                                • Part of subcall function 00A92344: GetAsyncKeyState.USER32(00000001), ref: 00A92399
                                • Part of subcall function 00A92344: GetAsyncKeyState.USER32(00000002), ref: 00A923A7
                              • SetTimer.USER32(00000000,00000000,00000028,00A91256), ref: 00A929FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                              • String ID: AutoIt v3 GUI
                              • API String ID: 1458621304-248962490
                              • Opcode ID: 5797ec7aaafbf7f01d2efe2ad0286c5d8697be5ffe7a10f3551a3dc2b5b45c6f
                              • Instruction ID: 567588e8672662e253c12ba207a6cf56030f22d7be0014c67bb35ff0da640111
                              • Opcode Fuzzy Hash: 5797ec7aaafbf7f01d2efe2ad0286c5d8697be5ffe7a10f3551a3dc2b5b45c6f
                              • Instruction Fuzzy Hash: 28B12B71A0020AEFDF14DFA8DD55BEE7BB5FB08311F518269FA15A72A0DB74A840CB50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _wcscat$C1560_wcscmp_wcscpy_wcsncpy_wcsstr
                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                              • API String ID: 2258151342-1459072770
                              • Opcode ID: 8414327c71c92ef82905e1271dd1653e4034223b7528304e3982f47eb707ab5e
                              • Instruction ID: 04db8f8d4abf8d9abdc8b4e4e6b30e0b94c0b7e41cd6912aae10bf3965104872
                              • Opcode Fuzzy Hash: 8414327c71c92ef82905e1271dd1653e4034223b7528304e3982f47eb707ab5e
                              • Instruction Fuzzy Hash: CD41C032A402057BEB10BBB48D46EFF77BCDF46710F44016AFA05E6193EA35AA0196A5
                              APIs
                              • GetClassNameW.USER32(?,?,00000100), ref: 00AEA47A
                              • __swprintf.LIBCMT ref: 00AEA51B
                              • _wcscmp.LIBCMT ref: 00AEA52E
                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00AEA583
                              • _wcscmp.LIBCMT ref: 00AEA5BF
                              • GetClassNameW.USER32(?,?,00000400), ref: 00AEA5F6
                              • GetDlgCtrlID.USER32(?), ref: 00AEA648
                              • GetWindowRect.USER32(?,?), ref: 00AEA67E
                              • GetParent.USER32(?), ref: 00AEA69C
                              • ScreenToClient.USER32(00000000), ref: 00AEA6A3
                              • GetClassNameW.USER32(?,?,00000100), ref: 00AEA71D
                              • _wcscmp.LIBCMT ref: 00AEA731
                              • GetWindowTextW.USER32(?,?,00000400), ref: 00AEA757
                              • _wcscmp.LIBCMT ref: 00AEA76B
                                • Part of subcall function 00AB362C: _iswctype.LIBCMT ref: 00AB3634
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                              • String ID: %s%u
                              • API String ID: 3744389584-679674701
                              • Opcode ID: b6c4e1771f228cb14f9ff94c83ff9975ab55401e6587d7172cefadde0d3af59e
                              • Instruction ID: e925ee5903ecf5a9926a1dc973de9a5f15fba04563a7e595572ee4df1991bf78
                              • Opcode Fuzzy Hash: b6c4e1771f228cb14f9ff94c83ff9975ab55401e6587d7172cefadde0d3af59e
                              • Instruction Fuzzy Hash: 1FA1CF71204346AFDB14DF65C884BEAB7E8FF64314F008629F999D2190DB30F945CBA2
                              APIs
                              • GetClassNameW.USER32(00000008,?,00000400), ref: 00AEAF18
                              • _wcscmp.LIBCMT ref: 00AEAF29
                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 00AEAF51
                              • CharUpperBuffW.USER32(?,00000000), ref: 00AEAF6E
                              • _wcscmp.LIBCMT ref: 00AEAF8C
                              • _wcsstr.LIBCMT ref: 00AEAF9D
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00AEAFD5
                              • _wcscmp.LIBCMT ref: 00AEAFE5
                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 00AEB00C
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00AEB055
                              • _wcscmp.LIBCMT ref: 00AEB065
                              • GetClassNameW.USER32(00000010,?,00000400), ref: 00AEB08D
                              • GetWindowRect.USER32(00000004,?), ref: 00AEB0F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                              • String ID: @$ThumbnailClass
                              • API String ID: 1788623398-1539354611
                              • Opcode ID: f7b17f9ef7b2c5ddb11c83f21c899213b0fe1c24cd0c10085b48bd42ad3c896a
                              • Instruction ID: 98a0328cf3a474ed86d1b3e443fcd38f975679999f66db1447f5d5ffd1dfb244
                              • Opcode Fuzzy Hash: f7b17f9ef7b2c5ddb11c83f21c899213b0fe1c24cd0c10085b48bd42ad3c896a
                              • Instruction Fuzzy Hash: 0581CF711183869FDB01DF12C985BBB7BE8EF54314F048569FD858A0A6DB30ED49CBA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                              • API String ID: 1038674560-1810252412
                              • Opcode ID: 27efca6e77937728b86591985e9a7b827a1808ecf0001e21a3d3c0b38e20a717
                              • Instruction ID: 5ac153d9085c3b882f0bf0df03d90f6dfd45a613af8d4f25caa595bb478a96bb
                              • Opcode Fuzzy Hash: 27efca6e77937728b86591985e9a7b827a1808ecf0001e21a3d3c0b38e20a717
                              • Instruction Fuzzy Hash: 98316231A88249AADE14EBA5DF43EFE77E4AF20710F600469F442710E2EF516F04D652
                              APIs
                              • LoadCursorW.USER32(00000000,00007F8A), ref: 00B05013
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00B0501E
                              • LoadCursorW.USER32(00000000,00007F03), ref: 00B05029
                              • LoadCursorW.USER32(00000000,00007F8B), ref: 00B05034
                              • LoadCursorW.USER32(00000000,00007F01), ref: 00B0503F
                              • LoadCursorW.USER32(00000000,00007F81), ref: 00B0504A
                              • LoadCursorW.USER32(00000000,00007F88), ref: 00B05055
                              • LoadCursorW.USER32(00000000,00007F80), ref: 00B05060
                              • LoadCursorW.USER32(00000000,00007F86), ref: 00B0506B
                              • LoadCursorW.USER32(00000000,00007F83), ref: 00B05076
                              • LoadCursorW.USER32(00000000,00007F85), ref: 00B05081
                              • LoadCursorW.USER32(00000000,00007F82), ref: 00B0508C
                              • LoadCursorW.USER32(00000000,00007F84), ref: 00B05097
                              • LoadCursorW.USER32(00000000,00007F04), ref: 00B050A2
                              • LoadCursorW.USER32(00000000,00007F02), ref: 00B050AD
                              • LoadCursorW.USER32(00000000,00007F89), ref: 00B050B8
                              • GetCursorInfo.USER32(?), ref: 00B050C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Cursor$Load$Info
                              • String ID:
                              • API String ID: 2577412497-0
                              • Opcode ID: 76a1cd187b9584a0113161b03e950fc74bfcb0b9fe0a0bce30ad1cc07bb97586
                              • Instruction ID: 38c3b8d2bf494184fba4a3cf71e839984012570ebf91e4d97463b3a13fa5c050
                              • Opcode Fuzzy Hash: 76a1cd187b9584a0113161b03e950fc74bfcb0b9fe0a0bce30ad1cc07bb97586
                              • Instruction Fuzzy Hash: A131E5B1D4831A6ADF209FB68C899AFBFE8FF04750F50456AA50DE7280DA786500CF95
                              APIs
                              • _memset.LIBCMT ref: 00B1A259
                              • DestroyWindow.USER32(?,?), ref: 00B1A2D3
                                • Part of subcall function 00A97BCC: _memmove.LIBCMT ref: 00A97C06
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B1A34D
                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B1A36F
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B1A382
                              • DestroyWindow.USER32(00000000), ref: 00B1A3A4
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00A90000,00000000), ref: 00B1A3DB
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B1A3F4
                              • GetDesktopWindow.USER32 ref: 00B1A40D
                              • GetWindowRect.USER32(00000000), ref: 00B1A414
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B1A42C
                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B1A444
                                • Part of subcall function 00A925DB: GetWindowLongW.USER32(?,000000EB), ref: 00A925EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                              • String ID: 0$tooltips_class32
                              • API String ID: 1297703922-3619404913
                              • Opcode ID: ff9d502c432f823ad04e8288eae815c00b23fc540f0671e41584a01545a118c1
                              • Instruction ID: 58e99991b2b012d1385b8fb97f58944388de4ab262a20e6ea161477b9319f806
                              • Opcode Fuzzy Hash: ff9d502c432f823ad04e8288eae815c00b23fc540f0671e41584a01545a118c1
                              • Instruction Fuzzy Hash: 2C718B71140305AFD721CF28CC59FAA7BE9FB88700F8445ADF985872A0DB70E946CB62
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 00B14424
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B1446F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: BuffCharMessageSendUpper
                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                              • API String ID: 3974292440-4258414348
                              • Opcode ID: 93b3d6edb7aa725d04b308afb945501c249ddeb5b33c0f80b5ec6d6e4cbd4a8b
                              • Instruction ID: 3239366cd09fdd9351faca7cad6395f10d32ac9f8d96c3c2c0187ad500b194f8
                              • Opcode Fuzzy Hash: 93b3d6edb7aa725d04b308afb945501c249ddeb5b33c0f80b5ec6d6e4cbd4a8b
                              • Instruction Fuzzy Hash: B2916F712043019FCB04EF14C551AAFB7E5AF95394F5488ACF8965B3A2DB30ED49CB81
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00B1B8B4
                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00B191C2), ref: 00B1B910
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B1B949
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00B1B98C
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B1B9C3
                              • FreeLibrary.KERNEL32(?), ref: 00B1B9CF
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B1B9DF
                              • DestroyCursor.USER32(?), ref: 00B1B9EE
                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00B1BA0B
                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00B1BA17
                                • Part of subcall function 00AB2EFD: __wcsicmp_l.LIBCMT ref: 00AB2F86
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Load$Image$LibraryMessageSend$CursorDestroyExtractFreeIcon__wcsicmp_l
                              • String ID: .dll$.exe$.icl
                              • API String ID: 3907162815-1154884017
                              • Opcode ID: 40c30d1aa86923b0fc71cdcf63dbd0fd805941bb7960479d075e236d7bf3f263
                              • Instruction ID: cd52d61afe0d5a228c351a309a222cfa14aff613166beb1afe8a4ada5118e152
                              • Opcode Fuzzy Hash: 40c30d1aa86923b0fc71cdcf63dbd0fd805941bb7960479d075e236d7bf3f263
                              • Instruction Fuzzy Hash: 4161FE71A00209BAEB14DF64CD42FFE7BACEB08B10F50825AF911D61D1DB749A81DBA0
                              APIs
                                • Part of subcall function 00A99837: __itow.LIBCMT ref: 00A99862
                                • Part of subcall function 00A99837: __swprintf.LIBCMT ref: 00A998AC
                              • CharLowerBuffW.USER32(?,?), ref: 00AFA3CB
                              • GetDriveTypeW.KERNEL32 ref: 00AFA418
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AFA460
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AFA497
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AFA4C5
                                • Part of subcall function 00A97BCC: _memmove.LIBCMT ref: 00A97C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                              • API String ID: 2698844021-4113822522
                              • Opcode ID: 3f8c883815b7f616ac1c11f12f63edc22eeac6d997c56d5e0c018ac8c62fb338
                              • Instruction ID: 3f95a3b320e4df0737ca0040483b15eb7f11f8d3cb162dc7546f26167075d9af
                              • Opcode Fuzzy Hash: 3f8c883815b7f616ac1c11f12f63edc22eeac6d997c56d5e0c018ac8c62fb338
                              • Instruction Fuzzy Hash: E3514B712142059FCB00EF24C9919AFB3E8FF94758F10886DF89A57261DB71AE09CB52
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00ACE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00AEF8DF
                              • LoadStringW.USER32(00000000,?,00ACE029,00000001), ref: 00AEF8E8
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                              • GetModuleHandleW.KERNEL32(00000000,00B55310,?,00000FFF,?,?,00ACE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00AEF90A
                              • LoadStringW.USER32(00000000,?,00ACE029,00000001), ref: 00AEF90D
                              • __swprintf.LIBCMT ref: 00AEF95D
                              • __swprintf.LIBCMT ref: 00AEF96E
                              • _wprintf.LIBCMT ref: 00AEFA17
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00AEFA2E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                              • API String ID: 984253442-2268648507
                              • Opcode ID: a1b0f4faeacd74f9f8dbdaf226b7339f78d942447a3e7392c374cd9090035e60
                              • Instruction ID: eee7fad5b03a80ba40d0ed4a0692c4a38f6faa75fe8a09cfbd927ad5f80199f4
                              • Opcode Fuzzy Hash: a1b0f4faeacd74f9f8dbdaf226b7339f78d942447a3e7392c374cd9090035e60
                              • Instruction Fuzzy Hash: 5A412D72A04109AACF15FBE0DE46EEEB7B8EF18340F500065B506760A2EA316F49CB61
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00B19207,?,?), ref: 00B1BA56
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00B19207,?,?,00000000,?), ref: 00B1BA6D
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00B19207,?,?,00000000,?), ref: 00B1BA78
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00B19207,?,?,00000000,?), ref: 00B1BA85
                              • GlobalLock.KERNEL32(00000000), ref: 00B1BA8E
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00B19207,?,?,00000000,?), ref: 00B1BA9D
                              • GlobalUnlock.KERNEL32(00000000), ref: 00B1BAA6
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00B19207,?,?,00000000,?), ref: 00B1BAAD
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00B1BABE
                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00B22CAC,?), ref: 00B1BAD7
                              • GlobalFree.KERNEL32(00000000), ref: 00B1BAE7
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00B1BB0B
                              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00B1BB36
                              • DeleteObject.GDI32(00000000), ref: 00B1BB5E
                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00B1BB74
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                              • String ID:
                              • API String ID: 3840717409-0
                              • Opcode ID: 74ae10738e16982d04af51f22acb462c3f28b73945b7a8e0c5daa1e49ffbe2d1
                              • Instruction ID: 5a0cecd27c0eb484b0b48d049fb45066aad6fd137fa776946a35ddd4a8a61de8
                              • Opcode Fuzzy Hash: 74ae10738e16982d04af51f22acb462c3f28b73945b7a8e0c5daa1e49ffbe2d1
                              • Instruction Fuzzy Hash: 3C41F675600209AFDB119F65DC88EEBBBB9EF89711F5080A8F909D7260DB709A41CB60
                              APIs
                              • __wsplitpath.LIBCMT ref: 00AFDA10
                              • _wcscat.LIBCMT ref: 00AFDA28
                              • _wcscat.LIBCMT ref: 00AFDA3A
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AFDA4F
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00AFDA63
                              • GetFileAttributesW.KERNEL32(?), ref: 00AFDA7B
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00AFDA95
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00AFDAA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                              • String ID: *.*
                              • API String ID: 34673085-438819550
                              • Opcode ID: d235f5b909ad13f850172b99f9c7de5f5952fc64a4d7cf65a1a2bfbd9e65a38c
                              • Instruction ID: 896771a81e982c40b528d3c3de6c603b37e265162c86271a28f953fdb4404550
                              • Opcode Fuzzy Hash: d235f5b909ad13f850172b99f9c7de5f5952fc64a4d7cf65a1a2bfbd9e65a38c
                              • Instruction Fuzzy Hash: 7F81B4726043099FCB21EFE4C884ABAB7E9BF89350F14882EF589D7211E670D944CB52
                              APIs
                              • GetDC.USER32(00000000), ref: 00B0738F
                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00B0739B
                              • CreateCompatibleDC.GDI32(?), ref: 00B073A7
                              • SelectObject.GDI32(00000000,?), ref: 00B073B4
                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00B07408
                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00B07444
                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00B07468
                              • SelectObject.GDI32(00000006,?), ref: 00B07470
                              • DeleteObject.GDI32(?), ref: 00B07479
                              • DeleteDC.GDI32(00000006), ref: 00B07480
                              • ReleaseDC.USER32(00000000,?), ref: 00B0748B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                              • String ID: (
                              • API String ID: 2598888154-3887548279
                              • Opcode ID: 39fd28994df89920a82d7ae16d052c46ad490479e3c434dd9981c5c01ca3708b
                              • Instruction ID: 13f622c434c47cafe520e731301b2d10310220ad95261e62510025358aace888
                              • Opcode Fuzzy Hash: 39fd28994df89920a82d7ae16d052c46ad490479e3c434dd9981c5c01ca3708b
                              • Instruction Fuzzy Hash: 52514871904209EFDB14CFA8DC89EAEBBF9EF48310F14846DF95A97251CB31A941CB50
                              APIs
                                • Part of subcall function 00AB0957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00A96B0C,?,00008000), ref: 00AB0973
                                • Part of subcall function 00A94750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A94743,?,?,00A937AE,?), ref: 00A94770
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00A96BAD
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00A96CFA
                                • Part of subcall function 00A9586D: _wcscpy.LIBCMT ref: 00A958A5
                                • Part of subcall function 00AB363D: _iswctype.LIBCMT ref: 00AB3645
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                              • API String ID: 537147316-1018226102
                              • Opcode ID: 0d2062af5cb2bf09e02a3885a976df2b0ab6b785d1d69f8012c9ff6af236b259
                              • Instruction ID: 2e4bbb7d02019d91a852b5fca1b410be318b47f25fa9fe17539a2861dcb407d8
                              • Opcode Fuzzy Hash: 0d2062af5cb2bf09e02a3885a976df2b0ab6b785d1d69f8012c9ff6af236b259
                              • Instruction Fuzzy Hash: 1C028C316083419FCB25EF24C981EAFBBE5EF99314F10491DF499972A2DB30DA49CB52
                              APIs
                              • _memset.LIBCMT ref: 00AF2D50
                              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00AF2DDD
                              • GetMenuItemCount.USER32(00B55890), ref: 00AF2E66
                              • DeleteMenu.USER32(00B55890,00000005,00000000,000000F5,?,?), ref: 00AF2EF6
                              • DeleteMenu.USER32(00B55890,00000004,00000000), ref: 00AF2EFE
                              • DeleteMenu.USER32(00B55890,00000006,00000000), ref: 00AF2F06
                              • DeleteMenu.USER32(00B55890,00000003,00000000), ref: 00AF2F0E
                              • GetMenuItemCount.USER32(00B55890), ref: 00AF2F16
                              • SetMenuItemInfoW.USER32(00B55890,00000004,00000000,00000030), ref: 00AF2F4C
                              • GetCursorPos.USER32(?), ref: 00AF2F56
                              • SetForegroundWindow.USER32(00000000), ref: 00AF2F5F
                              • TrackPopupMenuEx.USER32(00B55890,00000000,?,00000000,00000000,00000000), ref: 00AF2F72
                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00AF2F7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                              • String ID:
                              • API String ID: 3993528054-0
                              • Opcode ID: ad103da02eb9945bd3fc7582a950339c16343900d88d8f03d96228243d5559c1
                              • Instruction ID: 5e550c84351afce230aab8d31fc4431d0e055b3da5896959030cc5956944c025
                              • Opcode Fuzzy Hash: ad103da02eb9945bd3fc7582a950339c16343900d88d8f03d96228243d5559c1
                              • Instruction Fuzzy Hash: C271C27060020ABAEB219F94DC45FFABF65FB04364F244226F719AA1E1CB715820DB94
                              APIs
                                • Part of subcall function 00A97BCC: _memmove.LIBCMT ref: 00A97C06
                              • _memset.LIBCMT ref: 00AE786B
                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00AE78A0
                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00AE78BC
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00AE78D8
                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00AE7902
                              • CLSIDFromString.COMBASE(?,?), ref: 00AE792A
                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00AE7935
                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00AE793A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                              • API String ID: 1411258926-22481851
                              • Opcode ID: 67122529aff5d82dcdcc9088ae52d00ecfb8ac229da13883e4925cf2e9360a1c
                              • Instruction ID: 1d17f250b04620dba36cca2230a6b5e40d79d7b37e20874d9dfe12f81c0c1545
                              • Opcode Fuzzy Hash: 67122529aff5d82dcdcc9088ae52d00ecfb8ac229da13883e4925cf2e9360a1c
                              • Instruction Fuzzy Hash: 3A41F772D14229ABDF15EFA4DD85DEDB7B8FF18710F444069E905A3261EB309E04CBA0
                              APIs
                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B0FDAD,?,?), ref: 00B10E31
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                              • API String ID: 3964851224-909552448
                              • Opcode ID: 9f6f470af181b86fef407fc83f0be99e80a7761f1042eb5842d68d16f4a07deb
                              • Instruction ID: be43a269366e081d799c2f9f67eb159b2305fdc22edc6f93eea843b4fce8572e
                              • Opcode Fuzzy Hash: 9f6f470af181b86fef407fc83f0be99e80a7761f1042eb5842d68d16f4a07deb
                              • Instruction Fuzzy Hash: 8C414E3212424A8BDF20FF10D956AEF37A4FF11350FA444A9FC5517292DB70999AC760
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00ACE2A0,00000010,?,Bad directive syntax error,00B1F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00AEF7C2
                              • LoadStringW.USER32(00000000,?,00ACE2A0,00000010), ref: 00AEF7C9
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                              • _wprintf.LIBCMT ref: 00AEF7FC
                              • __swprintf.LIBCMT ref: 00AEF81E
                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00AEF88D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                              • API String ID: 1506413516-4153970271
                              • Opcode ID: cf21ab7031142c3f77a177f84c2d7e32fb593a99aef8a2debcb4ce8288b5e2fe
                              • Instruction ID: 99e40cb57d42d9f95f3b98e98b6f889a591d87dd0223959896a2aaa90d727536
                              • Opcode Fuzzy Hash: cf21ab7031142c3f77a177f84c2d7e32fb593a99aef8a2debcb4ce8288b5e2fe
                              • Instruction Fuzzy Hash: F3215332A1021AEFCF11EFA0CD5AEFE77B9FF18300F044465F515660A2EA71A618DB51
                              APIs
                                • Part of subcall function 00A97BCC: _memmove.LIBCMT ref: 00A97C06
                                • Part of subcall function 00A97924: _memmove.LIBCMT ref: 00A979AD
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00AF5330
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00AF5346
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AF5357
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00AF5369
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00AF537A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: SendString$_memmove
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 2279737902-1007645807
                              • Opcode ID: 3e0214cca8ba7861c8944a3b5ca3960809ee9580b53f08805e4d516584d2b204
                              • Instruction ID: b747e1feb6b4aae2beff835ba319eef538714472bfa3547753a94fe970083d6b
                              • Opcode Fuzzy Hash: 3e0214cca8ba7861c8944a3b5ca3960809ee9580b53f08805e4d516584d2b204
                              • Instruction Fuzzy Hash: C0116021EA412D79DB64B7B5DC5ADFF7AFCEB91B80F400469B505A60E1EEA00E04C5B1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                              • String ID: 0.0.0.0
                              • API String ID: 208665112-3771769585
                              • Opcode ID: 4da74996531c98596d85eb5146b12bfb628871e8bb6e5a234726642c5df749c2
                              • Instruction ID: 8afe7423596a26f9daf10afd6519186cc317492f19c10247246a3f1eeaebaef3
                              • Opcode Fuzzy Hash: 4da74996531c98596d85eb5146b12bfb628871e8bb6e5a234726642c5df749c2
                              • Instruction Fuzzy Hash: E911C031904119AFDB20BBB49C4AEFB77BCEB06721F4441B6F645960A2EF719A81CA50
                              APIs
                              • timeGetTime.WINMM ref: 00AF4F7A
                                • Part of subcall function 00AB049F: timeGetTime.WINMM(?,7694B400,00AA0E7B), ref: 00AB04A3
                              • Sleep.KERNEL32(0000000A), ref: 00AF4FA6
                              • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00AF4FCA
                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00AF4FEC
                              • SetActiveWindow.USER32 ref: 00AF500B
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00AF5019
                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00AF5038
                              • Sleep.KERNEL32(000000FA), ref: 00AF5043
                              • IsWindow.USER32 ref: 00AF504F
                              • EndDialog.USER32(00000000), ref: 00AF5060
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                              • String ID: BUTTON
                              • API String ID: 1194449130-3405671355
                              • Opcode ID: fc20641e08589676639b3b102231e1b46747659916424a421aac7812e02dcdcb
                              • Instruction ID: 124ae0fec222fccc70a502338d78048629d6c1b67305c51a78f4ef448d191a4b
                              • Opcode Fuzzy Hash: fc20641e08589676639b3b102231e1b46747659916424a421aac7812e02dcdcb
                              • Instruction Fuzzy Hash: 3A21987064070AAFEB219FB0EC98B763B69EB28746B845028B305831B1EF318D10CB61
                              APIs
                                • Part of subcall function 00A99837: __itow.LIBCMT ref: 00A99862
                                • Part of subcall function 00A99837: __swprintf.LIBCMT ref: 00A998AC
                              • CoInitialize.OLE32(00000000), ref: 00AFD5EA
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00AFD67D
                              • SHGetDesktopFolder.SHELL32(?), ref: 00AFD691
                              • CoCreateInstance.COMBASE(00B22D7C,00000000,00000001,00B48C1C,?), ref: 00AFD6DD
                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00AFD74C
                              • CoTaskMemFree.COMBASE(?), ref: 00AFD7A4
                              • _memset.LIBCMT ref: 00AFD7E1
                              • SHBrowseForFolderW.SHELL32(?), ref: 00AFD81D
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00AFD840
                              • CoTaskMemFree.COMBASE(00000000), ref: 00AFD847
                              • CoTaskMemFree.COMBASE(00000000), ref: 00AFD87E
                              • CoUninitialize.COMBASE ref: 00AFD880
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                              • String ID:
                              • API String ID: 1246142700-0
                              • Opcode ID: 386666e935cf8b84b92c14f48e11be8bd7a89c1d3a9cd07f8152525695fe2299
                              • Instruction ID: 81116e384e22997e9eeec845dc59dd2054fae1da34f4c3a5c8e69733dd0402d2
                              • Opcode Fuzzy Hash: 386666e935cf8b84b92c14f48e11be8bd7a89c1d3a9cd07f8152525695fe2299
                              • Instruction Fuzzy Hash: 35B1EA75A00109AFDB05DFA9C985DAEBBF9FF48314B1484A9F909EB261DB30ED41CB50
                              APIs
                              • GetDlgItem.USER32(?,00000001), ref: 00AEC283
                              • GetWindowRect.USER32(00000000,?), ref: 00AEC295
                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00AEC2F3
                              • GetDlgItem.USER32(?,00000002), ref: 00AEC2FE
                              • GetWindowRect.USER32(00000000,?), ref: 00AEC310
                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00AEC364
                              • GetDlgItem.USER32(?,000003E9), ref: 00AEC372
                              • GetWindowRect.USER32(00000000,?), ref: 00AEC383
                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00AEC3C6
                              • GetDlgItem.USER32(?,000003EA), ref: 00AEC3D4
                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00AEC3F1
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00AEC3FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$ItemMoveRect$Invalidate
                              • String ID:
                              • API String ID: 3096461208-0
                              • Opcode ID: bf7467e7d2aec599f2f6a3b4f7ec1d99f2f71693af25827dc29f3f1edd8062e4
                              • Instruction ID: 68d6c16da1295d0d5514e0faae3c6acbfb26598006d3dbc5d2299fdafdfde8b1
                              • Opcode Fuzzy Hash: bf7467e7d2aec599f2f6a3b4f7ec1d99f2f71693af25827dc29f3f1edd8062e4
                              • Instruction Fuzzy Hash: D4512E71B00206AFDB18CFA9DD99AAEBBBAFB88711F54812DF515D7290DB709D01CB10
                              APIs
                                • Part of subcall function 00A925DB: GetWindowLongW.USER32(?,000000EB), ref: 00A925EC
                              • GetSysColor.USER32(0000000F), ref: 00A921D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ColorLongWindow
                              • String ID:
                              • API String ID: 259745315-0
                              • Opcode ID: c509111f6fe09ccc90e7e60cb272aca19b4d2eb51a97cdf1b1c94b359de8163c
                              • Instruction ID: 93b9e94999b1af5aef3caa61acd7b71e932331f20dbdc044d62f34325d835c6a
                              • Opcode Fuzzy Hash: c509111f6fe09ccc90e7e60cb272aca19b4d2eb51a97cdf1b1c94b359de8163c
                              • Instruction Fuzzy Hash: 78419031204540FADF259F28EC89BF93BA6EB06731F548265FE659B1E1CB318C42DB61
                              APIs
                              • CharLowerBuffW.USER32(?,?,00B1F910), ref: 00AFA90B
                              • GetDriveTypeW.KERNEL32(00000061,00B489A0,00000061), ref: 00AFA9D5
                              • _wcscpy.LIBCMT ref: 00AFA9FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: BuffCharDriveLowerType_wcscpy
                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 2820617543-1000479233
                              • Opcode ID: cbf5f82761a0e844dd458af51b4f4e53e92e31ff209d4edc2caba784a40fef87
                              • Instruction ID: c21223391443d880dc69089a8ae52be76d1ea10a82f5297af9db6827d9abad5d
                              • Opcode Fuzzy Hash: cbf5f82761a0e844dd458af51b4f4e53e92e31ff209d4edc2caba784a40fef87
                              • Instruction Fuzzy Hash: 2051AC71218305ABC700EF54CA92ABFB7E9EF94380F50482DF699572A2DB71D909CA53
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __i64tow__itow__swprintf
                              • String ID: %.15g$0x%p$False$True
                              • API String ID: 421087845-2263619337
                              • Opcode ID: 82ae5ee998805c024167a6f3f28ba0c2b596dd7703be7a2bcc441ffd44da17e0
                              • Instruction ID: 205ffaee9829d16f61246e0f5d84e46164bfd1ff518f5d79c430364175748c54
                              • Opcode Fuzzy Hash: 82ae5ee998805c024167a6f3f28ba0c2b596dd7703be7a2bcc441ffd44da17e0
                              • Instruction Fuzzy Hash: 5B41B471600209AFEF24DF78D942FBB73F9EF05300F2444AEE549DB292EA3299419B11
                              APIs
                              • _memset.LIBCMT ref: 00B1716A
                              • CreateMenu.USER32 ref: 00B17185
                              • SetMenu.USER32(?,00000000), ref: 00B17194
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B17221
                              • IsMenu.USER32(?), ref: 00B17237
                              • CreatePopupMenu.USER32 ref: 00B17241
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B1726E
                              • DrawMenuBar.USER32 ref: 00B17276
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                              • String ID: 0$F
                              • API String ID: 176399719-3044882817
                              • Opcode ID: 3836a5a283c1f016045cd366cff91a44bacfbcac4048154528596e4487b3ee5b
                              • Instruction ID: e8347878f946910ef6b3e4c8160e94b5c12f198d9b5dbf89289363ff4f61eff6
                              • Opcode Fuzzy Hash: 3836a5a283c1f016045cd366cff91a44bacfbcac4048154528596e4487b3ee5b
                              • Instruction Fuzzy Hash: B3414774A01209EFDB20DF64D984EEA7BF5FF49311F6440A8F905A7361DB31A910CB90
                              APIs
                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00B1755E
                              • CreateCompatibleDC.GDI32(00000000), ref: 00B17565
                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00B17578
                              • SelectObject.GDI32(00000000,00000000), ref: 00B17580
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B1758B
                              • DeleteDC.GDI32(00000000), ref: 00B17594
                              • GetWindowLongW.USER32(?,000000EC), ref: 00B1759E
                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00B175B2
                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00B175BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                              • String ID: static
                              • API String ID: 2559357485-2160076837
                              • Opcode ID: 657b1b3d705ae288df89fb7dead45e425988b446acad13bcd9790b8210a88e35
                              • Instruction ID: 1503c2f8150fb48208e1beccc1ccc39b9fb9d630001c477ef0c7f5762c68f2cd
                              • Opcode Fuzzy Hash: 657b1b3d705ae288df89fb7dead45e425988b446acad13bcd9790b8210a88e35
                              • Instruction Fuzzy Hash: 9C318B32144216BBDF129F64DC09FEA3BBAFF19360F504264FA15A31A0CB31D961DBA0
                              APIs
                              • _memset.LIBCMT ref: 00AB6E3E
                                • Part of subcall function 00AB8B28: __getptd_noexit.LIBCMT ref: 00AB8B28
                              • __gmtime64_s.LIBCMT ref: 00AB6ED7
                              • __gmtime64_s.LIBCMT ref: 00AB6F0D
                              • __gmtime64_s.LIBCMT ref: 00AB6F2A
                              • __allrem.LIBCMT ref: 00AB6F80
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AB6F9C
                              • __allrem.LIBCMT ref: 00AB6FB3
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AB6FD1
                              • __allrem.LIBCMT ref: 00AB6FE8
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AB7006
                              • __invoke_watson.LIBCMT ref: 00AB7077
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                              • String ID:
                              • API String ID: 384356119-0
                              • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                              • Instruction ID: db38a5a6e71be9059f35c64bb6e550b61a6a7152e0927405e2798bb3241ac3c5
                              • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                              • Instruction Fuzzy Hash: 62710776A00716ABDB14AF78DD41BEAB7BCAF44364F14822EF514D7282E774DE008B90
                              APIs
                              • _memset.LIBCMT ref: 00AF2542
                              • GetMenuItemInfoW.USER32(00B55890,000000FF,00000000,00000030), ref: 00AF25A3
                              • SetMenuItemInfoW.USER32(00B55890,00000004,00000000,00000030), ref: 00AF25D9
                              • Sleep.KERNEL32(000001F4), ref: 00AF25EB
                              • GetMenuItemCount.USER32(?), ref: 00AF262F
                              • GetMenuItemID.USER32(?,00000000), ref: 00AF264B
                              • GetMenuItemID.USER32(?,-00000001), ref: 00AF2675
                              • GetMenuItemID.USER32(?,?), ref: 00AF26BA
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00AF2700
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AF2714
                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AF2735
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                              • String ID:
                              • API String ID: 4176008265-0
                              • Opcode ID: 32c63e4fa00ed020011cb398a74a94b28ebb3fda4df02279f7c4223bef4d2ef8
                              • Instruction ID: 7fdae44606eaadad66f2445681d9deb553f0248c000f4bb8c2c5d48ab6b7c134
                              • Opcode Fuzzy Hash: 32c63e4fa00ed020011cb398a74a94b28ebb3fda4df02279f7c4223bef4d2ef8
                              • Instruction Fuzzy Hash: 30618AB090024EAFDB21DFA4CD98AFEBBB9EB41344F544059FA41A7251DB31AD05DB21
                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B16FA5
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B16FA8
                              • GetWindowLongW.USER32(?,000000F0), ref: 00B16FCC
                              • _memset.LIBCMT ref: 00B16FDD
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B16FEF
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B17067
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow_memset
                              • String ID:
                              • API String ID: 830647256-0
                              • Opcode ID: 6e9838ed543566fde5fcf60559b3b9a192a4838794ecc0558a1279d275158f65
                              • Instruction ID: 2a0db6d7ab6169b8236d58a8f3b58326f83a5966ba497cc25fde34a11c167454
                              • Opcode Fuzzy Hash: 6e9838ed543566fde5fcf60559b3b9a192a4838794ecc0558a1279d275158f65
                              • Instruction Fuzzy Hash: 02616C75940208AFDB21DFA4CC81FEE77F8EB09710F504199FA15AB2A1CB71AD85DB90
                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00AE6BBF
                              • SafeArrayAllocData.OLEAUT32(?), ref: 00AE6C18
                              • VariantInit.OLEAUT32(?), ref: 00AE6C2A
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00AE6C4A
                              • VariantCopy.OLEAUT32(?,?), ref: 00AE6C9D
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00AE6CB1
                              • VariantClear.OLEAUT32(?), ref: 00AE6CC6
                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00AE6CD3
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AE6CDC
                              • VariantClear.OLEAUT32(?), ref: 00AE6CEE
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AE6CF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: dba62169256ff46f0b49354855c2f199ac5549c9a91343acd639f99fe946cb2f
                              • Instruction ID: 35094f7e2f184b09ed195278d9d0de80d0f4cf9148989936c1859c89df75af38
                              • Opcode Fuzzy Hash: dba62169256ff46f0b49354855c2f199ac5549c9a91343acd639f99fe946cb2f
                              • Instruction Fuzzy Hash: 47415F71A0021AAFCF00DFA9D9449EEBBB9EF58354F00C469E955E7361DB30A945CB90
                              APIs
                              • WSAStartup.WS2_32(00000101,?), ref: 00B05793
                              • inet_addr.WS2_32(?), ref: 00B057D8
                              • gethostbyname.WS2_32(?), ref: 00B057E4
                              • IcmpCreateFile.IPHLPAPI ref: 00B057F2
                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00B05862
                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00B05878
                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00B058ED
                              • WSACleanup.WS2_32 ref: 00B058F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                              • String ID: Ping
                              • API String ID: 1028309954-2246546115
                              • Opcode ID: 6dfaf013b84410d45fe2e61726d2d17604e21aeceb4c291047b3605bc56e43ff
                              • Instruction ID: c0276b077aff7492e212059eb6db90145a6db79b3a2ba42770202366f337ce5d
                              • Opcode Fuzzy Hash: 6dfaf013b84410d45fe2e61726d2d17604e21aeceb4c291047b3605bc56e43ff
                              • Instruction Fuzzy Hash: C2515C31604701AFDB219F25CD86B6A7BE4EB45720F048969F996DB6E1DB30E800DF51
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00AFB4D0
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00AFB546
                              • GetLastError.KERNEL32 ref: 00AFB550
                              • SetErrorMode.KERNEL32(00000000,READY), ref: 00AFB5BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: a772b5ac64c46e92e8215bd461781835a1a14c56dadf6401805222406a586ff9
                              • Instruction ID: 062405860d60cb84a48ef9b63378e44acd304b3fe375b1b359432fb74f11c7e2
                              • Opcode Fuzzy Hash: a772b5ac64c46e92e8215bd461781835a1a14c56dadf6401805222406a586ff9
                              • Instruction Fuzzy Hash: BB318135A10209EFDB00EBA8C945ABE77B4FF09314F108169F60697291DB759A42CB61
                              APIs
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                                • Part of subcall function 00AEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00AEAABC
                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00AE9014
                              • GetDlgCtrlID.USER32 ref: 00AE901F
                              • GetParent.USER32 ref: 00AE903B
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00AE903E
                              • GetDlgCtrlID.USER32(?), ref: 00AE9047
                              • GetParent.USER32(?), ref: 00AE9063
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00AE9066
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: a13ebb05b76fa87be7e34b13f6f5ef39d9bdda71627112188b6df416375711da
                              • Instruction ID: 9b70c3a30e0f2585d99578efcb6addb6e4c4ae6a2b7b05d6021e11404645e514
                              • Opcode Fuzzy Hash: a13ebb05b76fa87be7e34b13f6f5ef39d9bdda71627112188b6df416375711da
                              • Instruction Fuzzy Hash: 4221D070A00209BBDF05ABA1CC85EFEBBB4EF49310F504169B921972B1DF755919DB20
                              APIs
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                                • Part of subcall function 00AEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00AEAABC
                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00AE90FD
                              • GetDlgCtrlID.USER32 ref: 00AE9108
                              • GetParent.USER32 ref: 00AE9124
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00AE9127
                              • GetDlgCtrlID.USER32(?), ref: 00AE9130
                              • GetParent.USER32(?), ref: 00AE914C
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00AE914F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: 3658299ab535c5563188bf6a50e15d438a8bb848e41e7545598dba65cfe827b5
                              • Instruction ID: d72b4fee30691bf92432d02c377842f5a79dc745004ca9a88d95955b1624516f
                              • Opcode Fuzzy Hash: 3658299ab535c5563188bf6a50e15d438a8bb848e41e7545598dba65cfe827b5
                              • Instruction Fuzzy Hash: 5521D774A00349BBDF11ABA5CC85EFEBBB4EF48300F504155F911972A1DF755915DB20
                              APIs
                              • GetParent.USER32 ref: 00AE916F
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00AE9184
                              • _wcscmp.LIBCMT ref: 00AE9196
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00AE9211
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ClassMessageNameParentSend_wcscmp
                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 1704125052-3381328864
                              • Opcode ID: 81b11ea69f8a147611413c0c79b0d7b6564fec3db62c174ab62648fcfe11997f
                              • Instruction ID: 87ab88512ca821276cf4e5ad5dd4ebc1b6d100c6ebbf62c22f3b363665d01a8d
                              • Opcode Fuzzy Hash: 81b11ea69f8a147611413c0c79b0d7b6564fec3db62c174ab62648fcfe11997f
                              • Instruction Fuzzy Hash: 54112C3628C387BAFE112726DC1ADF73BDC9F15720F200166FA00A50E2FF629951A654
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00B088D7
                              • CoInitialize.OLE32(00000000), ref: 00B08904
                              • CoUninitialize.COMBASE ref: 00B0890E
                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00B08A0E
                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00B08B3B
                              • CoGetInstanceFromFile.COMBASE(00000000,?,00000000,00000015,00000002,?,00000001,00B22C0C), ref: 00B08B6F
                              • CoGetObject.OLE32(?,00000000,00B22C0C,?), ref: 00B08B92
                              • SetErrorMode.KERNEL32(00000000), ref: 00B08BA5
                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00B08C25
                              • VariantClear.OLEAUT32(?), ref: 00B08C35
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                              • String ID:
                              • API String ID: 2395222682-0
                              • Opcode ID: 0918fe9494760f7c44ac9c7ee16234f21f540f7a905f9cc5afc72d2ae3ae18f2
                              • Instruction ID: d2a13c29c55e5d99e049161cc0abd28715cb34697c6884da4a4cd0cbcc3a24ae
                              • Opcode Fuzzy Hash: 0918fe9494760f7c44ac9c7ee16234f21f540f7a905f9cc5afc72d2ae3ae18f2
                              • Instruction Fuzzy Hash: 76C119B1608305AFD700DF68C88496BBBE9FF89358F00495DF5899B2A1DB71EE05CB52
                              APIs
                              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00AF7A6C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ArraySafeVartype
                              • String ID:
                              • API String ID: 1725837607-0
                              • Opcode ID: 9b9cff4687d8da3da5763adb08219575d915645c6440a9d2cc1d4bdfd1a2e13b
                              • Instruction ID: f21b98cf632ddf48c9cc9116db91825c09365146e5dad102ddd28288ba34cbb7
                              • Opcode Fuzzy Hash: 9b9cff4687d8da3da5763adb08219575d915645c6440a9d2cc1d4bdfd1a2e13b
                              • Instruction Fuzzy Hash: B2B16B7190421E9FDB00DFE8D885BBEB7B4EF09321F244469FA51E7291D774A942CBA0
                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00A9FAA6
                              • OleUninitialize.OLE32(?,00000000), ref: 00A9FB45
                              • UnregisterHotKey.USER32(?), ref: 00A9FC9C
                              • DestroyWindow.USER32(?), ref: 00AD45D6
                              • FreeLibrary.KERNEL32(?), ref: 00AD463B
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00AD4668
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                              • String ID: close all
                              • API String ID: 469580280-3243417748
                              • Opcode ID: 7eb01572f2172173415ce5743c5d9d7f9352af34c9548ec890643502b6f02c94
                              • Instruction ID: 377a4134e54c1fa430aa537923a71575981e06f7d42a6a2186139ae95f3ad9d9
                              • Opcode Fuzzy Hash: 7eb01572f2172173415ce5743c5d9d7f9352af34c9548ec890643502b6f02c94
                              • Instruction Fuzzy Hash: DEA16E31701212CFDF19EF24C695A69F7A4AF19710F5442ADE80BAB261DB30ED16CF50
                              APIs
                              • EnumChildWindows.USER32(?,00AEA439), ref: 00AEA377
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ChildEnumWindows
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                              • API String ID: 3555792229-1603158881
                              • Opcode ID: a3a78ec109c211efffc15e182c65840713d4d012352b301d80f82dd8db6e3108
                              • Instruction ID: 32cda0cd7865bf62743c91fed0f72bb4f2b07c41875a2515466627e71a5ba948
                              • Opcode Fuzzy Hash: a3a78ec109c211efffc15e182c65840713d4d012352b301d80f82dd8db6e3108
                              • Instruction Fuzzy Hash: CD91E731A00646ABCF08EFA1C542BEEFBB8FF14300F548519E949A7151DF307A99DBA1
                              APIs
                              • SetWindowLongW.USER32(?,000000EB), ref: 00A92EAE
                                • Part of subcall function 00A91DB3: GetClientRect.USER32(?,?), ref: 00A91DDC
                                • Part of subcall function 00A91DB3: GetWindowRect.USER32(?,?), ref: 00A91E1D
                                • Part of subcall function 00A91DB3: ScreenToClient.USER32(?,?), ref: 00A91E45
                              • GetDC.USER32 ref: 00ACCD32
                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00ACCD45
                              • SelectObject.GDI32(00000000,00000000), ref: 00ACCD53
                              • SelectObject.GDI32(00000000,00000000), ref: 00ACCD68
                              • ReleaseDC.USER32(?,00000000), ref: 00ACCD70
                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00ACCDFB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                              • String ID: U
                              • API String ID: 4009187628-3372436214
                              • Opcode ID: 2572da404f2ffcef170391e21bc40e5a1cbba5d3cc6e27b4dfb49ef92967c91f
                              • Instruction ID: 660a8dda69689a31970272a7e725ac05cd7693e9de72712fcbc8ac7d0e22732a
                              • Opcode Fuzzy Hash: 2572da404f2ffcef170391e21bc40e5a1cbba5d3cc6e27b4dfb49ef92967c91f
                              • Instruction Fuzzy Hash: D271AE31500205EFCF228F64C894FEA7FB5FF49325F15426AED5A5A2A6D7308C91DB60
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B01A50
                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00B01A7C
                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00B01ABE
                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00B01AD3
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B01AE0
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00B01B10
                              • InternetCloseHandle.WININET(00000000), ref: 00B01B57
                                • Part of subcall function 00B02483: GetLastError.KERNEL32(?,?,00B01817,00000000,00000000,00000001), ref: 00B02498
                                • Part of subcall function 00B02483: SetEvent.KERNEL32(?,?,00B01817,00000000,00000000,00000001), ref: 00B024AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                              • String ID:
                              • API String ID: 2603140658-3916222277
                              • Opcode ID: 9de2040619a130d4b43da18880ad7365b5618efe80cbc19021c8eaa84b8cf1e3
                              • Instruction ID: af101969ade275ca03144ef0ffc8c67ba85cebefeeb0d8c341919a0b3a54bee9
                              • Opcode Fuzzy Hash: 9de2040619a130d4b43da18880ad7365b5618efe80cbc19021c8eaa84b8cf1e3
                              • Instruction Fuzzy Hash: 4B4150B1501219BFEB169F54CC89FFB7BACFF08354F008566FA059A181EB749E449BA0
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00B1F910), ref: 00B08D28
                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00B1F910), ref: 00B08D5C
                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00B08ED6
                              • SysFreeString.OLEAUT32(?), ref: 00B08F00
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                              • String ID:
                              • API String ID: 560350794-0
                              • Opcode ID: 20b6db9ecd95c28e31d594c5e559337026eeaba84cad0dd84215fc3e38274343
                              • Instruction ID: 2da0bf54d5e3fa4e5282377cfabb4d7ca6635b81b142c310576bcba25150ab59
                              • Opcode Fuzzy Hash: 20b6db9ecd95c28e31d594c5e559337026eeaba84cad0dd84215fc3e38274343
                              • Instruction Fuzzy Hash: 23F12B71A00209EFDF14DF94C884EAEBBB9FF49314F108598F945AB291DB31AE46CB50
                              APIs
                              • _memset.LIBCMT ref: 00B0F6B5
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B0F848
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B0F86C
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B0F8AC
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B0F8CE
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B0FA4A
                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00B0FA7C
                              • CloseHandle.KERNEL32(?), ref: 00B0FAAB
                              • CloseHandle.KERNEL32(?), ref: 00B0FB22
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                              • String ID:
                              • API String ID: 4090791747-0
                              • Opcode ID: 37aee184f38af8f216e96dbde2b24de39d655aec57d351d98fda4b015665fa50
                              • Instruction ID: 469e580efcf614ed7b338dc548d1a5808812ee47a461e53137ba7b5194ecb05b
                              • Opcode Fuzzy Hash: 37aee184f38af8f216e96dbde2b24de39d655aec57d351d98fda4b015665fa50
                              • Instruction Fuzzy Hash: E5E19E31604301AFCB24EF24C981B7ABBE5EF85354F1485ADF8999B2A2DB31DC45CB52
                              APIs
                                • Part of subcall function 00A91B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00A92036,?,00000000,?,?,?,?,00A916CB,00000000,?), ref: 00A91B9A
                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00A920D3
                              • KillTimer.USER32(-00000001,?,?,?,?,00A916CB,00000000,?,?,00A91AE2,?,?), ref: 00A9216E
                              • DestroyAcceleratorTable.USER32(00000000), ref: 00ACBCA6
                              • DeleteObject.GDI32(00000000), ref: 00ACBD1C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Destroy$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                              • String ID:
                              • API String ID: 2402799130-0
                              • Opcode ID: a07c3fe540642f04dfa67a6233b08e053e3da07ad6dcc40c1f3eae2dd33d7873
                              • Instruction ID: afab3ef404fbce2f2a91afcf2f5bb0d0975a4df44eeda467975b14fd54b7480a
                              • Opcode Fuzzy Hash: a07c3fe540642f04dfa67a6233b08e053e3da07ad6dcc40c1f3eae2dd33d7873
                              • Instruction Fuzzy Hash: 0A617731610B11EFDB369F14D959B2AB7F2FB44313F60856DE5428BA60CB71AC90DBA0
                              APIs
                                • Part of subcall function 00AF466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AF3697,?), ref: 00AF468B
                                • Part of subcall function 00AF466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00AF3697,?), ref: 00AF46A4
                                • Part of subcall function 00AF4A31: GetFileAttributesW.KERNEL32(?,00AF370B), ref: 00AF4A32
                              • lstrcmpiW.KERNEL32(?,?), ref: 00AF4D40
                              • _wcscmp.LIBCMT ref: 00AF4D5A
                              • MoveFileW.KERNEL32(?,?), ref: 00AF4D75
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                              • String ID:
                              • API String ID: 793581249-0
                              • Opcode ID: 64f467cafc2ddf0b38058b2066cc3a4c9225889f2f2cba766179e1562847578b
                              • Instruction ID: 96d6057ae21f3f414a7b1b35cb63f867d17e7cfb22a3c4727db3314c9891bdad
                              • Opcode Fuzzy Hash: 64f467cafc2ddf0b38058b2066cc3a4c9225889f2f2cba766179e1562847578b
                              • Instruction Fuzzy Hash: BD5168B25083499BC725DBA4D9819EF77ECAF84350F40092EF289D3152EF34A688C766
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00B186FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: 78bf6830734cc28a2640a11c5673b597c72f1a3f2db66f3848c00d3b9d8df727
                              • Instruction ID: 832d2a2fcdb79213a9afde2ae71218c9f794885ec773091758ab820899fe40f3
                              • Opcode Fuzzy Hash: 78bf6830734cc28a2640a11c5673b597c72f1a3f2db66f3848c00d3b9d8df727
                              • Instruction Fuzzy Hash: 57515B30600244BEEF209B289C85FE97BE5FB06760FA042A5F955E61E1DF75AEC0CB51
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00ACC2F7
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00ACC319
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00ACC331
                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00ACC34F
                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00ACC370
                              • DestroyCursor.USER32(00000000), ref: 00ACC37F
                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00ACC39C
                              • DestroyCursor.USER32(?), ref: 00ACC3AB
                                • Part of subcall function 00B1A4AF: DeleteObject.GDI32(00000000), ref: 00B1A4E8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CursorDestroyExtractIconImageLoadMessageSend$DeleteObject
                              • String ID:
                              • API String ID: 2975913752-0
                              • Opcode ID: 6b590bd7fb44bf74d6a6d1003a04fb7102753a7f70b67edbeb77c0ca35ab2570
                              • Instruction ID: 406a829d2f3c0577b34f5b54dd35de760c52e7f14daf2d87fc87e382c97ff56d
                              • Opcode Fuzzy Hash: 6b590bd7fb44bf74d6a6d1003a04fb7102753a7f70b67edbeb77c0ca35ab2570
                              • Instruction Fuzzy Hash: 9F515870A00209AFDF24DF64DC45FAA7BF5EB58321F108568F906DB2A0DB70AD90DB50
                              APIs
                                • Part of subcall function 00AEA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00AEA84C
                                • Part of subcall function 00AEA82C: GetCurrentThreadId.KERNEL32 ref: 00AEA853
                                • Part of subcall function 00AEA82C: AttachThreadInput.USER32(00000000,?,00AE9683,?,00000001), ref: 00AEA85A
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00AE968E
                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00AE96AB
                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00AE96AE
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00AE96B7
                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00AE96D5
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00AE96D8
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00AE96E1
                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00AE96F8
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00AE96FB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                              • String ID:
                              • API String ID: 2014098862-0
                              • Opcode ID: e820a6666d0b91f952206fed450709cc9043465d790fb67690814ff6e52d89e6
                              • Instruction ID: 96dea716d5c0361b10dbe0071566bd6f785fd0be713e979166e596eda5bbddaa
                              • Opcode Fuzzy Hash: e820a6666d0b91f952206fed450709cc9043465d790fb67690814ff6e52d89e6
                              • Instruction Fuzzy Hash: A711E1B1910619BEFA106F65DC89FBA3F2DEB4C750F604425F344AB0A0CDF26C10DAA4
                              APIs
                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00AE853C,00000B00,?,?), ref: 00AE892A
                              • RtlAllocateHeap.NTDLL(00000000,?,00AE853C), ref: 00AE8931
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00AE853C,00000B00,?,?), ref: 00AE8946
                              • GetCurrentProcess.KERNEL32(?,00000000,?,00AE853C,00000B00,?,?), ref: 00AE894E
                              • DuplicateHandle.KERNEL32(00000000,?,00AE853C,00000B00,?,?), ref: 00AE8951
                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00AE853C,00000B00,?,?), ref: 00AE8961
                              • GetCurrentProcess.KERNEL32(00AE853C,00000000,?,00AE853C,00000B00,?,?), ref: 00AE8969
                              • DuplicateHandle.KERNEL32(00000000,?,00AE853C,00000B00,?,?), ref: 00AE896C
                              • CreateThread.KERNEL32(00000000,00000000,00AE8992,00000000,00000000,00000000), ref: 00AE8986
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocateCreateThread
                              • String ID:
                              • API String ID: 1422014791-0
                              • Opcode ID: 27d0713f854429a8db4b70a3cb38f582747c0e5a8a3f6664b53a76f629cdb3fb
                              • Instruction ID: 8991a1dcc7ca77a349ac669199d2144fe1590df9631b868587ecd9b08c605d4a
                              • Opcode Fuzzy Hash: 27d0713f854429a8db4b70a3cb38f582747c0e5a8a3f6664b53a76f629cdb3fb
                              • Instruction Fuzzy Hash: 5401BFB5640345FFE710ABA5DC4DFA73B6CEB89711F408421FA05DB191CA749810CB60
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID: NULL Pointer assignment$Not an Object type
                              • API String ID: 0-572801152
                              • Opcode ID: 629346606a8bc3c753bc6692e2049458c6b56e591106fe64068e8c324c8b7a0e
                              • Instruction ID: a43cbaf5bc44a2308081fecec51fb395120f0442db02511a8a009b1a4d67bb11
                              • Opcode Fuzzy Hash: 629346606a8bc3c753bc6692e2049458c6b56e591106fe64068e8c324c8b7a0e
                              • Instruction Fuzzy Hash: 20C1C471A0020A9FDF10CF98D984BAEBBF5FF48350F1085A9E905A72D2E7709D45CB50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$_memset
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                              • API String ID: 2862541840-625585964
                              • Opcode ID: b0eba8f1bb750429479925ae1e28a13e0183c942cb1029fda2abdc19219eba8f
                              • Instruction ID: bb1959f09657b97f981a0d11521680d9358f1a2e1639eb36ca2ee6394041ded8
                              • Opcode Fuzzy Hash: b0eba8f1bb750429479925ae1e28a13e0183c942cb1029fda2abdc19219eba8f
                              • Instruction Fuzzy Hash: 4F917A71A00219ABDF24DFA5C888FAEBBF8EF45710F108599F515AB2D2D7709905CFA0
                              APIs
                                • Part of subcall function 00AE710A: CLSIDFromProgID.COMBASE ref: 00AE7127
                                • Part of subcall function 00AE710A: ProgIDFromCLSID.COMBASE(?,00000000), ref: 00AE7142
                                • Part of subcall function 00AE710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AE7044,80070057,?,?), ref: 00AE7150
                                • Part of subcall function 00AE710A: CoTaskMemFree.COMBASE(00000000), ref: 00AE7160
                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 00B09806
                              • _memset.LIBCMT ref: 00B09813
                              • _memset.LIBCMT ref: 00B09956
                              • CoCreateInstanceEx.COMBASE(?,00000000,00000015,?,00000001,00000000), ref: 00B09982
                              • CoTaskMemFree.COMBASE(?), ref: 00B0998D
                              Strings
                              • NULL Pointer assignment, xrefs: 00B099DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                              • String ID: NULL Pointer assignment
                              • API String ID: 1300414916-2785691316
                              • Opcode ID: c09842b57a861d19f9ab9b3c86bf8fedd511c83306f4663887803a0258db5bed
                              • Instruction ID: 6fc8c7ed39eec44ede73ca77593d578c0e23ef083858ff05c73517bfc6ca9bce
                              • Opcode Fuzzy Hash: c09842b57a861d19f9ab9b3c86bf8fedd511c83306f4663887803a0258db5bed
                              • Instruction Fuzzy Hash: 57912671D00229EBDF10DFA5DD81EEEBBB9EF08350F10815AF519A7291DB719A44CBA0
                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B16E24
                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 00B16E38
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B16E52
                              • _wcscat.LIBCMT ref: 00B16EAD
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B16EC4
                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B16EF2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcscat
                              • String ID: SysListView32
                              • API String ID: 307300125-78025650
                              • Opcode ID: 17fc786200a385ccce7679d75529dcc1dd3bf959cba1929772f6960441a702f1
                              • Instruction ID: 55cc996f78af432ff17255c66e843e79ffc1e96ca845d5700e2f0d04057e012d
                              • Opcode Fuzzy Hash: 17fc786200a385ccce7679d75529dcc1dd3bf959cba1929772f6960441a702f1
                              • Instruction Fuzzy Hash: 71419071A00349EBEB21DF64DC85BEA77E8EF08350F5045AAF984E7292D6719DC4CB60
                              APIs
                                • Part of subcall function 00AF3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00AF3C7A
                                • Part of subcall function 00AF3C55: Process32FirstW.KERNEL32(00000000,?), ref: 00AF3C88
                                • Part of subcall function 00AF3C55: CloseHandle.KERNEL32(00000000), ref: 00AF3D52
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B0E9A4
                              • GetLastError.KERNEL32 ref: 00B0E9B7
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B0E9E6
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B0EA63
                              • GetLastError.KERNEL32(00000000), ref: 00B0EA6E
                              • CloseHandle.KERNEL32(00000000), ref: 00B0EAA3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                              • String ID: SeDebugPrivilege
                              • API String ID: 2533919879-2896544425
                              • Opcode ID: af07bef8ff729e4029dd5e8fcf3522c4b3a5967033e572f512ff3d2c5be03253
                              • Instruction ID: dd76945621feb8860dc59d967ced5eebb61c6b9dcf2c3397d8bf4c093ff0aa50
                              • Opcode Fuzzy Hash: af07bef8ff729e4029dd5e8fcf3522c4b3a5967033e572f512ff3d2c5be03253
                              • Instruction Fuzzy Hash: 5D419631300201AFDB15EF68C995BAEBBE5AF45314F08889CF9169B2D2DB74E804CB95
                              APIs
                              • LoadIconW.USER32(00000000,00007F03), ref: 00AF3033
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2457776203-404129466
                              • Opcode ID: affe794281904dda7471f05f6d8ad9c2dec407cfe93611da60c9a5ddf982af5f
                              • Instruction ID: 2f09f71e9792fdf31f30ddf59157dbe358f35034abb535b4143e7668ff78ebe0
                              • Opcode Fuzzy Hash: affe794281904dda7471f05f6d8ad9c2dec407cfe93611da60c9a5ddf982af5f
                              • Instruction Fuzzy Hash: 4011D83224938ABEEB149B95DC42DBF7BAC9F25360B20006BFB0066182DE619F4056A4
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00AF4312
                              • LoadStringW.USER32(00000000), ref: 00AF4319
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00AF432F
                              • LoadStringW.USER32(00000000), ref: 00AF4336
                              • _wprintf.LIBCMT ref: 00AF435C
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00AF437A
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 00AF4357
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wprintf
                              • String ID: %s (%d) : ==> %s: %s %s
                              • API String ID: 3648134473-3128320259
                              • Opcode ID: 4bb559c30da7f386c625f1eb51cbf51863ff395ceeef186fa6a8832f3cee9625
                              • Instruction ID: 9e4f3c9930298285c84c23cbc170e53731050eb0d0d3e27e74bdc7cf375e824e
                              • Opcode Fuzzy Hash: 4bb559c30da7f386c625f1eb51cbf51863ff395ceeef186fa6a8832f3cee9625
                              • Instruction Fuzzy Hash: 87012CF6900209BFE711A7A49D89EFA766CDB08700F8045A1BB49E6051EA749E858B70
                              APIs
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00ACC1C7,00000004,00000000,00000000,00000000), ref: 00A92ACF
                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00ACC1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00A92B17
                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00ACC1C7,00000004,00000000,00000000,00000000), ref: 00ACC21A
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00ACC1C7,00000004,00000000,00000000,00000000), ref: 00ACC286
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: 3b8705e009b883d7f5c23e6fab73710158f6475a825fe34bcd96e6b9aadf35c9
                              • Instruction ID: 728ca251e67556c51f087c6d772fd5f2a522afab467290bcde2c4ad1e6d8bae3
                              • Opcode Fuzzy Hash: 3b8705e009b883d7f5c23e6fab73710158f6475a825fe34bcd96e6b9aadf35c9
                              • Instruction Fuzzy Hash: 5241D932708680BADF359B288C8CBBA7BE2AB55360F55C81DE04787961CA719C45D710
                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00AF70DD
                                • Part of subcall function 00AB0DB6: std::exception::exception.LIBCMT ref: 00AB0DEC
                                • Part of subcall function 00AB0DB6: __CxxThrowException@8.LIBCMT ref: 00AB0E01
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00AF7114
                              • RtlEnterCriticalSection.NTDLL(?), ref: 00AF7130
                              • _memmove.LIBCMT ref: 00AF717E
                              • _memmove.LIBCMT ref: 00AF719B
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 00AF71AA
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00AF71BF
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00AF71DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                              • String ID:
                              • API String ID: 256516436-0
                              • Opcode ID: 034fe76018a0e9aeee61771e9ef70d7cd4ac16af9a2bd72f1e5c6303d4e3fd7d
                              • Instruction ID: ab94d064ac71a6291c36b1c08e2a6773123955f69219088128201cbe3ea48829
                              • Opcode Fuzzy Hash: 034fe76018a0e9aeee61771e9ef70d7cd4ac16af9a2bd72f1e5c6303d4e3fd7d
                              • Instruction Fuzzy Hash: 54315931A00205EBDB00DFA4DD85EAFB7B8EF45310B1481A5F904AB256DB30EA14CBA4
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 00B161EB
                              • GetDC.USER32(00000000), ref: 00B161F3
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B161FE
                              • ReleaseDC.USER32(00000000,00000000), ref: 00B1620A
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00B16246
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B16257
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B1902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00B16291
                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B162B1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                              • String ID:
                              • API String ID: 3864802216-0
                              • Opcode ID: c6fadf37c0400c85dde808ea5098f16a55d395b706597c488ccebec41b4e05ff
                              • Instruction ID: ab9eb3a9068953b1097a0315c7260c2bda4a96607b9c1711bcb15293e5b31a20
                              • Opcode Fuzzy Hash: c6fadf37c0400c85dde808ea5098f16a55d395b706597c488ccebec41b4e05ff
                              • Instruction Fuzzy Hash: CD314F72101214BFEF118F50DC8AFFA3BA9EF49765F4440A5FE08DA191CA759C51CBA4
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: f3ac8e4070225a17395022cca640efbf60ce20d357d990ee2677acdfffbcad33
                              • Instruction ID: eddb6c8889f2f2051e1e12070df518280b3fd494de4fd542a14a8958ff002f01
                              • Opcode Fuzzy Hash: f3ac8e4070225a17395022cca640efbf60ce20d357d990ee2677acdfffbcad33
                              • Instruction Fuzzy Hash: 9A2123B16142557BE2046712AE56FFB77ACDE54388F184420FD08DA253EB24DE1182B1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cec9b04131622ba0d60a28df9143588aca0a167ef717fc405a5e2a40ba16f8c3
                              • Instruction ID: 2f8d2449b0f245c9017cde4ea398ecc9fd6672552fe63760b310e8727a1091eb
                              • Opcode Fuzzy Hash: cec9b04131622ba0d60a28df9143588aca0a167ef717fc405a5e2a40ba16f8c3
                              • Instruction Fuzzy Hash: 9C714C70A0010AEFCF04DF98CC49EBEBBB9FF89310F158159F915AA251C734AA51CBA0
                              APIs
                              • IsWindow.USER32(00C828D0), ref: 00B1B3EB
                              • IsWindowEnabled.USER32(00C828D0), ref: 00B1B3F7
                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00B1B4DB
                              • SendMessageW.USER32(00C828D0,000000B0,?,?), ref: 00B1B512
                              • IsDlgButtonChecked.USER32(?,?), ref: 00B1B54F
                              • GetWindowLongW.USER32(00C828D0,000000EC), ref: 00B1B571
                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00B1B589
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                              • String ID:
                              • API String ID: 4072528602-0
                              • Opcode ID: f144c89a815f08291fda58414298287fc783fb03f77b97e5eb5a8e5b27e87f8c
                              • Instruction ID: 60dbd12b152959dd9196332160f44c70eadc29cdf886f3300fac3ed72a805343
                              • Opcode Fuzzy Hash: f144c89a815f08291fda58414298287fc783fb03f77b97e5eb5a8e5b27e87f8c
                              • Instruction Fuzzy Hash: 51718E34600204EFDB209F55D8D4FFA7BE5EF09311F9480E9EA55973A2C731A990DB50
                              APIs
                              • _memset.LIBCMT ref: 00B0F448
                              • _memset.LIBCMT ref: 00B0F511
                              • ShellExecuteExW.SHELL32(?), ref: 00B0F556
                                • Part of subcall function 00A99837: __itow.LIBCMT ref: 00A99862
                                • Part of subcall function 00A99837: __swprintf.LIBCMT ref: 00A998AC
                                • Part of subcall function 00AAFC86: _wcscpy.LIBCMT ref: 00AAFCA9
                              • GetProcessId.KERNEL32(00000000), ref: 00B0F5CD
                              • CloseHandle.KERNEL32(00000000), ref: 00B0F5FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                              • String ID: @
                              • API String ID: 3522835683-2766056989
                              • Opcode ID: 37d77a5acfb865348f33d21545dfccd38ba84457620469da3a204a21327c9f5a
                              • Instruction ID: 4fdebbcdb9a982aa14dd8d1da2bc5a087370eec1e5879d0dfcd8f37449b163bb
                              • Opcode Fuzzy Hash: 37d77a5acfb865348f33d21545dfccd38ba84457620469da3a204a21327c9f5a
                              • Instruction Fuzzy Hash: 26617C75A006199FCF14DFA8C9819AEBBF5FF49310F1480ADE855AB791DB30AD41CB90
                              APIs
                              • GetParent.USER32(?), ref: 00AF0F8C
                              • GetKeyboardState.USER32(?), ref: 00AF0FA1
                              • SetKeyboardState.USER32(?), ref: 00AF1002
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00AF1030
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00AF104F
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00AF1095
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00AF10B8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 0798efacf8602ee47a7b1e104c21116516613a9b545f5eeace32496de0433169
                              • Instruction ID: b0b8f62003ebea6a3764332a490f61ac1ae9377202c7bb52cf74819a858fbde8
                              • Opcode Fuzzy Hash: 0798efacf8602ee47a7b1e104c21116516613a9b545f5eeace32496de0433169
                              • Instruction Fuzzy Hash: D151F3A06047DABDFB3643B48C05BBABEA95B06304F08858DF2D5868C3C6D9ECC9D751
                              APIs
                              • GetParent.USER32(00000000), ref: 00AF0DA5
                              • GetKeyboardState.USER32(?), ref: 00AF0DBA
                              • SetKeyboardState.USER32(?), ref: 00AF0E1B
                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00AF0E47
                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00AF0E64
                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00AF0EA8
                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00AF0EC9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: b141cb1fafba41a1012131c2b216ae622e5bd099d727ab80bde34fec1b3d6e0b
                              • Instruction ID: 87e1ee49c08c800140e9eb8d3a9b26624f720dc5ce14f2c8efe277409076aacc
                              • Opcode Fuzzy Hash: b141cb1fafba41a1012131c2b216ae622e5bd099d727ab80bde34fec1b3d6e0b
                              • Instruction Fuzzy Hash: 5051D4A06447D97DFB3687B4CC45FBABFA96B06300F088889F2D4468C3D795AC99D750
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _wcsncpy$LocalTime
                              • String ID:
                              • API String ID: 2945705084-0
                              • Opcode ID: 037ef83e671d0903d21266265b6cdb7695f6b27035f2d56f2c0b927e1c146900
                              • Instruction ID: d2b80286078cb0c4f667a642d739c789d85a60c2dbaf90359fadf63c53728512
                              • Opcode Fuzzy Hash: 037ef83e671d0903d21266265b6cdb7695f6b27035f2d56f2c0b927e1c146900
                              • Instruction Fuzzy Hash: FD419466C1061876CB11FBF48D46ADFB7BC9F05310F508A56F618E3222EB34A255C7E6
                              APIs
                                • Part of subcall function 00AF466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AF3697,?), ref: 00AF468B
                                • Part of subcall function 00AF466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00AF3697,?), ref: 00AF46A4
                              • lstrcmpiW.KERNEL32(?,?), ref: 00AF36B7
                              • _wcscmp.LIBCMT ref: 00AF36D3
                              • MoveFileW.KERNEL32(?,?), ref: 00AF36EB
                              • _wcscat.LIBCMT ref: 00AF3733
                              • SHFileOperationW.SHELL32(?), ref: 00AF379F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                              • String ID: \*.*
                              • API String ID: 1377345388-1173974218
                              • Opcode ID: 2247594b8fcadf4e5e8eb96e43f9b455b46a70e633b3cfc45c34c1c4d8283d0d
                              • Instruction ID: 8c536e98e4f01c3caaa67e8742263c776c5bc7bb90e3d1e41cdaa7b213c870b1
                              • Opcode Fuzzy Hash: 2247594b8fcadf4e5e8eb96e43f9b455b46a70e633b3cfc45c34c1c4d8283d0d
                              • Instruction Fuzzy Hash: 02418272508348AECB52EFA4C541AEF77ECAF89380F40092EF599C3251EB34D689C752
                              APIs
                              • _memset.LIBCMT ref: 00B172AA
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B17351
                              • IsMenu.USER32(?), ref: 00B17369
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B173B1
                              • DrawMenuBar.USER32 ref: 00B173C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Menu$Item$DrawInfoInsert_memset
                              • String ID: 0
                              • API String ID: 3866635326-4108050209
                              • Opcode ID: 8f34960bd6e61e95bd76a0107ce2513193b82b1eb15341c182140eabd88896b3
                              • Instruction ID: d279aa9f93e1e5d3a792e7efabdbc377f65ee9ed60814037ffdec32aa6e4c7af
                              • Opcode Fuzzy Hash: 8f34960bd6e61e95bd76a0107ce2513193b82b1eb15341c182140eabd88896b3
                              • Instruction Fuzzy Hash: 78414871A40209AFDB20DF50E884AEABBF9FB08351F5484AAFD1597250DB30AD81DB60
                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00B10FD4
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B10FFE
                              • FreeLibrary.KERNEL32(00000000), ref: 00B110B5
                                • Part of subcall function 00B10FA5: RegCloseKey.ADVAPI32(?), ref: 00B1101B
                                • Part of subcall function 00B10FA5: FreeLibrary.KERNEL32(?), ref: 00B1106D
                                • Part of subcall function 00B10FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00B11090
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B11058
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                              • String ID:
                              • API String ID: 395352322-0
                              • Opcode ID: e24bafdb3fdf9ad27c539fe698aed7c2320863de25cc793e57a69ba4a5b27af8
                              • Instruction ID: 066713f03746677db4c77ffad7bb9ddd408e0fe5ad6bf4589432fd34a43ef41f
                              • Opcode Fuzzy Hash: e24bafdb3fdf9ad27c539fe698aed7c2320863de25cc793e57a69ba4a5b27af8
                              • Instruction Fuzzy Hash: 9E31FB71D01109FFDB25DF94DC89AFEB7BCEF08300F4045A9EA05A2151EA749EC59AA0
                              APIs
                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B162EC
                              • GetWindowLongW.USER32(00C828D0,000000F0), ref: 00B1631F
                              • GetWindowLongW.USER32(00C828D0,000000F0), ref: 00B16354
                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00B16386
                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00B163B0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00B163C1
                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00B163DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend
                              • String ID:
                              • API String ID: 2178440468-0
                              • Opcode ID: 01ade67cc4243280131851e59bdb6e95085bfc7c1cd72e3af608ae3d8abf87fb
                              • Instruction ID: 9d8cbe3a117604b14e8cd0a12003586ef6c0a114019f2e232271a45e4fd9617f
                              • Opcode Fuzzy Hash: 01ade67cc4243280131851e59bdb6e95085bfc7c1cd72e3af608ae3d8abf87fb
                              • Instruction Fuzzy Hash: 5C311230644255AFDB20CF1DEC84FA837E1FB4A715F9941A8F9218F2B2CB71A980DB54
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AEDB2E
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AEDB54
                              • SysAllocString.OLEAUT32(00000000), ref: 00AEDB57
                              • SysAllocString.OLEAUT32(?), ref: 00AEDB75
                              • SysFreeString.OLEAUT32(?), ref: 00AEDB7E
                              • StringFromGUID2.COMBASE(?,?,00000028), ref: 00AEDBA3
                              • SysAllocString.OLEAUT32(?), ref: 00AEDBB1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: 6eac1048765aa3d570e6a714eba8ddffc0dec652d9f2f2934d9dfdaaf4250d54
                              • Instruction ID: 743acf69011e09efcd0358b7fb09cbd3228edb90c157392b95a2eb6c7073c957
                              • Opcode Fuzzy Hash: 6eac1048765aa3d570e6a714eba8ddffc0dec652d9f2f2934d9dfdaaf4250d54
                              • Instruction Fuzzy Hash: 1F21A436600219AFEF10DFA9DC88CFB73ACEB09360B418525F914DB2A1EA70DC41C760
                              APIs
                                • Part of subcall function 00B07D8B: inet_addr.WS2_32(00000000), ref: 00B07DB6
                              • socket.WS2_32(00000002,00000001,00000006), ref: 00B061C6
                              • WSAGetLastError.WS2_32(00000000), ref: 00B061D5
                              • ioctlsocket.WS2_32(00000000,8004667E,00000000), ref: 00B0620E
                              • connect.WSOCK32(00000000,?,00000010), ref: 00B06217
                              • WSAGetLastError.WS2_32 ref: 00B06221
                              • closesocket.WS2_32(00000000), ref: 00B0624A
                              • ioctlsocket.WS2_32(00000000,8004667E,00000000), ref: 00B06263
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                              • String ID:
                              • API String ID: 910771015-0
                              • Opcode ID: 1773d9b1f7a2cc43222635e3103a2a634fd018e50c733919bf111b0347a671f8
                              • Instruction ID: cdbf7ffa428d1e6b5dec6e26d2075a1882a5bf2f0c0021a1c0f00e58428b629d
                              • Opcode Fuzzy Hash: 1773d9b1f7a2cc43222635e3103a2a634fd018e50c733919bf111b0347a671f8
                              • Instruction Fuzzy Hash: 5A317C71600118ABEF10AF68CC85BBA7BEDEF45760F0480A9F905A72D1DB74AD54CAA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 1038674560-2734436370
                              • Opcode ID: 8366e1f08ed2e27cdd5e10d558268224c85da2b57cb9957477c3e7cef8c8c60b
                              • Instruction ID: 360d2d9e4a79e74ba74da2fade2176571d5324b5a5ba974eec4be646cbd6efa8
                              • Opcode Fuzzy Hash: 8366e1f08ed2e27cdd5e10d558268224c85da2b57cb9957477c3e7cef8c8c60b
                              • Instruction Fuzzy Hash: 6A2134722045D16FDA20AB36AD02EB773ECEF55350F50403AF846860A2EB609D81D295
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AEDC09
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AEDC2F
                              • SysAllocString.OLEAUT32(00000000), ref: 00AEDC32
                              • SysAllocString.OLEAUT32 ref: 00AEDC53
                              • SysFreeString.OLEAUT32 ref: 00AEDC5C
                              • StringFromGUID2.COMBASE(?,?,00000028), ref: 00AEDC76
                              • SysAllocString.OLEAUT32(?), ref: 00AEDC84
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: e9f5db912c8a62174d77a1df160ee41b15cbd3f93a822a595630dde6b4b3e9e0
                              • Instruction ID: 349a78e481edc9775d001bcf450eddb156d1f3c71c26d9ebe2a4cddedd4c7747
                              • Opcode Fuzzy Hash: e9f5db912c8a62174d77a1df160ee41b15cbd3f93a822a595630dde6b4b3e9e0
                              • Instruction Fuzzy Hash: 5C214135604245AFAB10DFB9DC89DBB77ECEB49360B508125F914DB2A1DAB0EC41C764
                              APIs
                                • Part of subcall function 00A91D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A91D73
                                • Part of subcall function 00A91D35: GetStockObject.GDI32(00000011), ref: 00A91D87
                                • Part of subcall function 00A91D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A91D91
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B17632
                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B1763F
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B1764A
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B17659
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B17665
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$CreateObjectStockWindow
                              • String ID: Msctls_Progress32
                              • API String ID: 1025951953-3636473452
                              • Opcode ID: 548185565b5c9fe3ac7e3180f515c1bae1922525ef9496f287089542f2ca5892
                              • Instruction ID: ac87341606003dc166679245b8b483392ef5dd490ed7e7d68d2da335d3346096
                              • Opcode Fuzzy Hash: 548185565b5c9fe3ac7e3180f515c1bae1922525ef9496f287089542f2ca5892
                              • Instruction Fuzzy Hash: D811B2B2150219BFEF118F64CC85EEB7FADEF08798F114114BA04A30A0CA729C61DBA4
                              APIs
                              • __init_pointers.LIBCMT ref: 00AB9AE6
                                • Part of subcall function 00AB3187: RtlEncodePointer.NTDLL(00000000), ref: 00AB318A
                                • Part of subcall function 00AB3187: __initp_misc_winsig.LIBCMT ref: 00AB31A5
                                • Part of subcall function 00AB3187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00AB9EA0
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00AB9EB4
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00AB9EC7
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00AB9EDA
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00AB9EED
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00AB9F00
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00AB9F13
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00AB9F26
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00AB9F39
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00AB9F4C
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00AB9F5F
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00AB9F72
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00AB9F85
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00AB9F98
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00AB9FAB
                                • Part of subcall function 00AB3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00AB9FBE
                              • __mtinitlocks.LIBCMT ref: 00AB9AEB
                              • __mtterm.LIBCMT ref: 00AB9AF4
                                • Part of subcall function 00AB9B5C: RtlDeleteCriticalSection.NTDLL(00000000), ref: 00AB9C56
                                • Part of subcall function 00AB9B5C: _free.LIBCMT ref: 00AB9C5D
                                • Part of subcall function 00AB9B5C: RtlDeleteCriticalSection.NTDLL(00B4EC00), ref: 00AB9C7F
                              • __calloc_crt.LIBCMT ref: 00AB9B19
                              • __initptd.LIBCMT ref: 00AB9B3B
                              • GetCurrentThreadId.KERNEL32 ref: 00AB9B42
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                              • String ID:
                              • API String ID: 3567560977-0
                              • Opcode ID: 62229f84423b1622e0ca8d128e9452f4f540042f5bcdde3e57a63c12e674bae5
                              • Instruction ID: 435f2c89231c009a57a944435a3b60c6d617b2bd0fcbdc22129dac806dba0f5d
                              • Opcode Fuzzy Hash: 62229f84423b1622e0ca8d128e9452f4f540042f5bcdde3e57a63c12e674bae5
                              • Instruction Fuzzy Hash: ACF090325097116AEA347779BD036CB2B9CAF02774F204A1DF664D61D3EF60854142A0
                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00AB3F85), ref: 00AB4085
                              • GetProcAddress.KERNEL32(00000000), ref: 00AB408C
                              • RtlEncodePointer.NTDLL(00000000), ref: 00AB4097
                              • RtlDecodePointer.NTDLL(00AB3F85), ref: 00AB40B2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoUninitialize$combase.dll
                              • API String ID: 3489934621-2819208100
                              • Opcode ID: dad7b6b75681f3ef083f4610a6b03d0bd8a260ce0d2e727ba753e72a93fae2f7
                              • Instruction ID: b95f801a008b92c2c3114b534eabdafcc79f177414b44feeaa3fa8359522f71d
                              • Opcode Fuzzy Hash: dad7b6b75681f3ef083f4610a6b03d0bd8a260ce0d2e727ba753e72a93fae2f7
                              • Instruction Fuzzy Hash: BFE09270581B01ABEA10AF71EC09B953AE9BB18B83F9080A4F515E32B1CFB64610EA14
                              APIs
                              • __WSAFDIsSet.WS2_32(00000000,?), ref: 00B06C00
                              • WSAGetLastError.WS2_32(00000000), ref: 00B06C34
                              • htons.WS2_32(?), ref: 00B06CEA
                              • inet_ntoa.WS2_32(?), ref: 00B06CA7
                                • Part of subcall function 00AEA7E9: _strlen.LIBCMT ref: 00AEA7F3
                                • Part of subcall function 00AEA7E9: _memmove.LIBCMT ref: 00AEA815
                              • _strlen.LIBCMT ref: 00B06D44
                              • _memmove.LIBCMT ref: 00B06DAD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                              • String ID:
                              • API String ID: 3619996494-0
                              • Opcode ID: 5625dabf6418f3b92c40fd754f9a49e34af66900b507630544b1f123e3423212
                              • Instruction ID: 7b45c3985a50001ce3087fdc0b88037da27d2bf79bd48af8481aff668f47f652
                              • Opcode Fuzzy Hash: 5625dabf6418f3b92c40fd754f9a49e34af66900b507630544b1f123e3423212
                              • Instruction Fuzzy Hash: CB81B171604200AFDB10EB28CD82FABBBE8EF94714F504A6DF5559B2D2DA70ED01CB91
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memmove$__itow__swprintf
                              • String ID:
                              • API String ID: 3253778849-0
                              • Opcode ID: b502df325a94811825dded41ac528fc93299cc79cdbb2b18572780d957d8dc6c
                              • Instruction ID: 5a6ac41bca6f93b1b7db3b26aa2eb2c0a02b4b39c9168e8e8d9977cb4c401734
                              • Opcode Fuzzy Hash: b502df325a94811825dded41ac528fc93299cc79cdbb2b18572780d957d8dc6c
                              • Instruction Fuzzy Hash: 62616D3060065AABCF05EFA4CD82EFF77A9AF45308F044519FA556B192DB35ED06CB50
                              APIs
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                                • Part of subcall function 00B10E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B0FDAD,?,?), ref: 00B10E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B102BD
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B102FD
                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00B10320
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B10349
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B1038C
                              • RegCloseKey.ADVAPI32(00000000), ref: 00B10399
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                              • String ID:
                              • API String ID: 4046560759-0
                              • Opcode ID: f0f8cd76f016cc09ad87c52ee476e33d3c078a9705c9cdf271e1b155d626ba39
                              • Instruction ID: 18b6d93c49f8ec3a4debb7c4cab9ee1e72c3296bab8250e2945511a9703ab114
                              • Opcode Fuzzy Hash: f0f8cd76f016cc09ad87c52ee476e33d3c078a9705c9cdf271e1b155d626ba39
                              • Instruction Fuzzy Hash: 23518B31218200AFCB04EF64C985EAFBBE9FF89314F84495DF555872A2DB71E984CB52
                              APIs
                              • GetMenu.USER32(?), ref: 00B157FB
                              • GetMenuItemCount.USER32(00000000), ref: 00B15832
                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B1585A
                              • GetMenuItemID.USER32(?,?), ref: 00B158C9
                              • GetSubMenu.USER32(?,?), ref: 00B158D7
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 00B15928
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Menu$Item$CountMessagePostString
                              • String ID:
                              • API String ID: 650687236-0
                              • Opcode ID: a1e43528aae7fc3f0b84968873c2a397ec6a2276332fa62fce06220e31c0a8e2
                              • Instruction ID: 40874fea00976889a5228a9876f2d44b1a8230fac8adf42c52c2ef74f52bc6de
                              • Opcode Fuzzy Hash: a1e43528aae7fc3f0b84968873c2a397ec6a2276332fa62fce06220e31c0a8e2
                              • Instruction Fuzzy Hash: 47513A31A00615EFCF21DF64C945AEEB7F5EF88320F5080A9E955AB351DB70AE81CB91
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00AEEF06
                              • VariantClear.OLEAUT32(00000013), ref: 00AEEF78
                              • VariantClear.OLEAUT32(00000000), ref: 00AEEFD3
                              • _memmove.LIBCMT ref: 00AEEFFD
                              • VariantClear.OLEAUT32(?), ref: 00AEF04A
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00AEF078
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Variant$Clear$ChangeInitType_memmove
                              • String ID:
                              • API String ID: 1101466143-0
                              • Opcode ID: 642e5366e3e2562541af89c595ff2e0882834903d92e7412373ef8a594f64097
                              • Instruction ID: 13a68dae73f3a52c4613d28b57a77e02ca3ffb4a3b7ddab9dd9b1106228095ad
                              • Opcode Fuzzy Hash: 642e5366e3e2562541af89c595ff2e0882834903d92e7412373ef8a594f64097
                              • Instruction Fuzzy Hash: 8B5166B5A00249EFCB14CF59C880AAAB7B8FF4C314B15856AED59DB301E735E911CFA0
                              APIs
                              • _memset.LIBCMT ref: 00AF2258
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AF22A3
                              • IsMenu.USER32(00000000), ref: 00AF22C3
                              • CreatePopupMenu.USER32 ref: 00AF22F7
                              • GetMenuItemCount.USER32(000000FF), ref: 00AF2355
                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00AF2386
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                              • String ID:
                              • API String ID: 3311875123-0
                              • Opcode ID: a9b73a9dc6ea8971999f73ff414e8e9477145e5cc3cec6dd4f15d64056440baf
                              • Instruction ID: 3c0076b3d725e990349e35e3b159d9c978f34a543109b8ff37a27163073e3845
                              • Opcode Fuzzy Hash: a9b73a9dc6ea8971999f73ff414e8e9477145e5cc3cec6dd4f15d64056440baf
                              • Instruction Fuzzy Hash: 4051ADB060420EDBDF21CFE8C988BBDBBF5AF55358F108229FA15AB290D7749944CB51
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 00A9179A
                              • GetWindowRect.USER32(?,?), ref: 00A917FE
                              • ScreenToClient.USER32(?,?), ref: 00A9181B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00A9182C
                              • EndPaint.USER32(?,?), ref: 00A91876
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                              • String ID:
                              • API String ID: 1827037458-0
                              • Opcode ID: 444f31da0edcf867dd3b195cdb58480d041cce7830d8082bd65c42748a70efb3
                              • Instruction ID: 057da8df6bdf06be9b94541802595fffaa2a91697a8a960d23ae034cff1192be
                              • Opcode Fuzzy Hash: 444f31da0edcf867dd3b195cdb58480d041cce7830d8082bd65c42748a70efb3
                              • Instruction Fuzzy Hash: 9F41B230200702AFDB20DF24CC84FBA7BF8EB59725F144668F9A4872A1CB319845DB61
                              APIs
                              • ShowWindow.USER32(00B557B0,00000000,00C828D0,?,?,00B557B0,?,00B1B5A8,?,?), ref: 00B1B712
                              • EnableWindow.USER32(00000000,00000000), ref: 00B1B736
                              • ShowWindow.USER32(00B557B0,00000000,00C828D0,?,?,00B557B0,?,00B1B5A8,?,?), ref: 00B1B796
                              • ShowWindow.USER32(00000000,00000004,?,00B1B5A8,?,?), ref: 00B1B7A8
                              • EnableWindow.USER32(00000000,00000001), ref: 00B1B7CC
                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00B1B7EF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID:
                              • API String ID: 642888154-0
                              • Opcode ID: ec3f665a89081f8ff74198a5ffa04a52dd600aef46cb28b7590851cc558b311e
                              • Instruction ID: a399ba310a64003570c2905d0e30a42b856a0a46777be62f429498e6d16e53a7
                              • Opcode Fuzzy Hash: ec3f665a89081f8ff74198a5ffa04a52dd600aef46cb28b7590851cc558b311e
                              • Instruction Fuzzy Hash: 40413A35605241AFDB26CF24C499FE47BE1FB45310F9881E9E9488F6A2C731AC96CB51
                              APIs
                              • GetForegroundWindow.USER32(?,?,?,?,?,?,00B04E41,?,?,00000000,00000001), ref: 00B070AC
                                • Part of subcall function 00B039A0: GetWindowRect.USER32(?,?), ref: 00B039B3
                              • GetDesktopWindow.USER32 ref: 00B070D6
                              • GetWindowRect.USER32(00000000), ref: 00B070DD
                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00B0710F
                                • Part of subcall function 00AF5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AF52BC
                              • GetCursorPos.USER32(?), ref: 00B0713B
                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00B07199
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                              • String ID:
                              • API String ID: 4137160315-0
                              • Opcode ID: c638fbf20f211abc29d1259e22666e8513d3cac200e1d5d769fc059764f1f2fb
                              • Instruction ID: 40888f6e86cd08f822f65b6e2ae5e98e22e2bc5b95ec9e633604ce8a2321a5d2
                              • Opcode Fuzzy Hash: c638fbf20f211abc29d1259e22666e8513d3cac200e1d5d769fc059764f1f2fb
                              • Instruction Fuzzy Hash: 5931B472509306AFD720DF54C849BABBBEAFF88314F000519F595A71D1CB74EA05CB92
                              APIs
                                • Part of subcall function 00A99837: __itow.LIBCMT ref: 00A99862
                                • Part of subcall function 00A99837: __swprintf.LIBCMT ref: 00A998AC
                                • Part of subcall function 00AAFC86: _wcscpy.LIBCMT ref: 00AAFCA9
                              • _wcstok.LIBCMT ref: 00AFEC94
                              • _wcscpy.LIBCMT ref: 00AFED23
                              • _memset.LIBCMT ref: 00AFED56
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                              • String ID: X
                              • API String ID: 774024439-3081909835
                              • Opcode ID: 8324efbd8972b1d6493e6b8fadf8f7029b2277cc3de269ecedf77798654dc951
                              • Instruction ID: aaff17127c1371a788444c6d2faff544a279d8f76f6d7bb7a9b5226b83bd388f
                              • Opcode Fuzzy Hash: 8324efbd8972b1d6493e6b8fadf8f7029b2277cc3de269ecedf77798654dc951
                              • Instruction Fuzzy Hash: 4FC170316083459FCB64EF68C945A6EB7E4FF85310F00492DF9999B2A2DB30ED45CB92
                              APIs
                                • Part of subcall function 00AE80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00AE80C0
                                • Part of subcall function 00AE80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00AE80CA
                                • Part of subcall function 00AE80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00AE80D9
                                • Part of subcall function 00AE80A9: RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 00AE80E0
                                • Part of subcall function 00AE80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00AE80F6
                              • GetLengthSid.ADVAPI32(?,00000000,00AE842F), ref: 00AE88CA
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00AE88D6
                              • RtlAllocateHeap.NTDLL(00000000), ref: 00AE88DD
                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00AE88F6
                              • GetProcessHeap.KERNEL32(00000000,00000000,00AE842F), ref: 00AE890A
                              • HeapFree.KERNEL32(00000000), ref: 00AE8911
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocateInformationToken$CopyErrorFreeLastLength
                              • String ID:
                              • API String ID: 169236558-0
                              • Opcode ID: 9561e4d4b350863a79f7ebd51d8a47780972bb3874205c108e1edc6b15fd803a
                              • Instruction ID: f475e1fc2a5dfdb427ad41aa1c4e94a72e15bae4dc2b3ac4aa1e09ad51a2444d
                              • Opcode Fuzzy Hash: 9561e4d4b350863a79f7ebd51d8a47780972bb3874205c108e1edc6b15fd803a
                              • Instruction Fuzzy Hash: AC11B131901209FFDB109FA5DC19BFE77A8EB45311F508128E849A7111CB3A9D10DB60
                              APIs
                              • GetDC.USER32(00000000), ref: 00AEB7B5
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00AEB7C6
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00AEB7CD
                              • ReleaseDC.USER32(00000000,00000000), ref: 00AEB7D5
                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00AEB7EC
                              • MulDiv.KERNEL32(000009EC,?,?), ref: 00AEB7FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CapsDevice$Release
                              • String ID:
                              • API String ID: 1035833867-0
                              • Opcode ID: 13c5e36d0a9c04eda598b2eb5a683deb309591fb2bdad88aefb2167d8fa950f2
                              • Instruction ID: 1a8155eca8ad815670d8b3fbcbd867e7a15b542f545d63b8b95d67a73c7e0992
                              • Opcode Fuzzy Hash: 13c5e36d0a9c04eda598b2eb5a683deb309591fb2bdad88aefb2167d8fa950f2
                              • Instruction Fuzzy Hash: E6014475E00219BBEF109FA69D49A9EBFB8EB48751F408075FA04E7291DA709C10CFA1
                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AB0193
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00AB019B
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AB01A6
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AB01B1
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00AB01B9
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AB01C1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: e185ab7777a03af925ae700e05dc0714590c5daaa0465f9fac87aa11c260fd18
                              • Instruction ID: 7a4d303d7b0465545ed68256b80bcc291f9df2e1227264f57f190f7058728182
                              • Opcode Fuzzy Hash: e185ab7777a03af925ae700e05dc0714590c5daaa0465f9fac87aa11c260fd18
                              • Instruction Fuzzy Hash: 12016CB0901B5A7DE3008F5A8C85B52FFA8FF19354F00411BA15C47941C7F5A864CBE5
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00AF53F9
                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00AF540F
                              • GetWindowThreadProcessId.USER32(?,?), ref: 00AF541E
                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AF542D
                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AF5437
                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AF543E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                              • String ID:
                              • API String ID: 839392675-0
                              • Opcode ID: fc549abb5f6137a3242cada3aca4491cad73c27f360887089321a58de9dc6a43
                              • Instruction ID: fe25d86bd16f4f67d5ca23a2b635a17f107501e96cb0f1cd361b24b576fda7ad
                              • Opcode Fuzzy Hash: fc549abb5f6137a3242cada3aca4491cad73c27f360887089321a58de9dc6a43
                              • Instruction Fuzzy Hash: 8DF06D32240559BBE7215BA29C0DEFB7A7CEBC6B11F404169FA04D2061DAA01A01C6B5
                              APIs
                              • InterlockedExchange.KERNEL32(?,?), ref: 00AF7243
                              • RtlEnterCriticalSection.NTDLL(?), ref: 00AF7254
                              • TerminateThread.KERNEL32(00000000,000001F6,?,00AA0EE4,?,?), ref: 00AF7261
                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00AA0EE4,?,?), ref: 00AF726E
                                • Part of subcall function 00AF6C35: CloseHandle.KERNEL32(00000000,?,00AF727B,?,00AA0EE4,?,?), ref: 00AF6C3F
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00AF7281
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 00AF7288
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: be0c96abd16601ebf78bddb0671480d86f47b5ac1210958170a4fd91c37d91fc
                              • Instruction ID: df71a58c21fa6b74fe8c815d084b909a96eff77211cb12553b4236a05828d225
                              • Opcode Fuzzy Hash: be0c96abd16601ebf78bddb0671480d86f47b5ac1210958170a4fd91c37d91fc
                              • Instruction Fuzzy Hash: DBF05E36540613EBDB111BA4ED4C9FB772AEF55712B904632F603A20A0CFB65811CB90
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00B08613
                              • CharUpperBuffW.USER32(?,?), ref: 00B08722
                              • VariantClear.OLEAUT32(?), ref: 00B0889A
                                • Part of subcall function 00AF7562: VariantInit.OLEAUT32(00000000), ref: 00AF75A2
                                • Part of subcall function 00AF7562: VariantCopy.OLEAUT32(00000000,?), ref: 00AF75AB
                                • Part of subcall function 00AF7562: VariantClear.OLEAUT32(00000000), ref: 00AF75B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                              • API String ID: 4237274167-1221869570
                              • Opcode ID: af07fddcdc1240f2a1ec2a9833b0b4c9b86110cc56bfbde11ce7aaf972f26756
                              • Instruction ID: 25b6aacbdeec7a30190eb3d495770f69daa7ffbb6b50cff9cc909a900fe5ca32
                              • Opcode Fuzzy Hash: af07fddcdc1240f2a1ec2a9833b0b4c9b86110cc56bfbde11ce7aaf972f26756
                              • Instruction Fuzzy Hash: EE917F71604301DFCB10DF24C58596BBBE4EF89754F14896EF89A8B3A1DB31E905CB92
                              APIs
                                • Part of subcall function 00AAFC86: _wcscpy.LIBCMT ref: 00AAFCA9
                              • _memset.LIBCMT ref: 00AF2B87
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AF2BB6
                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AF2C69
                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00AF2C97
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                              • String ID: 0
                              • API String ID: 4152858687-4108050209
                              • Opcode ID: 99422cb871c85024a140be1d29484056123c98bb7afab32479e2dc7251dbc818
                              • Instruction ID: 59f8ff0608d8d2fd29e3a04496c7fce4213218878da6e1e6aa44bb1f5ceb8ea3
                              • Opcode Fuzzy Hash: 99422cb871c85024a140be1d29484056123c98bb7afab32479e2dc7251dbc818
                              • Instruction Fuzzy Hash: F551CD716083099ED7259FA8C845BBFB7E8EF95350F040A2DFA95D7191DB70CC058B92
                              APIs
                              • CoCreateInstance.COMBASE(?,00000000,00000005,?,?), ref: 00AED5D4
                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00AED60A
                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00AED61B
                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00AED69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorMode$AddressCreateInstanceProc
                              • String ID: DllGetClassObject
                              • API String ID: 753597075-1075368562
                              • Opcode ID: 87256085bfe1fd75f51d02f3ee2732e65414085827489191a1b11e37016ed715
                              • Instruction ID: e076424c1d5756741402fda28baefb0a5e743d3b95f9e5fb1b509afb835c2755
                              • Opcode Fuzzy Hash: 87256085bfe1fd75f51d02f3ee2732e65414085827489191a1b11e37016ed715
                              • Instruction Fuzzy Hash: B841BEB1610244EFDB05CF66C884AAABBB9EF44314F1581ADEC09DF205DBB1DE40DBA0
                              APIs
                              • _memset.LIBCMT ref: 00AF27C0
                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00AF27DC
                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00AF2822
                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00B55890,00000000), ref: 00AF286B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem_memset
                              • String ID: 0
                              • API String ID: 1173514356-4108050209
                              • Opcode ID: 80e70e57cb52325bae81d57da63a37bb9b693f76b2320582a1e7060043851104
                              • Instruction ID: 41bc2b6bdbba500688551e4277691ea1c5edbd33b90210760e7799b413c52bee
                              • Opcode Fuzzy Hash: 80e70e57cb52325bae81d57da63a37bb9b693f76b2320582a1e7060043851104
                              • Instruction Fuzzy Hash: 7941B2702043459FDB20DF64CC45B7ABBE8EF85754F144A2DFA6597291DB30E805CBA2
                              APIs
                              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00B0D7C5
                                • Part of subcall function 00A9784B: _memmove.LIBCMT ref: 00A97899
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: BuffCharLower_memmove
                              • String ID: cdecl$none$stdcall$winapi
                              • API String ID: 3425801089-567219261
                              • Opcode ID: a7174ac5724c5f83ad9427d7ed0e70f8fa7fe6d098719e9fcb404dec6e57be79
                              • Instruction ID: ce825708a503b4de56b2bb109e821984fb6f3e300546b623209db71d59750bf6
                              • Opcode Fuzzy Hash: a7174ac5724c5f83ad9427d7ed0e70f8fa7fe6d098719e9fcb404dec6e57be79
                              • Instruction Fuzzy Hash: 2D317071A04619AFCF00EFA4C9519FEB7F9FF05320F108AA9E825976D1DB71A905CB90
                              APIs
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                                • Part of subcall function 00AEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00AEAABC
                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00AE8F14
                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00AE8F27
                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00AE8F57
                                • Part of subcall function 00A97BCC: _memmove.LIBCMT ref: 00A97C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$_memmove$ClassName
                              • String ID: ComboBox$ListBox
                              • API String ID: 365058703-1403004172
                              • Opcode ID: 3b2438950cb97ddefa0bc38f6d921ce012bfdc684a23abfc2c53c0fa388a9abc
                              • Instruction ID: 3bb5b37a8386c3d09f1fda679d40a8ad4835b53f6d9eb77423f705869a019688
                              • Opcode Fuzzy Hash: 3b2438950cb97ddefa0bc38f6d921ce012bfdc684a23abfc2c53c0fa388a9abc
                              • Instruction Fuzzy Hash: B3212371A04204BEEF14ABB1DC86DFFB7B9DF05360B148129F429971E1DF394909D620
                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B0184C
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B01872
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B018A2
                              • InternetCloseHandle.WININET(00000000), ref: 00B018E9
                                • Part of subcall function 00B02483: GetLastError.KERNEL32(?,?,00B01817,00000000,00000000,00000001), ref: 00B02498
                                • Part of subcall function 00B02483: SetEvent.KERNEL32(?,?,00B01817,00000000,00000000,00000001), ref: 00B024AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3113390036-3916222277
                              • Opcode ID: ed2677b4b5f0fc4373870cbaa6edbfce401da6729e033276fbcae40aa2c528e0
                              • Instruction ID: 844f297bc20975f72f87e7a869f4dc4322f8ebccc21ecd4d9fdffcafda548a19
                              • Opcode Fuzzy Hash: ed2677b4b5f0fc4373870cbaa6edbfce401da6729e033276fbcae40aa2c528e0
                              • Instruction Fuzzy Hash: DA2180B1500308BFEB159F68DC85EBF7BEDEB48754F10856AF50597280DA209E0597B1
                              APIs
                                • Part of subcall function 00A91D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A91D73
                                • Part of subcall function 00A91D35: GetStockObject.GDI32(00000011), ref: 00A91D87
                                • Part of subcall function 00A91D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A91D91
                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B16461
                              • LoadLibraryW.KERNEL32(?), ref: 00B16468
                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B1647D
                              • DestroyWindow.USER32(?), ref: 00B16485
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                              • String ID: SysAnimate32
                              • API String ID: 4146253029-1011021900
                              • Opcode ID: adac2257a6a9156d2ae8da300cbf1246ad200c43f9a48273ec34cd3831051c0b
                              • Instruction ID: 95bb735ca9c0514ef5c60a7ea78b40266dc1b4a2231862fae96b807ea6cbc33a
                              • Opcode Fuzzy Hash: adac2257a6a9156d2ae8da300cbf1246ad200c43f9a48273ec34cd3831051c0b
                              • Instruction Fuzzy Hash: 6E215E71200205ABEF108FA4EC94EFB77EDEB59364FA08669FA5093290D7719C919760
                              APIs
                              • GetStdHandle.KERNEL32(0000000C), ref: 00AF6DBC
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00AF6DEF
                              • GetStdHandle.KERNEL32(0000000C), ref: 00AF6E01
                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00AF6E3B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: e412745b35ba87d3adeb7944bbea637f05edd0ec765a3fbd3e692b067516fa15
                              • Instruction ID: 4a8869edf8aa20091c3e3b160e752729324745e9db93e52c7873d23aa89c8232
                              • Opcode Fuzzy Hash: e412745b35ba87d3adeb7944bbea637f05edd0ec765a3fbd3e692b067516fa15
                              • Instruction Fuzzy Hash: 3621A17560020EABDB209FA9DC05ABA7BF4EF54720F204A29FEE0D72D0DB709951DB50
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 00AF6E89
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00AF6EBB
                              • GetStdHandle.KERNEL32(000000F6), ref: 00AF6ECC
                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00AF6F06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: ff90b3310c4320f88313e0b36b4e368ec10d7b2f7ce25af3253507173ddfe550
                              • Instruction ID: 13a2394306c0ac602d4b0941ec09934a3357af278094a880927e81d5842e5c0d
                              • Opcode Fuzzy Hash: ff90b3310c4320f88313e0b36b4e368ec10d7b2f7ce25af3253507173ddfe550
                              • Instruction Fuzzy Hash: 6521627A60030A9BDB209FA9DC04ABA77A8AF55720F204A19FEE1D72D0DB709951CB50
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00AFAC54
                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00AFACA8
                              • __swprintf.LIBCMT ref: 00AFACC1
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,00B1F910), ref: 00AFACFF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume__swprintf
                              • String ID: %lu
                              • API String ID: 3164766367-685833217
                              • Opcode ID: 8eafa80ef03721ea2f6f284c5bb385a54f27103460e5858d97e073c65a62fadd
                              • Instruction ID: 438dc6431ae791ebe329a55c4f2d9501449b7e079f1cdbc66eece9aaf410a074
                              • Opcode Fuzzy Hash: 8eafa80ef03721ea2f6f284c5bb385a54f27103460e5858d97e073c65a62fadd
                              • Instruction Fuzzy Hash: 02214471A00109AFCB10DFA9C945DEF77F8EF49714B004469F509AB251DA31EA51DB61
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 00AF1B19
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                              • API String ID: 3964851224-769500911
                              • Opcode ID: d3dc6dd07e79261c8692ca4b72ae265561981d0957779c726cdb0cf14686dbde
                              • Instruction ID: 30a3756ab52c61878b676e17c4b5847284dad1e46b10cb9887941864ab97623d
                              • Opcode Fuzzy Hash: d3dc6dd07e79261c8692ca4b72ae265561981d0957779c726cdb0cf14686dbde
                              • Instruction Fuzzy Hash: AD113C31910119CFCF00FFA4D9629FEB7F4BF25704F5084A9E81467292EB325906DB50
                              APIs
                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B0EC07
                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B0EC37
                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00B0ED6A
                              • CloseHandle.KERNEL32(?), ref: 00B0EDEB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                              • String ID:
                              • API String ID: 2364364464-0
                              • Opcode ID: 5c1420c2fec6a6cecaf60cff26a9777ee7e714c8dbd8c79e6961684e59deec06
                              • Instruction ID: 5e5cf960ad801aac087fd947518ec07d7fee16852b7047c9a9206372548ec81b
                              • Opcode Fuzzy Hash: 5c1420c2fec6a6cecaf60cff26a9777ee7e714c8dbd8c79e6961684e59deec06
                              • Instruction Fuzzy Hash: C3815D71604300AFDB20EF28C986B2AB7E5EF45710F04895DF9A9DB2D2DA74EC40CB91
                              APIs
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                                • Part of subcall function 00B10E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B0FDAD,?,?), ref: 00B10E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B100FD
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B1013C
                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B10183
                              • RegCloseKey.ADVAPI32(?,?), ref: 00B101AF
                              • RegCloseKey.ADVAPI32(00000000), ref: 00B101BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                              • String ID:
                              • API String ID: 3440857362-0
                              • Opcode ID: 82f87f71ab088e4069e9b7dcd465ac06649eeacb74f04d935b156929e6ce5525
                              • Instruction ID: c4b4297b4fc78fad189a0699beadb15c7f4bba133d8ccb25c094e46d28ef9927
                              • Opcode Fuzzy Hash: 82f87f71ab088e4069e9b7dcd465ac06649eeacb74f04d935b156929e6ce5525
                              • Instruction Fuzzy Hash: BD518F31218204AFDB04EF68C981FAEB7E9FF88314F40895DF55597291DB71E984CB52
                              APIs
                                • Part of subcall function 00A99837: __itow.LIBCMT ref: 00A99862
                                • Part of subcall function 00A99837: __swprintf.LIBCMT ref: 00A998AC
                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B0D927
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00B0D9AA
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B0D9C6
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00B0DA07
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B0DA21
                                • Part of subcall function 00A95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00AF7896,?,?,00000000), ref: 00A95A2C
                                • Part of subcall function 00A95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00AF7896,?,?,00000000,?,?), ref: 00A95A50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                              • String ID:
                              • API String ID: 327935632-0
                              • Opcode ID: fa9c4525c8a7437011a6952306df3bced1168dfb30ab01c4f8a090efac41ffad
                              • Instruction ID: 36e32611652ea79eca2e8911c5ad11a2d40f91b0f4e080f94210aad9af3348cc
                              • Opcode Fuzzy Hash: fa9c4525c8a7437011a6952306df3bced1168dfb30ab01c4f8a090efac41ffad
                              • Instruction Fuzzy Hash: C4510935A00209EFCB01EFA8C5859ADBBF5FF09320B54C0A9E955AB392DB31AD45CF51
                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00AFE61F
                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00AFE648
                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00AFE687
                                • Part of subcall function 00A99837: __itow.LIBCMT ref: 00A99862
                                • Part of subcall function 00A99837: __swprintf.LIBCMT ref: 00A998AC
                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00AFE6AC
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00AFE6B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                              • String ID:
                              • API String ID: 1389676194-0
                              • Opcode ID: 47894c34be1e987992923d03ab28d18635aa69c0438e1bf47e03ab91f5d95a0e
                              • Instruction ID: a7ee2029d56b8f14fe92b596bee25dc53531733a975d9287cdfd803e1ffb68a9
                              • Opcode Fuzzy Hash: 47894c34be1e987992923d03ab28d18635aa69c0438e1bf47e03ab91f5d95a0e
                              • Instruction Fuzzy Hash: 7051EE35A00109EFCF01EF64C9819AEBBF9EF09314B1480A9F949AB361DB31ED11DB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 20a96fc2c85fc5bd8fbc7bd4fd8e3637003b06bb243530de3ca42d95f316f06e
                              • Instruction ID: 6153368c4dc0ecce32ac7f4acd2d3ee389693b5e9f6039b089ae0e035dc128d1
                              • Opcode Fuzzy Hash: 20a96fc2c85fc5bd8fbc7bd4fd8e3637003b06bb243530de3ca42d95f316f06e
                              • Instruction Fuzzy Hash: 6741D235906204BFD721DF28CC89FE9BBE4EB0A320F9441A5E915B72E0CB30BD91DA51
                              APIs
                              • GetCursorPos.USER32(?), ref: 00A92357
                              • ScreenToClient.USER32(00B557B0,?), ref: 00A92374
                              • GetAsyncKeyState.USER32(00000001), ref: 00A92399
                              • GetAsyncKeyState.USER32(00000002), ref: 00A923A7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AsyncState$ClientCursorScreen
                              • String ID:
                              • API String ID: 4210589936-0
                              • Opcode ID: ff95272361793aa9fc909b880288038ab8e5d434e17baa166759691e408f1508
                              • Instruction ID: 172140ac6e92f413fa0e45874473a52bb7a86b7c15c272a2dbe5a91e416f6b40
                              • Opcode Fuzzy Hash: ff95272361793aa9fc909b880288038ab8e5d434e17baa166759691e408f1508
                              • Instruction Fuzzy Hash: 81416135604115FBDF159F68C844FEABBB5FB05360F20435AF829A62A0CB359990DFA1
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AE63E7
                              • TranslateAcceleratorW.USER32(?,?,?), ref: 00AE6433
                              • TranslateMessage.USER32(?), ref: 00AE645C
                              • DispatchMessageW.USER32(?), ref: 00AE6466
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AE6475
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Message$PeekTranslate$AcceleratorDispatch
                              • String ID:
                              • API String ID: 2108273632-0
                              • Opcode ID: 8808de142cea8f4e0783323db5ec7a082fd80377caaaf416bbbd47ec0df54dda
                              • Instruction ID: bcede0a0049092d0b6b5fe4de7f7febf5a9a02a6222ca008a718ab67b6ae3af9
                              • Opcode Fuzzy Hash: 8808de142cea8f4e0783323db5ec7a082fd80377caaaf416bbbd47ec0df54dda
                              • Instruction Fuzzy Hash: 35310431900783AFDB60CFB1CD44BF67BB8AB24382F1449A5E421C70A1EB259884DB60
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00AE8A30
                              • PostMessageW.USER32(?,00000201,00000001), ref: 00AE8ADA
                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00AE8AE2
                              • PostMessageW.USER32(?,00000202,00000000), ref: 00AE8AF0
                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00AE8AF8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessagePostSleep$RectWindow
                              • String ID:
                              • API String ID: 3382505437-0
                              • Opcode ID: 2cd809992d8182fd13f7814ad9b849d1e0f559f08c9c765da70292248aadccdc
                              • Instruction ID: bb3003e1e552881afe23a5bebe3772941e12253b785655bfaab40d9a4b2a0abe
                              • Opcode Fuzzy Hash: 2cd809992d8182fd13f7814ad9b849d1e0f559f08c9c765da70292248aadccdc
                              • Instruction Fuzzy Hash: F831AD71500259EFDF14CFA9D948AAE3BB5FB04315F11822AF929E71D0CBB49914DB90
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00AEB204
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00AEB221
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00AEB259
                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00AEB27F
                              • _wcsstr.LIBCMT ref: 00AEB289
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                              • String ID:
                              • API String ID: 3902887630-0
                              • Opcode ID: 8f7c66b01ebd83f007cb4a080f607c43144de08dd9afbcbf728e0fb7f7aa45fe
                              • Instruction ID: ab4d5035ed4e4bb11f9f3a49799f72516d0cedf0519d079b3ac951115d864e1d
                              • Opcode Fuzzy Hash: 8f7c66b01ebd83f007cb4a080f607c43144de08dd9afbcbf728e0fb7f7aa45fe
                              • Instruction Fuzzy Hash: 9321F5322142417BEB159B769C49EFF7BACDF49760F108139F904DA1A1EF61DC40D260
                              APIs
                                • Part of subcall function 00A92612: GetWindowLongW.USER32(?,000000EB), ref: 00A92623
                              • GetWindowLongW.USER32(?,000000F0), ref: 00B1B192
                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00B1B1B7
                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00B1B1CF
                              • GetSystemMetrics.USER32(00000004), ref: 00B1B1F8
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00B00E90,00000000), ref: 00B1B216
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$Long$MetricsSystem
                              • String ID:
                              • API String ID: 2294984445-0
                              • Opcode ID: cd0e7c4090f33a2c6ca8c4e5a7ad9a1c600ca5b2ef44a51c604cdd874ff451bc
                              • Instruction ID: 95b2bd67d766947751df48b60c3e7d38abf96361d9818cff01f079df5c73a8bc
                              • Opcode Fuzzy Hash: cd0e7c4090f33a2c6ca8c4e5a7ad9a1c600ca5b2ef44a51c604cdd874ff451bc
                              • Instruction Fuzzy Hash: 2E218271A20651EFCB209F389C54FAA3BE5EB15361F914768B922D71E0D7309860CB90
                              APIs
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00AE9320
                                • Part of subcall function 00A97BCC: _memmove.LIBCMT ref: 00A97C06
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00AE9352
                              • __itow.LIBCMT ref: 00AE936A
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00AE9392
                              • __itow.LIBCMT ref: 00AE93A3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$__itow$_memmove
                              • String ID:
                              • API String ID: 2983881199-0
                              • Opcode ID: 06a1430ab33e99c91d3f83de037d58c0e3cfb5f6f3a795a7a569a32dcd170f33
                              • Instruction ID: 80f3d3fa48e5bf364ec8ecb2299a2835fc24529ff37d532ae7820882c8633dda
                              • Opcode Fuzzy Hash: 06a1430ab33e99c91d3f83de037d58c0e3cfb5f6f3a795a7a569a32dcd170f33
                              • Instruction Fuzzy Hash: F721C531700349ABDB20AB659D85EEF7BADEB48710F144029F905DB1D1DAB0CD41D7A1
                              APIs
                              • IsWindow.USER32(00000000), ref: 00B05A6E
                              • GetForegroundWindow.USER32 ref: 00B05A85
                              • GetDC.USER32(00000000), ref: 00B05AC1
                              • GetPixel.GDI32(00000000,?,00000003), ref: 00B05ACD
                              • ReleaseDC.USER32(00000000,00000003), ref: 00B05B08
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$ForegroundPixelRelease
                              • String ID:
                              • API String ID: 4156661090-0
                              • Opcode ID: eeecf08e8e864dd266c6e19cdf901adecffb0a49696294ba3cae73bfa96f252b
                              • Instruction ID: b08e2d72e89de9bff2f85998838df278c40cab29b210232ac2542a2622be9e82
                              • Opcode Fuzzy Hash: eeecf08e8e864dd266c6e19cdf901adecffb0a49696294ba3cae73bfa96f252b
                              • Instruction Fuzzy Hash: A9218435A00504AFDB14EF69DD85AAABBE9EF48310F14C479F80997351CE34AD00CB90
                              APIs
                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A9134D
                              • SelectObject.GDI32(?,00000000), ref: 00A9135C
                              • BeginPath.GDI32(?), ref: 00A91373
                              • SelectObject.GDI32(?,00000000), ref: 00A9139C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: 076ed53e2ac1dc9275fe5adb7394ad6fb15086e509db7abade169486b854a4d7
                              • Instruction ID: 23136647e3167b65652e1eaba3abd2493cc08e0c1b7a955ca81f2c003848b1ec
                              • Opcode Fuzzy Hash: 076ed53e2ac1dc9275fe5adb7394ad6fb15086e509db7abade169486b854a4d7
                              • Instruction Fuzzy Hash: D1215130910705EBDF208F15DD487AA7BF8EB10323F548266F8119B1B0DB719991DF50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: f1f432d672270b2ca9c842fea361a826c71e31ff22e921d7fdb11ed2a5893722
                              • Instruction ID: cd393ad7fe5be9166bc5b9a7967e7722188cf8ca34101a6a8a5c27f6d410fc15
                              • Opcode Fuzzy Hash: f1f432d672270b2ca9c842fea361a826c71e31ff22e921d7fdb11ed2a5893722
                              • Instruction Fuzzy Hash: AE01F1B22141597BD2046B13AE96FFBB7ACDEA4388B144420FD0896243FB20EE11C6B0
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 00AF4ABA
                              • __beginthreadex.LIBCMT ref: 00AF4AD8
                              • MessageBoxW.USER32(?,?,?,?), ref: 00AF4AED
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00AF4B03
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00AF4B0A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                              • String ID:
                              • API String ID: 3824534824-0
                              • Opcode ID: 399f7dfa11bbe8eca36093d6c6729dddb5c1f43f7b963493e3acabc327c76e98
                              • Instruction ID: e4383023ee32a3b8509d68aa9f82561e9257a5eefe420b1aba835f05cb7c9623
                              • Opcode Fuzzy Hash: 399f7dfa11bbe8eca36093d6c6729dddb5c1f43f7b963493e3acabc327c76e98
                              • Instruction Fuzzy Hash: B111C876905619BBD7119FE8AC04BEB7FACEB49322F144269FA14D3251DA71C90487A0
                              APIs
                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00AE821E
                              • GetLastError.KERNEL32(?,00AE7CE2,?,?,?), ref: 00AE8228
                              • GetProcessHeap.KERNEL32(00000008,?,?,00AE7CE2,?,?,?), ref: 00AE8237
                              • RtlAllocateHeap.NTDLL(00000000,?,00AE7CE2), ref: 00AE823E
                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00AE8255
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: HeapObjectSecurityUser$AllocateErrorLastProcess
                              • String ID:
                              • API String ID: 883493501-0
                              • Opcode ID: 03845a0c8b65c03586507aa25ada1627a383c1eb92bd2666f80d318f6d75da25
                              • Instruction ID: 53b7f6663ecb08fc82d45e35afbe7c9093a2031ffee637ed7074219f060c9f0d
                              • Opcode Fuzzy Hash: 03845a0c8b65c03586507aa25ada1627a383c1eb92bd2666f80d318f6d75da25
                              • Instruction Fuzzy Hash: 53016971600245BFDB204FA6EC48DBB7BACEF8A794B904569FA1DC3220DE318C10DA60
                              APIs
                              • CLSIDFromProgID.COMBASE ref: 00AE7127
                              • ProgIDFromCLSID.COMBASE(?,00000000), ref: 00AE7142
                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00AE7044,80070057,?,?), ref: 00AE7150
                              • CoTaskMemFree.COMBASE(00000000), ref: 00AE7160
                              • CLSIDFromString.COMBASE(?,?), ref: 00AE716C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: From$Prog$FreeStringTasklstrcmpi
                              • String ID:
                              • API String ID: 3897988419-0
                              • Opcode ID: 5b53312967a3410d45c7b4d81b35e1e5d7f662cbc946562666ea094b9f60003f
                              • Instruction ID: cf799efa782683f0f67feb3fcd78cb2d0008ddb83d6b77f51075feb4a1502811
                              • Opcode Fuzzy Hash: 5b53312967a3410d45c7b4d81b35e1e5d7f662cbc946562666ea094b9f60003f
                              • Instruction Fuzzy Hash: 70017C76601305ABDB118F69DC44BAE7BADEB44791F144264FD08D3220EB31DE41DBA0
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AF5260
                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00AF526E
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AF5276
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00AF5280
                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AF52BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: e09325dce4fa51a28f91e0d4988f6d1196571e8072234458df7422c5af77d9e8
                              • Instruction ID: 1b8bef664e544a25096407d458ec895103cade6fcee836e6aa70f68d20de96bf
                              • Opcode Fuzzy Hash: e09325dce4fa51a28f91e0d4988f6d1196571e8072234458df7422c5af77d9e8
                              • Instruction Fuzzy Hash: 48010531D01A1EEBCF00AFE5E849AFDBB78BB09711F814256EA45B3241CF305560C7A1
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00AE8121
                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00AE812B
                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AE813A
                              • RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 00AE8141
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AE8157
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocateErrorLastProcess
                              • String ID:
                              • API String ID: 47921759-0
                              • Opcode ID: 698bdd514dc4f13363acae3c14a46ea391e9f35dc26b18e5b605a27fdca51a39
                              • Instruction ID: 8b8bf1a01bc7caa1e063803f4e95b516b7a850dcdd24fed5fa86c45d14a474b1
                              • Opcode Fuzzy Hash: 698bdd514dc4f13363acae3c14a46ea391e9f35dc26b18e5b605a27fdca51a39
                              • Instruction Fuzzy Hash: 7DF04F75240305BFEB110FA5EC88EB73BACEF49754F404125FA49D7150CE659941EA60
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 00AEC1F7
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00AEC20E
                              • MessageBeep.USER32(00000000), ref: 00AEC226
                              • KillTimer.USER32(?,0000040A), ref: 00AEC242
                              • EndDialog.USER32(?,00000001), ref: 00AEC25C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: 83050c7adb29cc7e51b4a0a11d026e0fc552add77ef80e1c0a33fd8fbd97fad5
                              • Instruction ID: 7ac572f654827fc964c84f41dbdc5be4f6c384206421eda9bf32b1747251f40b
                              • Opcode Fuzzy Hash: 83050c7adb29cc7e51b4a0a11d026e0fc552add77ef80e1c0a33fd8fbd97fad5
                              • Instruction Fuzzy Hash: 2601D630504705ABEB246B65ED4EFE677B8FF00B16F404269F642A24E0DBF06945CB90
                              APIs
                              • EndPath.GDI32(?), ref: 00A913BF
                              • StrokeAndFillPath.GDI32(?,?,00ACB888,00000000,?), ref: 00A913DB
                              • SelectObject.GDI32(?,00000000), ref: 00A913EE
                              • DeleteObject.GDI32 ref: 00A91401
                              • StrokePath.GDI32(?), ref: 00A9141C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Path$ObjectStroke$DeleteFillSelect
                              • String ID:
                              • API String ID: 2625713937-0
                              • Opcode ID: 760c70f1f196c0bcfe192fde0ab54b20a57ba0237cd42510dc939ba5a96fd673
                              • Instruction ID: 7b8624dcb9942aa97dc042b287269488bae47b39bef2366fca451b61c5604e4f
                              • Opcode Fuzzy Hash: 760c70f1f196c0bcfe192fde0ab54b20a57ba0237cd42510dc939ba5a96fd673
                              • Instruction Fuzzy Hash: FCF0EC30104B0AEBDF215F26EC5C7A83FE5A765327F48C265E42A8A1F1CB314996DF50
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00AE899D
                              • CloseHandle.KERNEL32(?), ref: 00AE89B2
                              • CloseHandle.KERNEL32(?), ref: 00AE89BA
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00AE89C3
                              • HeapFree.KERNEL32(00000000), ref: 00AE89CA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$FreeObjectProcessSingleWait
                              • String ID:
                              • API String ID: 3751786701-0
                              • Opcode ID: b7fb441ba8b2c2891e090e55067e943f7b41a17cdd8ebe65c3f3e4dc24bbb258
                              • Instruction ID: b17b603ecd1876bf736ab74d1681ecbb6c4520a0b62048aad878abe317f56831
                              • Opcode Fuzzy Hash: b7fb441ba8b2c2891e090e55067e943f7b41a17cdd8ebe65c3f3e4dc24bbb258
                              • Instruction Fuzzy Hash: 22E0C236104402FBDA011FE1EC0C9AABB69FB8A322B908230F229920B0CF329430DB50
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 00AFC432
                              • CoCreateInstance.COMBASE(00B22D6C,00000000,00000001,00B22BDC,?), ref: 00AFC44A
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                              • CoUninitialize.COMBASE ref: 00AFC6B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_memmove
                              • String ID: .lnk
                              • API String ID: 2683427295-24824748
                              • Opcode ID: 56b95e4e8d4d62767181c736faaef5766b24723b2a657b1cc8dfebbebe731d76
                              • Instruction ID: 9d45402d7a50dede0e15177b4e087419a948c097b332714f2a645b83722af742
                              • Opcode Fuzzy Hash: 56b95e4e8d4d62767181c736faaef5766b24723b2a657b1cc8dfebbebe731d76
                              • Instruction Fuzzy Hash: 96A13C71208205AFD700EF64C991EAFB7E8FF95354F00491CF1559B1A2EB71EA49CB62
                              APIs
                                • Part of subcall function 00AB0DB6: std::exception::exception.LIBCMT ref: 00AB0DEC
                                • Part of subcall function 00AB0DB6: __CxxThrowException@8.LIBCMT ref: 00AB0E01
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                                • Part of subcall function 00A97A51: _memmove.LIBCMT ref: 00A97AAB
                              • __swprintf.LIBCMT ref: 00AA2ECD
                              Strings
                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00AA2D66
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                              • API String ID: 1943609520-557222456
                              • Opcode ID: 711762afc7e50af50f2f4cb39542937aa8e3f892466e679f8ccc2a235e2b110b
                              • Instruction ID: 50209cd818b0fc518fb97944c61c1d227e4a5548ffcb842f64ee11a38e1e653d
                              • Opcode Fuzzy Hash: 711762afc7e50af50f2f4cb39542937aa8e3f892466e679f8ccc2a235e2b110b
                              • Instruction Fuzzy Hash: C1913C716182019FDB14EF28C985D6FB7F8EF96710F04491EF4569B2A2EB20ED44CB62
                              APIs
                                • Part of subcall function 00A94750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A94743,?,?,00A937AE,?), ref: 00A94770
                              • CoInitialize.OLE32(00000000), ref: 00AFB9BB
                              • CoCreateInstance.COMBASE(00B22D6C,00000000,00000001,00B22BDC,?), ref: 00AFB9D4
                              • CoUninitialize.COMBASE ref: 00AFB9F1
                                • Part of subcall function 00A99837: __itow.LIBCMT ref: 00A99862
                                • Part of subcall function 00A99837: __swprintf.LIBCMT ref: 00A998AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                              • String ID: .lnk
                              • API String ID: 2126378814-24824748
                              • Opcode ID: 8b1ac98d0ef10701d3ca8e7f8c6a8f7836e80f849847e5445642f4f6fef22ec6
                              • Instruction ID: 7a3795fd7c50e6b3499b32dc20b530315586e477cdfa659bd3d9cc596c592d29
                              • Opcode Fuzzy Hash: 8b1ac98d0ef10701d3ca8e7f8c6a8f7836e80f849847e5445642f4f6fef22ec6
                              • Instruction Fuzzy Hash: FAA13475604205AFCB00EF58C984D6AB7F9FF89314F048998F9999B2A1CB31ED45CB91
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00AB50AD
                                • Part of subcall function 00AC00F0: __87except.LIBCMT ref: 00AC012B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ErrorHandling__87except__start
                              • String ID: pow
                              • API String ID: 2905807303-2276729525
                              • Opcode ID: 119f75202244379b11b9f22114a3d962b8596940d4c6e7c350c30c9484f98e73
                              • Instruction ID: 6260d1fee5129f4c78ec48119a8b90e93776c95d256d5a08dd68dbd96f53e56e
                              • Opcode Fuzzy Hash: 119f75202244379b11b9f22114a3d962b8596940d4c6e7c350c30c9484f98e73
                              • Instruction Fuzzy Hash: CD515B71D0C601CADB217738D905FFE6BE8EB40700F248E5DE4E5862AADE348DC49A86
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memset$_memmove
                              • String ID: ERCP
                              • API String ID: 2532777613-1384759551
                              • Opcode ID: a25640e537cd5487dd94b7dc0fc2b82bbe14d59679fb1c295a41c5ae14e3f4fd
                              • Instruction ID: ce09083cd00d61daa6f5895451b288c1a0d85f3ab707331e6851d2b4e524285f
                              • Opcode Fuzzy Hash: a25640e537cd5487dd94b7dc0fc2b82bbe14d59679fb1c295a41c5ae14e3f4fd
                              • Instruction Fuzzy Hash: 0A518C71900305DBDB24CF65C981BEBBBF8EF49314F24456EE84ACB281E770AA858F50
                              APIs
                                • Part of subcall function 00AF14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00AE9296,?,?,00000034,00000800,?,00000034), ref: 00AF14E6
                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00AE983F
                                • Part of subcall function 00AF1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00AE92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00AF14B1
                                • Part of subcall function 00AF13DE: GetWindowThreadProcessId.USER32(?,?), ref: 00AF1409
                                • Part of subcall function 00AF13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00AE925A,00000034,?,?,00001004,00000000,00000000), ref: 00AF1419
                                • Part of subcall function 00AF13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00AE925A,00000034,?,?,00001004,00000000,00000000), ref: 00AF142F
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00AE98AC
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00AE98F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @
                              • API String ID: 4150878124-2766056989
                              • Opcode ID: 254c8eb07d97b86224525f1c52991b358666663f1af65c1caf374472634506a3
                              • Instruction ID: 8d4d68b6f29cabcfd0e4ade21f8a0ccfb082e2d28d728ab80aaa7ae04a471804
                              • Opcode Fuzzy Hash: 254c8eb07d97b86224525f1c52991b358666663f1af65c1caf374472634506a3
                              • Instruction Fuzzy Hash: 75415D7690021CBFDB10DFA4CD81AEEBBB8EF49300F104199FA55B7191DA716E85CBA1
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00B1F910,00000000,?,?,?,?), ref: 00B179DF
                              • GetWindowLongW.USER32 ref: 00B179FC
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B17A0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID: SysTreeView32
                              • API String ID: 847901565-1698111956
                              • Opcode ID: 058884a175750ba4f9e974c1c45e654df8727d6c4d1bef3be26964b5aff43006
                              • Instruction ID: b6e22899e6a356894f1cb5a9094b075c6ec31b5c9ceca19c663b481416d2153d
                              • Opcode Fuzzy Hash: 058884a175750ba4f9e974c1c45e654df8727d6c4d1bef3be26964b5aff43006
                              • Instruction Fuzzy Hash: F331CB31244206ABDF118E38CC45BEA77E9EF09364F648725F8B5A32E0DB30ED918B50
                              APIs
                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00B17461
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00B17475
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B17499
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: SysMonthCal32
                              • API String ID: 2326795674-1439706946
                              • Opcode ID: de6550f7661c1e6a8cec3582a2d600bcd38030c74caf21a95a3fade0d8534180
                              • Instruction ID: 13fb3fd7bb188ff74bb0a1326de22b27e650bceef7a9350910d48c610ab90b5f
                              • Opcode Fuzzy Hash: de6550f7661c1e6a8cec3582a2d600bcd38030c74caf21a95a3fade0d8534180
                              • Instruction Fuzzy Hash: 7D21D332540219ABDF11CFA4CC42FEA3BB9EF48724F110154FE156B1D0DA75AC91DBA0
                              APIs
                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00B17C4A
                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00B17C58
                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00B17C5F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$DestroyWindow
                              • String ID: msctls_updown32
                              • API String ID: 4014797782-2298589950
                              • Opcode ID: 9cf5870309251dd27690bbae26532eff8bf72a382ce96d60f9da0dc788fd41c1
                              • Instruction ID: 682d180fe70f39e5ae1533ccc137905a2a849854431414ae2b7efba25998d341
                              • Opcode Fuzzy Hash: 9cf5870309251dd27690bbae26532eff8bf72a382ce96d60f9da0dc788fd41c1
                              • Instruction Fuzzy Hash: CD217CB5204209AFDB10DF24DCD1DA737ECEB5A394B544099FA019B3A1CB31EC41CBA0
                              APIs
                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B16D3B
                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B16D4B
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B16D70
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$MoveWindow
                              • String ID: Listbox
                              • API String ID: 3315199576-2633736733
                              • Opcode ID: 511358342a41094ac88b23837740cebee8130513f6ee9c57fef92e4dd2f343b8
                              • Instruction ID: f1193e1c8fbc52ad49277173801b697d206b6c48128db22e7ae1e7d359a40b02
                              • Opcode Fuzzy Hash: 511358342a41094ac88b23837740cebee8130513f6ee9c57fef92e4dd2f343b8
                              • Instruction Fuzzy Hash: FE218032600118BFDF118F54DC45FFB3BBAEB89764F918168F9459B1A0CA719C9197A0
                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B17772
                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B17787
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B17794
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: cddfa15ed0ebb528d2db5541e164cc50e97d6f337247be485baba5c8adeb1f8b
                              • Instruction ID: 9f5e9d88233775e4e994439466feeb40f8a0a7bc672eaf4f6325ad749fe91cce
                              • Opcode Fuzzy Hash: cddfa15ed0ebb528d2db5541e164cc50e97d6f337247be485baba5c8adeb1f8b
                              • Instruction Fuzzy Hash: 6D11E772244209BAEF209F65CC45FE777B9EF88B64F114518FA41970D0DA71EC51DB10
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00A94AD0), ref: 00A94B45
                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00A94B57
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetNativeSystemInfo$kernel32.dll
                              • API String ID: 2574300362-192647395
                              • Opcode ID: 71ccf883f14d64934d37d0f33d25f430f15f2c1bc47112c4669202b5a19fce19
                              • Instruction ID: 8ddaccfebbb5e5448efc777e5fd2cbb5b343a9b53eade53fca58fa40409dad2f
                              • Opcode Fuzzy Hash: 71ccf883f14d64934d37d0f33d25f430f15f2c1bc47112c4669202b5a19fce19
                              • Instruction Fuzzy Hash: 99D0C230A00713DFDB209F31E818B9272E4AF04350B50C8399485D2160DA70D4C0C614
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00A94B83,?), ref: 00A94C44
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00A94C56
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-1355242751
                              • Opcode ID: adff2a90255d74427e4759372dfe94f280c21d810c12b9ab6aae26cb226e0b90
                              • Instruction ID: 78f8526157d9f70ddc69d409dca4fd95d32c12409c60a9a18be474cad75977cd
                              • Opcode Fuzzy Hash: adff2a90255d74427e4759372dfe94f280c21d810c12b9ab6aae26cb226e0b90
                              • Instruction Fuzzy Hash: 6FD0C730604B23DFCB208F31D808BAA72E4AF09342B50C83A9496E6270EA70D880CA10
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00A94BD0,?,00A94DEF,?,00B552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00A94C11
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00A94C23
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-3689287502
                              • Opcode ID: 9886569b1129d223ba320566e8fe630568e3906903b64ef958b6db4b55a1763b
                              • Instruction ID: 8576c59422164fcae6cb5500154d7ab36727da41bde5bb71629c42be7550fd7e
                              • Opcode Fuzzy Hash: 9886569b1129d223ba320566e8fe630568e3906903b64ef958b6db4b55a1763b
                              • Instruction Fuzzy Hash: 70D0C230600B13DFCB205F70D808757B6D5EF08342B40CC399485D2160EAB0C480CA10
                              APIs
                              • LoadLibraryA.KERNEL32(advapi32.dll,?,00B11039), ref: 00B10DF5
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B10E07
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2574300362-4033151799
                              • Opcode ID: 5f098b305af107b22ba2952ad0e79873f15937ba83cc5870e0c17b483781b279
                              • Instruction ID: 9b87f2c1d19b2a2a93b25dc3fdf54a956430c24f623c10b042ac7c0ac32c10da
                              • Opcode Fuzzy Hash: 5f098b305af107b22ba2952ad0e79873f15937ba83cc5870e0c17b483781b279
                              • Instruction Fuzzy Hash: BBD0EC71910713DFD7205B75C80869776D5AF14351F51CC6EA485D2160DAB0D4E0C650
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00B08CF4,?,00B1F910), ref: 00B090EE
                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00B09100
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetModuleHandleExW$kernel32.dll
                              • API String ID: 2574300362-199464113
                              • Opcode ID: 852303b1949313a46c309bce3e6f4f0823e2497e0d19663651324cf505548d1d
                              • Instruction ID: 038ecd4fc8a41fbfbe5a3e48e510f8ef3fc1e78d369a721a066e0d1e36352bb6
                              • Opcode Fuzzy Hash: 852303b1949313a46c309bce3e6f4f0823e2497e0d19663651324cf505548d1d
                              • Instruction Fuzzy Hash: 9ED01734614713EFEB209F31D8196967AE5EF05351B52CCBA9486E65A1EAB4C880CA90
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: LocalTime__swprintf
                              • String ID: %.3d$WIN_XPe
                              • API String ID: 2070861257-2409531811
                              • Opcode ID: 59df64ae07d4e3b2924a25a3d7aacc60908abd307ea57977071115026511f487
                              • Instruction ID: 6b50bad641ce38a8cbf43bcaf78b0099b25c6b203cea1c5a0a902d625d2e05dd
                              • Opcode Fuzzy Hash: 59df64ae07d4e3b2924a25a3d7aacc60908abd307ea57977071115026511f487
                              • Instruction Fuzzy Hash: 03D05E72908109FBCB04DBD09C89CFA77FCAB09311F500563F503E2261E6359B94EE21
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e0b568ef1d5be885422c3e8a8891366886e5163a8ff9ff89a23bb28ae538345e
                              • Instruction ID: b5b6d2af8ba514c8394e8b7b21b397cce0290cd09153e2d144886c181242ebb1
                              • Opcode Fuzzy Hash: e0b568ef1d5be885422c3e8a8891366886e5163a8ff9ff89a23bb28ae538345e
                              • Instruction Fuzzy Hash: 2EC18D74A04256EFDB14CFA9C884EAEBBB5FF48704B148598F805EB251D730ED81DB90
                              APIs
                              • CharLowerBuffW.USER32(?,?), ref: 00B0E0BE
                              • CharLowerBuffW.USER32(?,?), ref: 00B0E101
                                • Part of subcall function 00B0D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00B0D7C5
                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00B0E301
                              • _memmove.LIBCMT ref: 00B0E314
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: BuffCharLower$AllocVirtual_memmove
                              • String ID:
                              • API String ID: 3659485706-0
                              • Opcode ID: a645b9e693ce8339a5f75443c771d507d3c5f3d347d016da10078a3ea85670f3
                              • Instruction ID: 771929a02d08779e18c2d0fdfffe05782f51be9d568eb99c1ae589736f2fbe58
                              • Opcode Fuzzy Hash: a645b9e693ce8339a5f75443c771d507d3c5f3d347d016da10078a3ea85670f3
                              • Instruction Fuzzy Hash: 57C14A71608301DFC714DF28C481A6ABBE4FF89714F1489ADF8999B391D731E945CB91
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 00B080C3
                              • CoUninitialize.COMBASE ref: 00B080CE
                                • Part of subcall function 00AED56C: CoCreateInstance.COMBASE(?,00000000,00000005,?,?), ref: 00AED5D4
                              • VariantInit.OLEAUT32(?), ref: 00B080D9
                              • VariantClear.OLEAUT32(?), ref: 00B083AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                              • String ID:
                              • API String ID: 780911581-0
                              • Opcode ID: a4e2ebdbb577a11b34435decef0df4303f2b0840c9ecc459c182736b0368ac30
                              • Instruction ID: 620a5ce20f3d1c42a3949a07afd664a03edc68a674daa3ad6dbf0722bc906fa6
                              • Opcode Fuzzy Hash: a4e2ebdbb577a11b34435decef0df4303f2b0840c9ecc459c182736b0368ac30
                              • Instruction Fuzzy Hash: 46A13775604701AFCB10DF58C581A2ABBE8FF89754F14849CF9959B3A2DB30ED05CB86
                              APIs
                              • ProgIDFromCLSID.COMBASE(?,00000000), ref: 00AE76EA
                              • CoTaskMemFree.COMBASE(00000000), ref: 00AE7702
                              • CLSIDFromProgID.COMBASE(?,?), ref: 00AE7727
                              • _memcmp.LIBCMT ref: 00AE7748
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FromProg$FreeTask_memcmp
                              • String ID:
                              • API String ID: 314563124-0
                              • Opcode ID: aeb5077a8edf12f769318492f96d1bf17968da18366b693205e4eed7d9dd4545
                              • Instruction ID: 6959d02f858129e02eff4481ce98cb7149eebf5bb945d0000c68d659c9e1fdce
                              • Opcode Fuzzy Hash: aeb5077a8edf12f769318492f96d1bf17968da18366b693205e4eed7d9dd4545
                              • Instruction Fuzzy Hash: A781EC75A10109EFCF04DFA9C984EEEB7B9FF89315F204598E505AB250DB71AE06CB60
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Variant$AllocClearCopyInitString
                              • String ID:
                              • API String ID: 2808897238-0
                              • Opcode ID: 1e1eb8372ab1745106599e6c3519f25eecdefda24132ebe500323ed0d1d8949f
                              • Instruction ID: b5b1e929bdf92f0eeab04c3d5947742b1e02679730bd4f84e51ee770e2f6c354
                              • Opcode Fuzzy Hash: 1e1eb8372ab1745106599e6c3519f25eecdefda24132ebe500323ed0d1d8949f
                              • Instruction Fuzzy Hash: 8351C774B003819EDF24AF66D891A7AB7F5AF65390F20DC2FE586D7292EA74D8408701
                              APIs
                              • GetWindowRect.USER32(00C8ECE0,?), ref: 00B19863
                              • ScreenToClient.USER32(00000002,00000002), ref: 00B19896
                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00B19903
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID:
                              • API String ID: 3880355969-0
                              • Opcode ID: e163df23211f19581a1b518fd5bf27c8abb24580c6cbde31dd949cc31ff1249e
                              • Instruction ID: 2946a09021442096b3d4a84913ea3383d0a4b118d8fd1a8933d39d165a73a348
                              • Opcode Fuzzy Hash: e163df23211f19581a1b518fd5bf27c8abb24580c6cbde31dd949cc31ff1249e
                              • Instruction Fuzzy Hash: 65512D34A00249AFDF24CF54C890AEE7BF5FF463A1F548199F8559B2A0D730AD81CB90
                              APIs
                              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00AE9AD2
                              • __itow.LIBCMT ref: 00AE9B03
                                • Part of subcall function 00AE9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00AE9DBE
                              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00AE9B6C
                              • __itow.LIBCMT ref: 00AE9BC3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend$__itow
                              • String ID:
                              • API String ID: 3379773720-0
                              • Opcode ID: 9689c61a147546a41bdcccd68d4f2ac8f83a30bfefcc5c37fd17fdded5182fbe
                              • Instruction ID: c871402ebf043cf08474676e17c515d6c00e291fdbe7b1f571e4aa07e20afde7
                              • Opcode Fuzzy Hash: 9689c61a147546a41bdcccd68d4f2ac8f83a30bfefcc5c37fd17fdded5182fbe
                              • Instruction Fuzzy Hash: 13416A70A00348ABDF25EF65D946BEE7BF9EF48750F000069F905A7291DB709A44CBA1
                              APIs
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00AFB89E
                              • GetLastError.KERNEL32(?,00000000), ref: 00AFB8C4
                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00AFB8E9
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00AFB915
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: bfb9e7f2f357b9942feb0136da9188c2d695406d759973fc23339057bcc46102
                              • Instruction ID: cf1822961e382bef3d4fa732a2cd832032fbbce8640f6360b8673670fd3a8a83
                              • Opcode Fuzzy Hash: bfb9e7f2f357b9942feb0136da9188c2d695406d759973fc23339057bcc46102
                              • Instruction Fuzzy Hash: 0F411739600515EFCB10EF58C585A6ABBE9AF49310B09C098FD4A9B362DB30ED01CB91
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B188DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: 82afdee3115113eaafeae6e582f4486c49c1d07901c3e1fd08d0e6ae8c9d0a7d
                              • Instruction ID: fa8ef80c0863513d8fea1a89de4e1f53d3322d2f5374d67f8c4d45530828bf52
                              • Opcode Fuzzy Hash: 82afdee3115113eaafeae6e582f4486c49c1d07901c3e1fd08d0e6ae8c9d0a7d
                              • Instruction Fuzzy Hash: D631B434600109AFEF209A58DC85BF877E5FB06390FE44192FA55E71A1CE70E9C0D752
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 00B1AB60
                              • GetWindowRect.USER32(?,?), ref: 00B1ABD6
                              • PtInRect.USER32(?,?,00B1C014), ref: 00B1ABE6
                              • MessageBeep.USER32(00000000), ref: 00B1AC57
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: 84f7bcfd489e20f4ee8a93043df6e8a6612eb5553587724575d11dc95b9807d0
                              • Instruction ID: dac1cbb99b966d2b4faef5065c55df79d2ff74d54b043bcc8353098c3883f3c0
                              • Opcode Fuzzy Hash: 84f7bcfd489e20f4ee8a93043df6e8a6612eb5553587724575d11dc95b9807d0
                              • Instruction Fuzzy Hash: 9E417C30601219DFCB21DF58D894BA97BF6FB49311F9480E9E8149B260DB30B881CB92
                              APIs
                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00AF0B27
                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00AF0B43
                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00AF0BA9
                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00AF0BFB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 3aa8435fa05a16668529013800f623edc573b206af3531abdd007f6f20bc6390
                              • Instruction ID: 26e9f4ed2b687238bf1c3c704f860ca873d5c511c6b7139112cd49288f0b44f1
                              • Opcode Fuzzy Hash: 3aa8435fa05a16668529013800f623edc573b206af3531abdd007f6f20bc6390
                              • Instruction Fuzzy Hash: FE313870D4021CAEFF308BA58C05FFABBBAEB45318F58826AF691921D3C7758941D751
                              APIs
                              • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00AF0C66
                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00AF0C82
                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00AF0CE1
                              • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00AF0D33
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 919de025a7bd4c62cf4c5f1a743667581346e92736dac97bcf2fa0c1b681f583
                              • Instruction ID: d939c5da5bd22310710930417039cd19123443eeec31faadd35fb724edce20a4
                              • Opcode Fuzzy Hash: 919de025a7bd4c62cf4c5f1a743667581346e92736dac97bcf2fa0c1b681f583
                              • Instruction Fuzzy Hash: 0231243094021CAEFF308BE58C14FFEBBB6AB45320F54832AFA95521D2C3359956C7A1
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00AC61FB
                              • __isleadbyte_l.LIBCMT ref: 00AC6229
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00AC6257
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00AC628D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: ddbf2e4b19a84106a174347a1f0106bdfdd0dbffd87164b4a57a5fd43bbeaa67
                              • Instruction ID: 3eece106e8d2392c3d282469582bc5e95818ede5bd5af87e26fe4c6876d7c640
                              • Opcode Fuzzy Hash: ddbf2e4b19a84106a174347a1f0106bdfdd0dbffd87164b4a57a5fd43bbeaa67
                              • Instruction Fuzzy Hash: 8A318C31A04246AFDF21CF65CC48FEA7BB9BF41310F16412DE864971A2EB31E950DB90
                              APIs
                              • GetForegroundWindow.USER32 ref: 00B14F02
                                • Part of subcall function 00AF3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00AF365B
                                • Part of subcall function 00AF3641: GetCurrentThreadId.KERNEL32 ref: 00AF3662
                                • Part of subcall function 00AF3641: AttachThreadInput.USER32(00000000,?,00AF5005), ref: 00AF3669
                              • GetCaretPos.USER32(?), ref: 00B14F13
                              • ClientToScreen.USER32(00000000,?), ref: 00B14F4E
                              • GetForegroundWindow.USER32 ref: 00B14F54
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: a0af5b97362af0bd5125f43c9da8d853aea24219afb9a647babbbe51a9137cfd
                              • Instruction ID: 325fbe2a40cce6cecbe8272b9af336d56682468f0c63f6025250b4c54fc95078
                              • Opcode Fuzzy Hash: a0af5b97362af0bd5125f43c9da8d853aea24219afb9a647babbbe51a9137cfd
                              • Instruction Fuzzy Hash: 69313E72E00108AFDB00EFA9C9859EFB7FDEF99300F10446AE415E7241EA759E45CBA0
                              APIs
                                • Part of subcall function 00AE810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00AE8121
                                • Part of subcall function 00AE810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00AE812B
                                • Part of subcall function 00AE810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AE813A
                                • Part of subcall function 00AE810A: RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 00AE8141
                                • Part of subcall function 00AE810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00AE8157
                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00AE86A3
                              • _memcmp.LIBCMT ref: 00AE86C6
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00AE86FC
                              • HeapFree.KERNEL32(00000000), ref: 00AE8703
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Heap$InformationProcessToken$AllocateErrorFreeLastLookupPrivilegeValue_memcmp
                              • String ID:
                              • API String ID: 2182266621-0
                              • Opcode ID: 5310f8818cce580f609c79600177f74cc73c9296b217dabbc413f19a519985e8
                              • Instruction ID: 0b21dbafb02ee9c6245c3559075fd5ffd10299698d92d150f71e37659bc49485
                              • Opcode Fuzzy Hash: 5310f8818cce580f609c79600177f74cc73c9296b217dabbc413f19a519985e8
                              • Instruction Fuzzy Hash: 1921AF71E40149EFDB10DFA6CA49BEEB7B8FF44308F158459E848AB241DB34AE05CB90
                              APIs
                              • __setmode.LIBCMT ref: 00AB09AE
                                • Part of subcall function 00A95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00AF7896,?,?,00000000), ref: 00A95A2C
                                • Part of subcall function 00A95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00AF7896,?,?,00000000,?,?), ref: 00A95A50
                              • _fprintf.LIBCMT ref: 00AB09E5
                              • OutputDebugStringW.KERNEL32(?), ref: 00AE5DBB
                                • Part of subcall function 00AB4AAA: _flsall.LIBCMT ref: 00AB4AC3
                              • __setmode.LIBCMT ref: 00AB0A1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                              • String ID:
                              • API String ID: 521402451-0
                              • Opcode ID: 8003973a7c7288d8321e0dcaea3cc2934ae0962ae9ef865d1b223236dbde3899
                              • Instruction ID: a3179d8a137669d3576cbe079f42dbd5eae10258cb62f767a6ed6a8762f5d26c
                              • Opcode Fuzzy Hash: 8003973a7c7288d8321e0dcaea3cc2934ae0962ae9ef865d1b223236dbde3899
                              • Instruction Fuzzy Hash: 91112431A046087FDB04B3B8AC879FE77AC9F59360F200159F10557183EE20584297A4
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B017A3
                                • Part of subcall function 00B0182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B0184C
                                • Part of subcall function 00B0182D: InternetCloseHandle.WININET(00000000), ref: 00B018E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Internet$CloseConnectHandleOpen
                              • String ID:
                              • API String ID: 1463438336-0
                              • Opcode ID: 9e366e347852d54422ccaca7bb9bd25efae0184a919604dd349ae4d30b5e33b2
                              • Instruction ID: dc89115e4c1301db48674634f4146c08007afa769771fa27f4e46cb897f4df11
                              • Opcode Fuzzy Hash: 9e366e347852d54422ccaca7bb9bd25efae0184a919604dd349ae4d30b5e33b2
                              • Instruction Fuzzy Hash: 7B21CF71200701BFEB1A9F648C40FBABFE9FF48B10F10846AFA05966D0DB71991097A0
                              APIs
                              • GetFileAttributesW.KERNEL32(?,00B1FAC0), ref: 00AF3A64
                              • GetLastError.KERNEL32 ref: 00AF3A73
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00AF3A82
                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00B1FAC0), ref: 00AF3ADF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CreateDirectory$AttributesErrorFileLast
                              • String ID:
                              • API String ID: 2267087916-0
                              • Opcode ID: e761f6a92d61de7ac43c598fef87fc731600d5450df3beef15a19c247678b61c
                              • Instruction ID: 3dc77dad5c7bc0b69d28ada176230fa7300719c2dd53033a87b7aa77353a5ccf
                              • Opcode Fuzzy Hash: e761f6a92d61de7ac43c598fef87fc731600d5450df3beef15a19c247678b61c
                              • Instruction Fuzzy Hash: 7D21D3755082068F8B00EF79C9818BEB7F4AE153A4F104A2DF499C72A1DB32DE45CB92
                              APIs
                                • Part of subcall function 00AEF0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00AEDCD3,?,?,?,00AEEAC6,00000000,000000EF,00000119,?,?), ref: 00AEF0CB
                                • Part of subcall function 00AEF0BC: lstrcpyW.KERNEL32(00000000,?,?,00AEDCD3,?,?,?,00AEEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00AEF0F1
                                • Part of subcall function 00AEF0BC: lstrcmpiW.KERNEL32(00000000,?,00AEDCD3,?,?,?,00AEEAC6,00000000,000000EF,00000119,?,?), ref: 00AEF122
                              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00AEEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00AEDCEC
                              • lstrcpyW.KERNEL32(00000000,?,?,00AEEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00AEDD12
                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00AEEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00AEDD46
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: lstrcmpilstrcpylstrlen
                              • String ID: cdecl
                              • API String ID: 4031866154-3896280584
                              • Opcode ID: eb190aa23973a3968c370b319d2815300dffdbe6bc07971e1a20d6261047cca4
                              • Instruction ID: 01f7c64ae9d22e36d987e6c12d9060b2f42810c15bbe8d3dccfe7ff628c0a88b
                              • Opcode Fuzzy Hash: eb190aa23973a3968c370b319d2815300dffdbe6bc07971e1a20d6261047cca4
                              • Instruction Fuzzy Hash: 7D11DD3A200345EFCB25AF35DC85DBA77B8FF45350B40802AF806CB2A0EB719850C7A1
                              APIs
                              • _free.LIBCMT ref: 00AC5101
                                • Part of subcall function 00AB571C: __FF_MSGBANNER.LIBCMT ref: 00AB5733
                                • Part of subcall function 00AB571C: __NMSG_WRITE.LIBCMT ref: 00AB573A
                                • Part of subcall function 00AB571C: RtlAllocateHeap.NTDLL(00C70000,00000000,00000001), ref: 00AB575F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: AllocateHeap_free
                              • String ID:
                              • API String ID: 614378929-0
                              • Opcode ID: c636d25241ca73177860f3afbd4fb30079d727d315ad0ca18b9221df8464b931
                              • Instruction ID: cf50df9c1ac66d7fb42afa465b4af771603c33b9fa5dc2877cf024f0f974dd28
                              • Opcode Fuzzy Hash: c636d25241ca73177860f3afbd4fb30079d727d315ad0ca18b9221df8464b931
                              • Instruction Fuzzy Hash: E911A772D00A15AECF213F74AD49FAE3BDC9B043A1B15462DF9059A152DE349980D790
                              APIs
                              • _memset.LIBCMT ref: 00A944CF
                                • Part of subcall function 00A9407C: _memset.LIBCMT ref: 00A940FC
                                • Part of subcall function 00A9407C: _wcscpy.LIBCMT ref: 00A94150
                                • Part of subcall function 00A9407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A94160
                              • KillTimer.USER32(?,00000001,?,?), ref: 00A94524
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A94533
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00ACD4B9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                              • String ID:
                              • API String ID: 1378193009-0
                              • Opcode ID: 4841529e3a88104986850cf00c94e40c9d8510da7f1d18a2cb6df7352d2d2469
                              • Instruction ID: 3563d43e659822ca431b5e1fe7c2833a26da2be9fcf71f6fb7a4495808250c2d
                              • Opcode Fuzzy Hash: 4841529e3a88104986850cf00c94e40c9d8510da7f1d18a2cb6df7352d2d2469
                              • Instruction Fuzzy Hash: AC21C270904784AFEB328B648955FE6BBECAB05315F04009EE79E5B282C7746E85CB51
                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00AE85E2
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00AE85E9
                              • CloseHandle.KERNEL32(00000004), ref: 00AE8603
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00AE8632
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Process$CloseCreateCurrentHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 2621361867-0
                              • Opcode ID: a23f17377a4f600576c38160dcb74b4f883c0d4d5623dba17275d3cfa4cfdd73
                              • Instruction ID: e37a0be3e0574e0b19962984f3301fb82921cd7766818559978ec9b7b2b91d32
                              • Opcode Fuzzy Hash: a23f17377a4f600576c38160dcb74b4f883c0d4d5623dba17275d3cfa4cfdd73
                              • Instruction Fuzzy Hash: F9115C7250024AAFDF01CFA5DD49BEE7BA9EF48304F048064FE08A21A0CB758E60DB60
                              APIs
                                • Part of subcall function 00A95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00AF7896,?,?,00000000), ref: 00A95A2C
                                • Part of subcall function 00A95A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00AF7896,?,?,00000000,?,?), ref: 00A95A50
                              • gethostbyname.WS2_32(?), ref: 00B06399
                              • WSAGetLastError.WS2_32(00000000), ref: 00B063A4
                              • _memmove.LIBCMT ref: 00B063D1
                              • inet_ntoa.WS2_32(?), ref: 00B063DC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                              • String ID:
                              • API String ID: 1504782959-0
                              • Opcode ID: 8541fe7c47de1e8bf44b34b0e1b82b029a8487dbb82217f3b63a4af81724ed72
                              • Instruction ID: 65f48830dbf54822a863a273872d68dd8ec353de41c2e1385ff6961199e2e404
                              • Opcode Fuzzy Hash: 8541fe7c47de1e8bf44b34b0e1b82b029a8487dbb82217f3b63a4af81724ed72
                              • Instruction Fuzzy Hash: B0110D31A00109AFCF05FBA8DA86DEEBBF8AF04350B544065F505A71A1DF31AE14DB61
                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00AE8B61
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AE8B73
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AE8B89
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00AE8BA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: fb0692129c0846b0bcec63c2a3a8d78ba6348058632791bc8e0f452b807dc26d
                              • Instruction ID: 0477b243778a33f8a5c3915acd127657d9b8401b3b70c96196bcd54d1be30d89
                              • Opcode Fuzzy Hash: fb0692129c0846b0bcec63c2a3a8d78ba6348058632791bc8e0f452b807dc26d
                              • Instruction Fuzzy Hash: 5B112A79901218FFEB11DFA5CD85FADBBB8FB48710F2040A5EA04B7290DA716E11DB94
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00AEFCED,?,00AF0D40,?,00008000), ref: 00AF115F
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00AEFCED,?,00AF0D40,?,00008000), ref: 00AF1184
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00AEFCED,?,00AF0D40,?,00008000), ref: 00AF118E
                              • Sleep.KERNEL32(?,?,?,?,?,?,?,00AEFCED,?,00AF0D40,?,00008000), ref: 00AF11C1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID:
                              • API String ID: 2875609808-0
                              • Opcode ID: c66f4d30caa773e5ae0db05116fa18b048948066bca4b3d4883f9467e21f7c4a
                              • Instruction ID: 13e0df4df8cf0d73a4b6520248b3715f94f9a1a4529bff6c01607a98fe75ce6f
                              • Opcode Fuzzy Hash: c66f4d30caa773e5ae0db05116fa18b048948066bca4b3d4883f9467e21f7c4a
                              • Instruction Fuzzy Hash: E7111831D0092DE7CF009FE5D948AFEBBB8FB09751F408259EB81B2240CB7095A1CB99
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00AED84D
                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00AED864
                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00AED879
                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00AED897
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Type$Register$FileLoadModuleNameUser
                              • String ID:
                              • API String ID: 1352324309-0
                              • Opcode ID: 60a71f96c9a6aada858512fbfa99cb5b5b870e8bcea5271d7bddee4a32394be6
                              • Instruction ID: ea528fb369a4cd2777a76bef199d8e8730dc6de457c1f37d3a76af3d122ba8b8
                              • Opcode Fuzzy Hash: 60a71f96c9a6aada858512fbfa99cb5b5b870e8bcea5271d7bddee4a32394be6
                              • Instruction Fuzzy Hash: D1116DB5605355EBE320CF52EC08FA3BBBCEF00B00F508569AA16D7150DBB1E949DBA1
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction ID: 0463d10dc1837805eb1c3526ed3e53e1d1ea8e28f363379b4648469457f5f06d
                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction Fuzzy Hash: D8014C7244814EBBCF165F89CC01DEE3F62BB18390F5A8419FE1858031D636CAB1AF81
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00B1B2E4
                              • ScreenToClient.USER32(?,?), ref: 00B1B2FC
                              • ScreenToClient.USER32(?,?), ref: 00B1B320
                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B1B33B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ClientRectScreen$InvalidateWindow
                              • String ID:
                              • API String ID: 357397906-0
                              • Opcode ID: d490ed7dc72afb90ee2d1b6c2ac04de84f9af0c7f6a69a4829514479abccf64c
                              • Instruction ID: d2bcfde7b5ade3b4fb63b07bf17515596ae10e1dd099221e2d00924bef6f1f6e
                              • Opcode Fuzzy Hash: d490ed7dc72afb90ee2d1b6c2ac04de84f9af0c7f6a69a4829514479abccf64c
                              • Instruction Fuzzy Hash: 05114679D0020AEFDB41CF99D4449EEBBF5FB08310F508166E914E3220D735AA65CF50
                              APIs
                              • _memset.LIBCMT ref: 00B1B644
                              • _memset.LIBCMT ref: 00B1B653
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00B56F20,00B56F64), ref: 00B1B682
                              • CloseHandle.KERNEL32 ref: 00B1B694
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _memset$CloseCreateHandleProcess
                              • String ID:
                              • API String ID: 3277943733-0
                              • Opcode ID: 1e4845330d9bb44aa3b3f749181516b0836fce7979021e10b95350fbab6514b5
                              • Instruction ID: 35f50353c38b30283c172deaf38058baf085a63b960edf99c389fff37240cb15
                              • Opcode Fuzzy Hash: 1e4845330d9bb44aa3b3f749181516b0836fce7979021e10b95350fbab6514b5
                              • Instruction Fuzzy Hash: D7F0FEB2940304BAF6102765BC46FBB7B9CEB19796F8044A1BA09E71A2DB755C10C7A8
                              APIs
                              • RtlEnterCriticalSection.NTDLL(?), ref: 00AF6BE6
                                • Part of subcall function 00AF76C4: _memset.LIBCMT ref: 00AF76F9
                              • _memmove.LIBCMT ref: 00AF6C09
                              • _memset.LIBCMT ref: 00AF6C16
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 00AF6C26
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CriticalSection_memset$EnterLeave_memmove
                              • String ID:
                              • API String ID: 48991266-0
                              • Opcode ID: f3a74f5ad923b5baa457310e7aaf864a0c6f9c9039af3b55bc600a88d29517a4
                              • Instruction ID: e07404e6979b5158d45f76f1f0ae65a987c1ea0650bf9ebeffdb94173992e8fe
                              • Opcode Fuzzy Hash: f3a74f5ad923b5baa457310e7aaf864a0c6f9c9039af3b55bc600a88d29517a4
                              • Instruction Fuzzy Hash: DFF05E7A200104ABCF016F95DC85E9ABB2AEF45321F04C061FE089F227DB31E811CBB4
                              APIs
                              • GetSysColor.USER32(00000008), ref: 00A92231
                              • SetTextColor.GDI32(?,000000FF), ref: 00A9223B
                              • SetBkMode.GDI32(?,00000001), ref: 00A92250
                              • GetStockObject.GDI32(00000005), ref: 00A92258
                              • GetWindowDC.USER32(?,00000000), ref: 00ACBE83
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00ACBE90
                              • GetPixel.GDI32(00000000,?,00000000), ref: 00ACBEA9
                              • GetPixel.GDI32(00000000,00000000,?), ref: 00ACBEC2
                              • GetPixel.GDI32(00000000,?,?), ref: 00ACBEE2
                              • ReleaseDC.USER32(?,00000000), ref: 00ACBEED
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                              • String ID:
                              • API String ID: 1946975507-0
                              • Opcode ID: c1ed2cd83890662a5dc5410633f1c67f43eb17946809bd89a90292a865e7a17d
                              • Instruction ID: 8c1abe15d6ebdaac5b6527f8fc6032599a78d6c4b647868123f8e43fe6e4b772
                              • Opcode Fuzzy Hash: c1ed2cd83890662a5dc5410633f1c67f43eb17946809bd89a90292a865e7a17d
                              • Instruction Fuzzy Hash: B1E03932144245FADF215FA4FC0DBE83B11EB15332F50C36AFA69580E1CB728990DB22
                              APIs
                              • GetCurrentThread.KERNEL32 ref: 00AE871B
                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00AE82E6), ref: 00AE8722
                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00AE82E6), ref: 00AE872F
                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00AE82E6), ref: 00AE8736
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CurrentOpenProcessThreadToken
                              • String ID:
                              • API String ID: 3974789173-0
                              • Opcode ID: a9cce69305e8e0df904debbf2bf7a98429bf29650bfac5737316291063181f92
                              • Instruction ID: 7364046651aed0ca6ea2e8160956ad5c0f7ff32e224435a30ca0d9012f4488b1
                              • Opcode Fuzzy Hash: a9cce69305e8e0df904debbf2bf7a98429bf29650bfac5737316291063181f92
                              • Instruction Fuzzy Hash: 3FE086366112129FD7205FB16D0CBEA3BACEF55B91F55C828B649CB050DE388541C750
                              APIs
                              • OleSetContainedObject.OLE32(?,00000001), ref: 00AEB4BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ContainedObject
                              • String ID: AutoIt3GUI$Container
                              • API String ID: 3565006973-3941886329
                              • Opcode ID: aa92aeb1f8cae2f063837e73a649ebd22759173a0e74c9b33aecc6eaec7aa294
                              • Instruction ID: 15730aa520a6e450c0b4a004b69d38ef95d7b57985e219a2ccb1fca63cfcf79e
                              • Opcode Fuzzy Hash: aa92aeb1f8cae2f063837e73a649ebd22759173a0e74c9b33aecc6eaec7aa294
                              • Instruction Fuzzy Hash: 75915B70610601AFDB14DF69C889B6BB7F5FF48710F10856DE94ACB6A1DB71E841CB60
                              APIs
                                • Part of subcall function 00AAFC86: _wcscpy.LIBCMT ref: 00AAFCA9
                                • Part of subcall function 00A99837: __itow.LIBCMT ref: 00A99862
                                • Part of subcall function 00A99837: __swprintf.LIBCMT ref: 00A998AC
                              • __wcsnicmp.LIBCMT ref: 00AFB02D
                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00AFB0F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                              • String ID: LPT
                              • API String ID: 3222508074-1350329615
                              • Opcode ID: 9f4f64ec96221840c7d98979dc8a28d407c7c0ac37915a6ca8e2c54f5b899b9f
                              • Instruction ID: 619ed4b3a817c5562619a80665ae4137e67bc4a1e41c681ccb6c9f8b5bf45516
                              • Opcode Fuzzy Hash: 9f4f64ec96221840c7d98979dc8a28d407c7c0ac37915a6ca8e2c54f5b899b9f
                              • Instruction Fuzzy Hash: 1D618575A10219EFCB14DF98C951EBEB7F9EF09310F104169FA16AB291DB70AE40CB64
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00AA2968
                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00AA2981
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: 0a5edb5feab1a457c21fbe33f0a9edc48decb863f5dc042be02cfaa93303e571
                              • Instruction ID: 0e3d5854cb3fb5b73d90f450f69999ac65357b3f4902cab739cb3873ae730d6c
                              • Opcode Fuzzy Hash: 0a5edb5feab1a457c21fbe33f0a9edc48decb863f5dc042be02cfaa93303e571
                              • Instruction Fuzzy Hash: 24514A72518744ABD720EF14D885BAFB7E8FF85344F41885DF2D8410A1EF309929CB56
                              APIs
                                • Part of subcall function 00A94F0B: __fread_nolock.LIBCMT ref: 00A94F29
                              • _wcscmp.LIBCMT ref: 00AF9824
                              • _wcscmp.LIBCMT ref: 00AF9837
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: _wcscmp$__fread_nolock
                              • String ID: FILE
                              • API String ID: 4029003684-3121273764
                              • Opcode ID: dc628ff87fd899c73f25cf32ab41055f6dcb4235daf089bf16d83cf564856df6
                              • Instruction ID: 6367773ca56bcde33ec766cbb4024a0d43d358c5b2d9a6d0a662f7ecdd008734
                              • Opcode Fuzzy Hash: dc628ff87fd899c73f25cf32ab41055f6dcb4235daf089bf16d83cf564856df6
                              • Instruction Fuzzy Hash: E2419671A4021EBADF219BE4CC45FEFBBFDDF89710F000469FA04A7191DA719A058BA5
                              APIs
                              • _memset.LIBCMT ref: 00B0259E
                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00B025D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CrackInternet_memset
                              • String ID: |
                              • API String ID: 1413715105-2343686810
                              • Opcode ID: 34b35b853331de822aaec7bb5226964367a8184dd90932f2b3a3d4def23cee76
                              • Instruction ID: e8e87895fff1ace3e633fd844844b17785d1f7559a4ebf849dcf5703ad09223e
                              • Opcode Fuzzy Hash: 34b35b853331de822aaec7bb5226964367a8184dd90932f2b3a3d4def23cee76
                              • Instruction Fuzzy Hash: C1311871910119EBCF01EFA4CD89EEEBFB9FF08310F10006AF919A6162EB315956DB60
                              APIs
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00B17B61
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B17B76
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: '
                              • API String ID: 3850602802-1997036262
                              • Opcode ID: d9e4e1c850d5cc486763446e0fdf0e7befb0166b03bacb544d55fa26ebece2e1
                              • Instruction ID: f258f0bc1ccf3f34dcd9d7f3acfb0633e8791a90d1e9a312ec00b255f8f0b6b0
                              • Opcode Fuzzy Hash: d9e4e1c850d5cc486763446e0fdf0e7befb0166b03bacb544d55fa26ebece2e1
                              • Instruction Fuzzy Hash: BF41E874A452099FDB14CF64D991BDABBF5FF08300F5041AAE905AB351DB70AA91CF90
                              APIs
                              • DestroyWindow.USER32(?,?,?,?), ref: 00B16B17
                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B16B53
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$DestroyMove
                              • String ID: static
                              • API String ID: 2139405536-2160076837
                              • Opcode ID: 1b25b620b95ca8407c222e28b4d61e6d92fc3f26ccf5b0ec3ef76f7d79a583ee
                              • Instruction ID: 9742e88288ef0568cdb405d730176bf913acc009722bb4a2ba9bb7211bc04818
                              • Opcode Fuzzy Hash: 1b25b620b95ca8407c222e28b4d61e6d92fc3f26ccf5b0ec3ef76f7d79a583ee
                              • Instruction Fuzzy Hash: EC317C71210604AEDB109F68DC81BFB77E9FF48760F50861DF9A9D7190DA31AC91CB60
                              APIs
                              • _memset.LIBCMT ref: 00AF2911
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00AF294C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: dd1b3cbcbe4efde78f22d1abdeca02cb1d821aaf833f9ec2965a06098b147a42
                              • Instruction ID: 7c320f2bcad6ffb0d920717ace8bc7174f5a01b6314f69b899236cc5d4055952
                              • Opcode Fuzzy Hash: dd1b3cbcbe4efde78f22d1abdeca02cb1d821aaf833f9ec2965a06098b147a42
                              • Instruction Fuzzy Hash: 19318F316003099BEB24DFD8C985BFEBBB9EF45390F140069FA85A71A1D7B09944CB51
                              APIs
                              • __snwprintf.LIBCMT ref: 00B03A66
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: __snwprintf_memmove
                              • String ID: , $$AUTOITCALLVARIABLE%d
                              • API String ID: 3506404897-2584243854
                              • Opcode ID: caa0ec2e999bfbe420f270ef009e3d570bc9c973776dc5e9b78bddc15c022626
                              • Instruction ID: 5cb33d97bb766580625d784edc2c43e9d6216a173dafb39a53feff5048e7dd5c
                              • Opcode Fuzzy Hash: caa0ec2e999bfbe420f270ef009e3d570bc9c973776dc5e9b78bddc15c022626
                              • Instruction Fuzzy Hash: 29217E31B00219ABCF14EF64CD86AAE7BF9EF49700F500499F455AB192DB34EA45CBA1
                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B16761
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B1676C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: b5220cd87ccb26bf289f08fdab6694427e5515fb8a792383f067de884aadbd68
                              • Instruction ID: 5af3205ff9f6884b54486a10f26a19abab8147216f50baf52facd736bb2a7569
                              • Opcode Fuzzy Hash: b5220cd87ccb26bf289f08fdab6694427e5515fb8a792383f067de884aadbd68
                              • Instruction Fuzzy Hash: 26118275300209AFEF21DF54DC81EFB37AAEB583A8F604169F914972D0D6719C9187A0
                              APIs
                                • Part of subcall function 00A91D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00A91D73
                                • Part of subcall function 00A91D35: GetStockObject.GDI32(00000011), ref: 00A91D87
                                • Part of subcall function 00A91D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A91D91
                              • GetWindowRect.USER32(00000000,?), ref: 00B16C71
                              • GetSysColor.USER32(00000012), ref: 00B16C8B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                              • String ID: static
                              • API String ID: 1983116058-2160076837
                              • Opcode ID: 175da17d4ddbf20c5cef1a35cd0e2276472f6720ce1119aae4cfc4c7e837e187
                              • Instruction ID: b8ee6eba5a1e2af9ea6dcf0e20b2a535c6d17da365b2927af60e54a67a6b9b2c
                              • Opcode Fuzzy Hash: 175da17d4ddbf20c5cef1a35cd0e2276472f6720ce1119aae4cfc4c7e837e187
                              • Instruction Fuzzy Hash: 9621177261020AAFDF04DFA8CC45AFA7BE9FB08315F404669F995D3250EA35E891DB60
                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 00B169A2
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B169B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: edit
                              • API String ID: 2978978980-2167791130
                              • Opcode ID: f10207f59d6815bcf03c344cc7d90cab29666b8cd90e2c7f67c1be3632917270
                              • Instruction ID: 9bf3193e49242762fc70ae0ffe64871c1276cb114a726ce49b14264f8ab12301
                              • Opcode Fuzzy Hash: f10207f59d6815bcf03c344cc7d90cab29666b8cd90e2c7f67c1be3632917270
                              • Instruction Fuzzy Hash: 5B116D71100205ABEF108F749C44AFB37AAEB193B4F904764F9A5971E0CA31DC919760
                              APIs
                              • _memset.LIBCMT ref: 00AF2A22
                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00AF2A41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: 3326025a484ac573631cfb9eec34a02ba18bb1b06c08a4dddcd56f513d162426
                              • Instruction ID: 7e1cf1517ef3dc0826fc5eea8d912efa044fdb7464a0bec75de1e9b522115d7b
                              • Opcode Fuzzy Hash: 3326025a484ac573631cfb9eec34a02ba18bb1b06c08a4dddcd56f513d162426
                              • Instruction Fuzzy Hash: 4511D07291121CABDB30FBD8D845BFA77B8AB45380F044061FA55E7290D770AD0AC791
                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00B0222C
                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00B02255
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Internet$OpenOption
                              • String ID: <local>
                              • API String ID: 942729171-4266983199
                              • Opcode ID: f3dcad315b0950e420edcce3e75d2b05437fe65c1a8f6f4680bfa233be9b4828
                              • Instruction ID: 1a9b0c615cab3a0ab7421d59035d7f71686a4c8b0b11c2df5695309d7d308d89
                              • Opcode Fuzzy Hash: f3dcad315b0950e420edcce3e75d2b05437fe65c1a8f6f4680bfa233be9b4828
                              • Instruction Fuzzy Hash: 4211EC70501226BADB298F918CC8EFBFFE8FF16751F1082AAF90496080D2705D98D6F0
                              APIs
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                                • Part of subcall function 00AEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00AEAABC
                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00AE8E73
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 05dd31f23282428fdb72c02613cd12c5332b7919fe9b3096a79f8c275504c32e
                              • Instruction ID: 9cf193c14f04dcdea76aa2294a551996dc89caf223703ff6918a46f4231d5cfc
                              • Opcode Fuzzy Hash: 05dd31f23282428fdb72c02613cd12c5332b7919fe9b3096a79f8c275504c32e
                              • Instruction Fuzzy Hash: FE012471B41219ABDF15EBB1CD429FE73A8EF05320B540A19F835672E1DF359808D7A0
                              APIs
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                                • Part of subcall function 00AEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00AEAABC
                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00AE8D6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 968e1e426f9e6722f70d675f02a7cdd11dfc79eeb5a0c4416ab242f401c481c3
                              • Instruction ID: e5dc374bd5611b333b89d6d1263416f589218857ef7319ae7d78155db7f26b32
                              • Opcode Fuzzy Hash: 968e1e426f9e6722f70d675f02a7cdd11dfc79eeb5a0c4416ab242f401c481c3
                              • Instruction Fuzzy Hash: 7B018F71B41209ABDF25EBE2CE96AFE77E89F15340F500029B806672E1DE255E08D6B1
                              APIs
                                • Part of subcall function 00A97DE1: _memmove.LIBCMT ref: 00A97E22
                                • Part of subcall function 00AEAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00AEAABC
                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00AE8DEE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 737954d15a2373a050dcd1b38f1b154240d299bd32b209b301362559fb552bea
                              • Instruction ID: c0b1b0c65c607ab90229555303bc1496bdb7b03a2c1ca88c44db202be3505fe8
                              • Opcode Fuzzy Hash: 737954d15a2373a050dcd1b38f1b154240d299bd32b209b301362559fb552bea
                              • Instruction Fuzzy Hash: 3501A271B41209B7DF21EBA5CE86BFE77E89F15340F504025B805A3292DE255E08E6B1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp
                              • String ID: #32770
                              • API String ID: 2292705959-463685578
                              • Opcode ID: bd6263e6e2b1902b1ef220086f0916b33dc0554b54ff97e38d6b726261af1339
                              • Instruction ID: 6cd21ff56ee50ab80a1343c063a6113a9380cf3a21c27e9fd4a974df82109ad4
                              • Opcode Fuzzy Hash: bd6263e6e2b1902b1ef220086f0916b33dc0554b54ff97e38d6b726261af1339
                              • Instruction Fuzzy Hash: 1EE09232A0022D2AE7209B99AC49BA7F7ECEB55B61F40016AFD04D3051EA609A45C7E0
                              APIs
                                • Part of subcall function 00ACB314: _memset.LIBCMT ref: 00ACB321
                                • Part of subcall function 00AB0940: InitializeCriticalSectionAndSpinCount.KERNEL32(00B54158,00000000,00B54144,00ACB2F0,?,?,?,00A9100A), ref: 00AB0945
                              • IsDebuggerPresent.KERNEL32(?,?,?,00A9100A), ref: 00ACB2F4
                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00A9100A), ref: 00ACB303
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00ACB2FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 3158253471-631824599
                              • Opcode ID: c66acb14940112be3a08db0513e3a2f4b1ba0a43155db1f36a43a39734782c36
                              • Instruction ID: 5fb815f80cf1bc3f9f2bb5d06747bbab7611b1b6dc321c23285ee31a5ebdcd65
                              • Opcode Fuzzy Hash: c66acb14940112be3a08db0513e3a2f4b1ba0a43155db1f36a43a39734782c36
                              • Instruction Fuzzy Hash: 8AE092702107518FD730DF28E505B867BE8AF04304F01896CE456CB751EBB5E404CBB1
                              APIs
                              • GetSystemDirectoryW.KERNEL32(?), ref: 00AD1775
                                • Part of subcall function 00B0BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,00AD195E,?), ref: 00B0BFFE
                                • Part of subcall function 00B0BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00B0C010
                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00AD196D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                              • String ID: WIN_XPe
                              • API String ID: 582185067-3257408948
                              • Opcode ID: 3c58869a697f7cb35286e8a0728f9ec31e66cc339e50d574dde3a5c5dd7177ae
                              • Instruction ID: a081631ce9bbde4e7c651609ffefb26cca4b50393bc2815bda94784bcaeedc70
                              • Opcode Fuzzy Hash: 3c58869a697f7cb35286e8a0728f9ec31e66cc339e50d574dde3a5c5dd7177ae
                              • Instruction Fuzzy Hash: E1F0ED7080410AEFDB15DB91C984BECBBF8BB08301F540096E102B32A1DB714F85DF60
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B159AE
                              • PostMessageW.USER32(00000000), ref: 00B159B5
                                • Part of subcall function 00AF5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AF52BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 13a16492e86349669b7167b6521e2749e38edca0811b353a161008d61c0441b6
                              • Instruction ID: 4f01825fc932313a403365bee0c86e33d75f2cbd248f230c42d3bcd7ab61d0c9
                              • Opcode Fuzzy Hash: 13a16492e86349669b7167b6521e2749e38edca0811b353a161008d61c0441b6
                              • Instruction Fuzzy Hash: 0DD0C9317807127AE664AB709C0BFE66655BB14B50F404835B349AB1E5CDE0A800C654
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B1596E
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00B15981
                                • Part of subcall function 00AF5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00AF52BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2177197772.0000000000A91000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A90000, based on PE: true
                              • Associated: 00000000.00000002.2177164617.0000000000A90000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B44000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177197772.0000000000B92000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2177927609.0000000000B98000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2178101088.0000000000B99000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a90000_uOCavrYu1y.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 780b3e6d39cb30073f4c892c7ef37887a421457a92a4697554d7064797cc2ae2
                              • Instruction ID: 9b3cb976df99b34c2cc758912b54609cc1546c1254a7794e4b1053cee4f08741
                              • Opcode Fuzzy Hash: 780b3e6d39cb30073f4c892c7ef37887a421457a92a4697554d7064797cc2ae2
                              • Instruction Fuzzy Hash: D7D0C931784712BAE664AB709C1BFF66A55BB10B50F004835B349AB1E5CDE09800C654